What is Happening?
Chances are, if you aren’t playing Pokemon GO yourself, someone in your family or circle of friends is playing. Right Now. However, security professionals have been playing a similar game for most of their careers, except the stakes are higher. The object of Pokemon GO is to catch as many Pokemon as you can. And how a player finds the Pokemon (characters), is via the display of a user’s phone, with a mix of characters, location maps, and 3D objects within augmented reality.
Just a Game?
With this game, you search for Pokemon (pocket monsters), and it is your job to train the monsters for battle. In the information security world, your IT infrastructure is constantly in battle. The question becomes, how do you catch the monsters within your infrastructure?
In the real world, networks can be far more complex than the roads in Pokemon GO. Security professionals must navigate these complex networks while searching...no hunting for the monsters within. Because in our world and your world, the world of security, the monsters are real. You can zoom out in Pokemon GO to help find monsters. Doing the same on your network is difficult without a tool that can analyze the entire landscape and look for unauthorized changes or threats.
The point is, this isn’t a game. For many of us, this is life.
Security is Reality
Beyond the fact that you might be required to have FIM in place for various compliance drivers such as PCI-DSS, your system security is significantly weaker if you can’t readily identify and deal with IT security threats. Sort of like an augmented reality game. Sound familiar?
Improve your security posture by reducing your exposure to external threats and unauthorized changes that are made internally.
To learn more about how to fight the monsters in your network, click here.
July 13, 2016