Scott Stevens, SVP, Global Systems Engineering at Palo Alto Networks, talks with Jeff Frick at RSA 2019 from the Forescout booth in Moscone North in San Francisco, CA.
Attack scale dictates ‘zero-trust’ cybersecurity approach for Palo Alto Networks
https://siliconangle.com/2019/03/11/attack-scale-dictates-zero-trust-cybersecurity-approach-for-palo-alto-networks-rsac/
Just how significant is the threat activity by malicious actors against the global cybercommunity? One major cybersecurity company offers a hint of the current level of attacks.
“We find 20,00 to 30,000 brand new pieces of malware every day,” said Scott Stevens (pictured), senior vice president of worldwide systems engineering at Palo Alto Networks Inc., which employs artificial intelligence and machine learning to analyze activity and take action. “Once we know, within five minutes we’re updating the security posture for all of our connected security devices globally. We’re updating all of our signatures so that the unknown is now known and the known can be blocked.”
Stevens spoke with Jeff Frick (@JeffFrick), host of theCUBE, SiliconANGLE Media’s mobile livestreaming studio, during the RSA Conference in San Francisco. They discussed the architectural approach behind a “zero-trust” strategy and the importance of device and identity enforcement. (* Disclosure below.)
Rules for users and traffic
With tens of thousands of new threats bombarding the cyber world on a daily basis, it’s no surprise that Palo Alto Networks has adopted an approach that “never trusts, always verifies.” The key is to implement a “zero-trust” solution with specific rules for users and applications traffic based on protecting the information that is the most critical for running the enterprise.
“If you’ve got a malicious insider or someone who’s logged in with stolen credentials, we can prevent them from doing what they’re not allowed to do,” Stevens said. “It’s an architectural approach to how to secure your network focused on what’s most important. You focus on the data that’s key to your business, and you build your security framework from the data out.”
For this strategy to reach maximum effectiveness, Palo Alto Networks partners with Forescout Technologies Inc. to understand what all the connected devices are in a given business. It then adds information about what each device is and who all the users are attached to that machine.
It’s a complicated strategy, yet essential in the face of a nimble and innovative adversary that just needs access to one of what might be tens of thousands of devices in any given business.
“How do we define what they are and who they are?” Stevens asked. “Forescout has that insight. We take that knowledge that they have, and that turns into identity and device enforcement.”
(* Disclosure: Forescout Technologies Inc. sponsors theCUBE’s coverage of the RSA Conference. Neither Forescout nor other sponsors have editorial control over content on theCUBE or SiliconANGLE.)
#RSAC #Forescout #theCUBE @Forescout Technologies @SiliconANGLE theCUBE @theCUBE @RSA Conference @Palo Alto Networks #PaloAltoNetworks
Forgot Password
Almost there!
We just sent you a verification email. Please verify your account to gain access to
RSA Conference USA 2019 | San Francisco. If you don’t think you received an email check your
spam folder.
Sign in to RSA Conference USA 2019 | San Francisco.
In order to sign in, enter the email address you used to registered for the event. Once completed, you will receive an email with a verification link. Open this link to automatically sign into the site.
Register For RSA Conference USA 2019 | San Francisco
Please fill out the information below. You will recieve an email with a verification link confirming your registration. Click the link to automatically sign into the site.
You’re almost there!
We just sent you a verification email. Please click the verification button in the email. Once your email address is verified, you will have full access to all event content for RSA Conference USA 2019 | San Francisco.
I want my badge and interests to be visible to all attendees.
Checking this box will display your presense on the attendees list, view your profile and allow other attendees to contact you via 1-1 chat. Read the Privacy Policy. At any time, you can choose to disable this preference.
Select your Interests!
add
Upload your photo
Uploading..
OR
Connect via Twitter
Connect via Linkedin
EDIT PASSWORD
Share
Forgot Password
Almost there!
We just sent you a verification email. Please verify your account to gain access to
RSA Conference USA 2019 | San Francisco. If you don’t think you received an email check your
spam folder.
Sign in to RSA Conference USA 2019 | San Francisco.
In order to sign in, enter the email address you used to registered for the event. Once completed, you will receive an email with a verification link. Open this link to automatically sign into the site.
Sign in to gain access to RSA Conference USA 2019 | San Francisco
Please sign in with LinkedIn to continue to RSA Conference USA 2019 | San Francisco. Signing in with LinkedIn ensures a professional environment.
Are you sure you want to remove access rights for this user?
Details
Manage Access
email address
Community Invitation
Scott Stevens, Palo Alto Network | RSA 2019
Scott Stevens, SVP, Global Systems Engineering at Palo Alto Networks, talks with Jeff Frick at RSA 2019 from the Forescout booth in Moscone North in San Francisco, CA.
Attack scale dictates ‘zero-trust’ cybersecurity approach for Palo Alto Networks
https://siliconangle.com/2019/03/11/attack-scale-dictates-zero-trust-cybersecurity-approach-for-palo-alto-networks-rsac/
Just how significant is the threat activity by malicious actors against the global cybercommunity? One major cybersecurity company offers a hint of the current level of attacks.
“We find 20,00 to 30,000 brand new pieces of malware every day,” said Scott Stevens (pictured), senior vice president of worldwide systems engineering at Palo Alto Networks Inc., which employs artificial intelligence and machine learning to analyze activity and take action. “Once we know, within five minutes we’re updating the security posture for all of our connected security devices globally. We’re updating all of our signatures so that the unknown is now known and the known can be blocked.”
Stevens spoke with Jeff Frick (@JeffFrick), host of theCUBE, SiliconANGLE Media’s mobile livestreaming studio, during the RSA Conference in San Francisco. They discussed the architectural approach behind a “zero-trust” strategy and the importance of device and identity enforcement. (* Disclosure below.)
Rules for users and traffic
With tens of thousands of new threats bombarding the cyber world on a daily basis, it’s no surprise that Palo Alto Networks has adopted an approach that “never trusts, always verifies.” The key is to implement a “zero-trust” solution with specific rules for users and applications traffic based on protecting the information that is the most critical for running the enterprise.
“If you’ve got a malicious insider or someone who’s logged in with stolen credentials, we can prevent them from doing what they’re not allowed to do,” Stevens said. “It’s an architectural approach to how to secure your network focused on what’s most important. You focus on the data that’s key to your business, and you build your security framework from the data out.”
For this strategy to reach maximum effectiveness, Palo Alto Networks partners with Forescout Technologies Inc. to understand what all the connected devices are in a given business. It then adds information about what each device is and who all the users are attached to that machine.
It’s a complicated strategy, yet essential in the face of a nimble and innovative adversary that just needs access to one of what might be tens of thousands of devices in any given business.
“How do we define what they are and who they are?” Stevens asked. “Forescout has that insight. We take that knowledge that they have, and that turns into identity and device enforcement.”
(* Disclosure: Forescout Technologies Inc. sponsors theCUBE’s coverage of the RSA Conference. Neither Forescout nor other sponsors have editorial control over content on theCUBE or SiliconANGLE.)
#RSAC #Forescout #theCUBE @Forescout Technologies @SiliconANGLE theCUBE @theCUBE @RSA Conference @Palo Alto Networks #PaloAltoNetworks