The cloud and mobility have certainly changed IT over the past five years. However, there may be no area of IT that has been impacted more than security. Historically, securing a business was fairly straightforward. For most businesses there was a single ingress/egress point to secure. I’m not saying securing this point in the network was easy, but the architecture was fairly simple.
Cloud and mobility have created numerous points in the network that need to be secured, giving rise to a growing number of threat vectors. This, in turn, has caused organizations to deploy more security tools, creating a more complicated environment. In addition to firewalls, security professionals need a number of inline and out-of-band security tools, including malware, mobile security, IPS, IDS, next-generation firewalls, and the list goes on and on. The challenge with this multi-tier security model is that the effectiveness of these security tools depends on the quality of the data sent to them. Ideally, one would want a consistent set of relevant and accurate data sent to each of the security tools. Achieving this can be challenging, though.