sponsored

Network Team Transformation: Enterprises Adapt

Network teams are adapting to security and admin demands to champion policy-driven, automated environments.

istock 646457626
iStock/mapodile

Enterprise Tug of War

There is a battle brewing in many enterprises, as the network and security teams find themselves at loggerheads over who is in control of various aspects of networking infrastructure. It isn’t a surprise why collaboration between the security and network teams has been difficult – the network team wants to ensure every packet gets delivered, while the security team wants to inspect and restrict which packets can be delivered.

Time for Change

There are external pressures coming to bear that exacerbate the problem. The volume, breadth and complexity of demands on infrastructure continues to grow – lines of business need new apps, IT needs to stand up new databases and test environments, and compliance standards such as NIST 800-53 and the Risk Management Framework require constant adjustments. While DNS generates a goldmine of insight, mapping which clients' devices are connecting – and from where, this data is often unavailable to security teams investigating and resolving a security incident, as the data itself may be incomplete or poorly correlated, in part due to growing network complexity. Thus, enterprises increasingly find the need for better collaboration or shared ownership of responsibility and resources related to network and security infrastructure.

What Does Change Mean?

Increasingly, these changes bring a new structure for the IT networking and security organizations, as enterprises realize that networking and security are two sides of the same coin. Key personnel in each of these areas need to cross-train with the other, learn and understand each other’s challenges, and strive to think beyond their former, siloed roles when considering network or security changes. By combining forces rather than playing the blame game, all parties involved can gain an understanding of what tools they can employ to help mitigate issues and prevent potential losses by closing security holes before they can be exploited.

Where to Start

Often overlooked in this strategy is DNS, the most fundamental and taken-for-granted part of enterprise networks. Everyone uses it, everyone needs it, and it is at the heart of both security and network, with over 90 percent of malware using DNS in attacks. By understanding how to best utilize DNS as the powerful tool it is, security can leverage DNS to increase control and investigative visibility, improve compliance posture, and keep regulators and auditors safely at bay.

A collaborative investment into enterprise-class DNS infrastructure can bridge the networking-security gap by providing both teams with automation and custom workflows that improve visibility into all aspects of network traffic, leading to improved control – and heightened security – across applications and users.

About BlueCat

BlueCat is the Enterprise DNS Company™. The largest global enterprises trust BlueCat to provide the foundation for digital transformation strategies such as cloud migration, virtualization and security. Our innovative Enterprise DNS solutions portfolio, comprised of BlueCat DNS Integrity™ and BlueCat DNS Edge™, enables the centralization and automation of DNS services and the ability to leverage valuable DNS data for significantly increased control, compliance and security. For more information, please visit www.bluecatnetworks.com.

Copyright © 2018 IDG Communications, Inc.