• About Us
  • Partnership Opportunities
  • Privacy Policy

Data Center Frontier

Charting the future of data centers and cloud computing.

  • Cloud
    • Hyperscale
  • Colo
    • Site Selection
    • Interconnection
  • Energy
    • Sustainability
  • Cooling
  • Technology
    • Internet of Things
    • AI & Machine Learning
    • Edge Computing
    • Virtual Reality
    • Autonomous Cars
    • 5G Wireless
    • Satellites
  • Design
    • Servers
    • Storage
    • Network
  • Voices
  • Podcast
  • White Papers
  • Resources
    • COVID-19
    • Events
    • Newsletter
    • Companies
    • Data Center 101
  • Jobs
You are here: Home / Voices of the Industry / The New Security Model for IT: Detect and Respond

The New Security Model for IT: Detect and Respond

By Voices of the Industry - November 15, 2018

The New Security Model for IT: Detect and Respond

By employing a distributed security model that can, in the future, leverage machine learning and artificial intelligence, organizations will be better equipped for emerging threats. (Photo: Vertiv)

LinkedinTwitterFacebookSubscribe
Mail

Hear from Patrick Quirk, Vice President and General Manager of the Management Systems Group at Vertiv, on how the detect-and-respond security model works, and why a distributed platform provides the most holistic view into the health and status of all IT equipment. 

security model

Patrick Quirk, Vice President and General Manager of Management Systems at Vertiv

One of the most important considerations for any organization’s IT systems is the protection and security of data and infrastructure. For decades, the model has been like an old fortress: Build a giant wall and moat, and try to keep everything out. The traditional networking firewall followed this approach — catch all the threats before breach, even if it requires using multiple firewalls in combination.

But breaches happen, and firewalls cannot detect threats from within the network. The explosion of connected devices, edge locations and network traffic brought with it new ways to breach the fortress. No longer can one firewall withstand the advanced nature of the modern-day hacker. Plus, the sheer volume of touchpoints and their location at the edge of the network creates even more opportunities for attacks. To keep up, companies must change their tactics and move from the firewalled fortress to enabling real-time detect-and-respond security practices when breaches occur. Make every effort to prevent the attack, but accept and understand that some threats may get through. Organizations should arm themselves with the best tools to quickly identify when and where issues occur, isolate them, and resolve them as quickly as possible.

The detect-and-respond security model requires organizations to build capabilities from the lowest levels and deploy solutions that can distribute the detection, obfuscation and isolation throughout their networks. This approach applies to sensors and IoT devices, controllers in connected equipment, and at all gateway and bridge points to expand the ability to monitor their equipment and network in real-time. With a distributed platform that provides a holistic view into the health and status of all equipment, organizations gain visibility and access to real-time data, while providing the infrastructure to isolate identified security breaches and vulnerabilities. Remember: In today’s IT ecosystem, this cannot be limited to traditional data centers. The push to the edge creates a bigger threat for attack, and visibility into edge locations is critical.

By employing a distributed security model that can, in the future, leverage machine learning and artificial intelligence, organizations will be better equipped for emerging threats.

Remote monitoring and management is critical in edge environments, but it’s only the beginning. Even well-connected organizations often lack physical resources and trained IT personnel on location at every edge deployment. Organizations need tools that allow them to detect, isolate, and respond, whether the problem is security related or an operational failure. The ability to diagnose and solve issues remotely or dispatch service teams – well prepared and equipped thanks to accurate data and situational details – is critical to successful resolution.

By employing a distributed security model that can, in the future, leverage machine learning and artificial intelligence, organizations will be better equipped for emerging threats. Cloud-based tools and data aggregation will evolve to incorporate threat patterns identified by the distributed security nodes and inoculate the connected community from the threat before it spreads.

Patrick Quirk is Vice President and General Manager of the Management Systems Group at Vertiv, leading strategic direction, operation and financial performance of digital  intelligence solutions.

LinkedinTwitterFacebookSubscribe
Mail

Tagged With: cyberattack, cybersecurity, security model, Vertiv

Newsletters

Stay informed: Get our weekly updates!

Are you a new reader? Follow Data Center Frontier on Twitter or Facebook.
voices@richmiller.biz'

About Voices of the Industry

Our Voice of the Industry feature showcases guest articles on thought leadership from sponsors of Data Center Frontier. For more information, see our Voices of the Industry description and guidelines..

  • Facebook
  • Instagram
  • LinkedIn
  • Pinterest
  • Twitter

Voices of the Industry

Building an Enduring World Begins with Accountability and Defining an Approach for Long-term Success

Building an Enduring World Begins with Accountability and Defining an Approach for Long-term Success TJ Faze, Head of ESG Strategy and Engagement at Vertiv, outlines the company's learnings around its recent ESG efforts.

White Papers

Cloud computing

Intel MCA+MFP Helps JD Stable and Efficient Cloud Services

A new white paper from Intel explores how Intel MCA Recovery  + MFP has helped JD Cloud provide efficient and stable services to their more than 2,500 partners.

Get this PDF emailed to you.

We always respect your privacy and we never sell or rent our list to third parties. By downloading this White Paper you are agreeing to our terms of service. You can opt out at any time.

DCF Spotlight

Data center modules on display at the recent Edge Congress conference in Austin, Texas. (Photo: Rich Miller)

Edge Computing is Poised to Remake the Data Center Landscape

Data center leaders are investing in edge computing and edge solutions and actively looking at new ways to deploy edge capacity to support evolving business and user requirements.

An aerial view of major facilities in Data Center Alley in Ashburn, Virginia. (Image: Loudoun County)

Northern Virginia Data Center Market: The Focal Point for Cloud Growth

The Northern Virginia data center market is seeing a surge in supply and an even bigger surge in demand. Data Center Frontier explores trends, stats and future expectations for the No. 1 data center market in the country.

See More Spotlight Features

Newsletters

Get the Latest News from Data Center Frontier

Job Listings

RSS Job Openings | Pkaza Critical Facilities Recruiting

  • MEP Coordinator - Data Center Construction - Ashburn, VA
  • Data Center Facility Engineer - Chantilly, VA
  • Data Center Site Operations VP - Seattle, WA
  • Senior Electrical Engineer - Data Center - Denver, CO
  • Senior Estimator - Data Center Construction - Denver, CO

See More Jobs

Data Center 101

Data Center 101: Mastering the Basics of the Data Center Industry

Data Center 101: Mastering the Basics of the Data Center Industry

Data Center Frontier, in partnership with Open Spectrum, brings our readers a series that provides an introductory guidebook to the ins and outs of the data center and colocation industry. Think power systems, cooling, solutions, data center contracts and more. The Data Center 101 Special Report series is directed to those new to the industry, or those of our readers who need to brush up on the basics.

  • Data Center Power
  • Data Center Cooling
  • Strategies for Data Center Location
  • Data Center Pricing Negotiating
  • Cloud Computing

See More Data center 101 Topics

About Us

Charting the future of data centers and cloud computing. We write about what’s next for the Internet, and the innovations that will take us there. We tell the story of the digital economy through the data center facilities that power cloud computing and the people who build them. Read more ...
  • Facebook
  • LinkedIn
  • Pinterest
  • Twitter

About Our Founder

Data Center Frontier is edited by Rich Miller, the data center industry’s most experienced journalist. For more than 20 years, Rich has profiled the key role played by data centers in the Internet revolution. Meet the DCF team.

TOPICS

  • 5G Wireless
  • Cloud
  • Colo
  • Connected Cars
  • Cooling
  • Cornerstone
  • Coronavirus
  • Design
  • Edge Computing
  • Energy
  • Executive Roundtable
  • Featured
  • Finance
  • Hyperscale
  • Interconnection
  • Internet of Things
  • Machine Learning
  • Network
  • Podcast
  • Servers
  • Site Selection
  • Social Business
  • Special Reports
  • Storage
  • Sustainability
  • Videos
  • Virtual Reality
  • Voices of the Industry
  • Webinar
  • White Paper

Copyright Endeavor Business Media© 2022