Im menschlichen Körper schützt das Immunsystem im Inneren vor Gefahren durch unerwünschte Keime und Viren.

Warum schützen Unternehmen Ihre Netzwerke also nicht von innen, sondern legen i.d.R. viel mehr Wert auf den Schutz der Außengrenzen? Das war über viele Jahre sicherlich ein guten und richtiger Ansatz, weil es nur kontrollierte Zugänge ins Netz gab. Durch die immer stärker zunehmenden Themen Cloud, Mobilität und IoT aber verschwimmen solche festen Grenzen und Übergänge.

Die Gefahr eines Eindringens in Ihr Netzwerk steigt.

Wenn man von üblichen Netzwerkstrukturen ausgeht, hat ein einmal ins LAN gelangter Schädling leichtes Spiel, sich zu verbreiten und Rechner und Server abteilungsübergreifend zu kompromittieren. Hier ist der zentrale Ansatzpunkt für das LAN-Immunsystem. Warum eigentlich muss ein Produktionsnetz mit der Personalabteilung in Verbindung stehen? Was macht der Bereich Vertrieb z.B. im gleichen Netzsegment, wie die Technik?

Eine interne Segmentierungs-Firewall schafft die nötigen Barrieren, damit sich Schadsoftware und Eindringlinge nicht ungehindert in Ihrem Netzwerk bewegen können.

Lesen Sie dazu gerne auch das Whitepaper unseres Technologiepartners Fortinet.

Neugierig, wie das Immunsystem Ihres Netzwerkes aktiviert werden kann? Sprechen wir drüber:

DSC_2022 klein

Bastian Breidenbach

breidenbach@oberberg.net

DSC_2012 klein

Dennis Goslar

goslar@oberberg.net

Dirk Zurawski
02261 9155051
zurawski@oberberg.net

By Kevin Skahill The Internet of Things (IoT) is ushering in an exciting digital renaissance that is redefining the traditional models of how healthcare is delivered. With IoT devices such as smart infusion pumps or connected inhalers, healthcare providers can now remotely monitor and adjust care. IoT devices in healthcare, where mobile and wearable devices are increasingly connected […]

Source:: Cisco Security Notice

By Kevin Skahill The Internet of Things (IoT) is ushering in an exciting digital renaissance that is redefining the traditional models of how healthcare is delivered. With IoT devices such as smart infusion pumps or connected inhalers, healthcare providers can now remotely monitor and adjust care. IoT devices in healthcare, where mobile and wearable devices are increasingly connected […]

Source:: Cisco Security Notice

By Matt Aubert On December 5, 2017, at 1 pm Eastern, Cisco Security Incident Response Service experts will present a webinar titled “Dissecting a Breach: An Incident Responder’s Perspective.” This webinar will describe how our team performs incident handling within the service and what you should expect during any incident engagement, regardless of who is doing the work. We […]

Source:: Cisco Security Notice

By Matt Aubert On December 5, 2017, at 1 pm Eastern, Cisco Security Incident Response Service experts will present a webinar titled “Dissecting a Breach: An Incident Responder’s Perspective.” This webinar will describe how our team performs incident handling within the service and what you should expect during any incident engagement, regardless of who is doing the work. We […]

Source:: Cisco Security Notice

By Ron Sterbenz Cisco Stealthwatch Cloud recently launched as a fully procurable SaaS service available on AWS Marketplace. As a security service available on Amazon Web Services (AWS), Stealthwatch Cloud provides security monitoring, visualization, and automatic threat detection. Stealthwatch Cloud uses advanced modeling and machine learning techniques to identify behavior changes in AWS provisioned entities. Stealthwatch Cloud learns […]

Source:: Cisco Security Notice

By Ron Sterbenz Cisco Stealthwatch Cloud recently launched as a fully procurable SaaS service available on AWS Marketplace. As a security service available on Amazon Web Services (AWS), Stealthwatch Cloud provides security monitoring, visualization, and automatic threat detection. Stealthwatch Cloud uses advanced modeling and machine learning techniques to identify behavior changes in AWS provisioned entities. Stealthwatch Cloud learns […]

Source:: Cisco Security Notice

By Joe Malenfant Machine learning. Next-generation antivirus. Artificial intelligence. These are all terms you likely see in your inbox on a daily basis from various endpoint security vendors. Meanwhile, you’re trying to protect your business and don’t have time to assess the 50+ vendors touting the latest tool designed to solve all of your endpoint security problems and […]

Source:: Cisco Security Notice

By Joe Malenfant Machine learning. Next-generation antivirus. Artificial intelligence. These are all terms you likely see in your inbox on a daily basis from various endpoint security vendors. Meanwhile, you’re trying to protect your business and don’t have time to assess the 50+ vendors touting the latest tool designed to solve all of your endpoint security problems and […]

Source:: Cisco Security Notice

Fortinet Threat Landscape Report Reveals Cybercriminals Successfully Using Common Exploits and „Swarm“ Technology to Attack at Speed and Scale

Source:: Fortinet