Security Fabric: A Methodology for Architecting a Secure Future
Work from home, bring your own device, a professional cyber-crime industry, IoT & OT. We all have to face these challenges while fullfilling a zoo of endless requirements. It is complex to keep the overview and the flexibility in our IT security services and the used toolset. Setting up the architecture with the concept of a Security Fabric helps to structure, to optimize and to improve the corporate Cybersecurity approach.
1 Executive Summary
2020 has taught us three things: we have to invest into end-to-end digitalization, we have to invest into a flexible and robust security infrastructure, and we have to be resilient and robust in the way we work. Honestly, is this really something we didn’t know before? KuppingerCole could have written these three statements last year, and 2018, too. So, what leads us to this statement now? In the end only the fact that these gaps were painfully demonstrated to all of us.
Modern and hybrid operating models, Software-as-a-Service, regulatory requirements, working from home, various types of internal and externals users, and the phenomenon of BYOD (bring your own device) are challenges we have to face today. Such challenges are constantly emerging, which demands a flexible approach. These flexible requirements result in many specific sub-solutions for particular problems. This causes the company to have no central overview of which services, which devices, and which applications are used and for what purpose.
To overcome that, a flexible approach and mechanisms to fulfill the changing demand is one of the main challenges for an organization. Setting up an appropriate structure using a Security Fabric is a key factor for success – to keep all your bases covered.