The Importance of Reputation
Proactive enterprise security involves turning data into actionable information—that’s where reputation comes in.
In the past, security meant tall, strong walls—as in forts, citadels, castles, etc. (think Great Wall of China). Eventually, warring parties figured ways around those vertically oriented defenses.
The same dynamic is at play today in the electronic realm. In the hyper-dynamic environment of the Internet, the “fortress” mentality of IT security is a throwback. With evolving online models such as mobile computing and the cloud, and sophisticated malware such as botnets and advanced ersistent
threats, an information security defense strategy oriented around securing an enterprise’s “perimeter” is misguided and inadequate. What is needed is a way to leverage IT’s most valuable asset: data. As is true in every area of IT, security technology generates a plethora of data—which can be something of a mixed blessing.
“What companies are wrestling with is the fact that security has a lot of data associated with it,” says industry analyst Steve Hunt, author of the “Security Dreamer” blog. “But only when that data is organized, contextualized, does it become security information,” he adds.internal networks, but active, up-to-the-minute “reputation” data reconnoitered from the wilds of the Internet, combined in the most effective manner to generate meaningful recommendations and remediations. Such reputation data can make the difference between passive resistance and proactive security.
Please continue reading on the attached whitepaper.