The New Security Model for IT: Detect and Respond

Nov. 15, 2018
The detect-and-respond security model requires organizations to build capabilities from the lowest levels and deploy solutions that can distribute the detection, obfuscation and isolation throughout their networks. This approach applies to sensors and IoT devices, controllers in connected equipment, and at all gateway and bridge points to expand the ability to monitor their equipment and network in real-time.

Hear from Patrick Quirk, Vice President and General Manager of the Management Systems Group at Vertiv, on how the detect-and-respond security model works, and why a distributed platform provides the most holistic view into the health and status of all IT equipment. 

Patrick Quirk, Vice President and General Manager of Management Systems at Vertiv

One of the most important considerations for any organization’s IT systems is the protection and security of data and infrastructure. For decades, the model has been like an old fortress: Build a giant wall and moat, and try to keep everything out. The traditional networking firewall followed this approach — catch all the threats before breach, even if it requires using multiple firewalls in combination.

But breaches happen, and firewalls cannot detect threats from within the network. The explosion of connected devices, edge locations and network traffic brought with it new ways to breach the fortress. No longer can one firewall withstand the advanced nature of the modern-day hacker. Plus, the sheer volume of touchpoints and their location at the edge of the network creates even more opportunities for attacks. To keep up, companies must change their tactics and move from the firewalled fortress to enabling real-time detect-and-respond security practices when breaches occur. Make every effort to prevent the attack, but accept and understand that some threats may get through. Organizations should arm themselves with the best tools to quickly identify when and where issues occur, isolate them, and resolve them as quickly as possible.

The detect-and-respond security model requires organizations to build capabilities from the lowest levels and deploy solutions that can distribute the detection, obfuscation and isolation throughout their networks. This approach applies to sensors and IoT devices, controllers in connected equipment, and at all gateway and bridge points to expand the ability to monitor their equipment and network in real-time. With a distributed platform that provides a holistic view into the health and status of all equipment, organizations gain visibility and access to real-time data, while providing the infrastructure to isolate identified security breaches and vulnerabilities. Remember: In today’s IT ecosystem, this cannot be limited to traditional data centers. The push to the edge creates a bigger threat for attack, and visibility into edge locations is critical.

By employing a distributed security model that can, in the future, leverage machine learning and artificial intelligence, organizations will be better equipped for emerging threats.

Remote monitoring and management is critical in edge environments, but it’s only the beginning. Even well-connected organizations often lack physical resources and trained IT personnel on location at every edge deployment. Organizations need tools that allow them to detect, isolate, and respond, whether the problem is security related or an operational failure. The ability to diagnose and solve issues remotely or dispatch service teams – well prepared and equipped thanks to accurate data and situational details – is critical to successful resolution.

By employing a distributed security model that can, in the future, leverage machine learning and artificial intelligence, organizations will be better equipped for emerging threats. Cloud-based tools and data aggregation will evolve to incorporate threat patterns identified by the distributed security nodes and inoculate the connected community from the threat before it spreads.

Patrick Quirk is Vice President and General Manager of the Management Systems Group at Vertiv, leading strategic direction, operation and financial performance of digital  intelligence solutions.

About the Author

Voices of the Industry

Our Voice of the Industry feature showcases guest articles on thought leadership from sponsors of Data Center Frontier. For more information, see our Voices of the Industry description and guidelines.

Sponsored Recommendations

A better approach to boost data center capacity – Supply capacity agreements

Explore a transformative approach to data center capacity planning with insights on supply capacity agreements, addressing the impact of COVID-19, the AI race, and the evolving...

How Modernizing Aging Data Center Infrastructure Improves Sustainability

Explore the path to improved sustainability in data centers by modernizing aging infrastructure, uncovering challenges, three effective approaches, and specific examples outlined...

How Modern DCIM Helps Multi-Tenant Colocation Data Centers Be More Competitive

Discover the transformative impact of modern DCIM software on multi-tenant colocation data centers, enhancing competitiveness through improved resiliency, security, environmental...

3 Steps to Calculate Total Enterprise IT Energy Consumption Using DCIM

Embark on a simplified journey to measure and reduce the environmental impact of your enterprise IT with our practical guide, outlining a straightforward 3-step framework using...

Sashkin/Shutterstock.com

Unpacking CDU Motors: It’s Not Just About Redundancy

Matt Archibald, Director of Technical Architecture at nVent, explores methods for controlling coolant distribution units (CDU), the "heart" of the liquid cooling system.

White Papers

Get this interactive report on How Edge Simplifies Digital Transformation

The Cloud is Better at the Edge

March 3, 2021
This white paper explains how edge computing helps to solve many of the challenges associated with using the cloud for your digital transformation strategy.