Palo Alto Networks, Digital Defense, Aruba Networks, and Veeam form the final quartet of vendor solutions we examine in our coverage of our CIS Security Controls toolkit. Leveraged to reduce your organization’s risk of cyberattack by up to 94%, these four security partners check off seven of the 20 Center for Internet Security (CIS) Critical Security Controls.
Center for Internet Security (CIS) Critical Security Controls V6.1
- #4 Continuous Vulnerability Assessment and Remediation – Digital Defense
- #8 Malware Defenses – Palo Alto Networks
- #9 Limitation and Control of Network Ports, Protocols, & Services – Palo Alto Networks
- #10 Data Recovery Capability – Veeam
- #12 Boundary Defense – Palo Alto Networks
- #15 Wireless Access Control – Aruba Networks
- #20 Penetration Tests and Red Team Exercises – Digital Defense
“Shrink the attack surface™,” is Digital Defense’s trademark slogan, which accurately sums up their approach to cyber security. This ability to manage vulnerability is why NCSi chooses the Digital Defense security suite as a strategic tool for daily customer protection. The technologies used by Digital Defense enables us to scan, analyze, score, automate, test, and establish compliance in all areas of frontline security. We also work with Digital Defense to educate our clients about the dangers of risky digital behavior. This knowledge is crucial to deterring potential human-weakness based threats. We all know we make mistakes, often unknowingly. Education is one sure key to a secure network.
Palo Alto Networks
While a cyberattack may indeed come, Palo Alto Networks security suite prevents the attack from being successful. Cyberattacks are becoming more sophisticated, more automated, and cheaper to launch. Fundamental trust in the network is eroding, but you still need trust in your system to maintain your daily business. NCSi uses Palo Alto Networks’ next-generation security platform to reduce the success rate of an almost inevitable cyberattack to as close to zero as possible. A manageable cyberattack can have limited or no damages. And that is, after all, the end goal of a cyber security plan.
Veeam was named a 2017 Gartner Magic Quadrant Leader for Data Center Backup and Recovery. This is not the first time Veeam has been honored by the security industry, and this is not the first year NCSi has been a proud partner with Veeam. The solution most relevant to the current CIS Security Control mentioned here is their Disaster Recovery-as-a-Service (DRaaS). Without disaster recovery, a successful attack — despite all your preparations — could mean the demise of your business. An efficient and affordable recovery plan, however, can get your operations back online in fewer than 15 minutes. Your customers won’t even know you’ve had a mishap. That’s quite a significant difference. It pays to be ready in case of disaster.
Aruba networks focuses on mobile first, and it’s not just about connectivity. Reliability, integration, sharing real-time contextual information about the network state with business applications and providing programmability of your infrastructure. Whew! Add to this the inclusion of the IoT, and you have a cutting-edge security solution for wired, wi-fi, wide area and cloud-based networks. The aruba network ecosystem provides a better user experience, too, with many developer options.  This is why NCSi chooses aruba networks for wireless access control.
This security quartet rounds out the toolkit that NCSi uses to fulfill the promise set out by the CIS Critical Security Controls. We have looked at all 20 of the controls. The first five offer the greatest bang for your buck. Implementing the first five reduces your risk of cyberattack by 85%. But the job isn’t complete with just the first five. By finishing what you started, and working with us to implement all 20 of the CIS security controls, you reduce your cyberattack by 94%. That’s a hefty increase in your comfort level, not to mention a significant increase in protection for your business investment. Add to this the extra miles that NCSi goes to address your particular organization’s specific needs, your exposure to attack begins to close in on zero. That’s our goal.
We hope that this series of articles has helped you see the need for a long-term security strategy. Committing your organization to implementing the international CIS Critical Security Controls is a wise plan. Our job is to help you do this in the most effective, efficient, and affordable way possible.
Contact us today for a free evaluation of your security posture.