Continuous Monitoring for the New IT Landscape
Recent breaches have targeted a fatal flaw in the way organizations have approached security over the last two decades. While the focus has been on investing in multiple preventive security technologies—centralized authentication, desktop virus prevention, automated patching, next generation firewalls, sandboxes for zero-day malware, and security event management—adversaries have taken advantage of blind spots that have widened as the IT landscape has evolved. The recent breaches occurred not because of unknown weaknesses in the defensive technologies. They occurred because of gaps in coverage, due to the fact that the defensive technologies were not aligned with any security policy or business practices.