- Community Home
- >
- HPE Networking
- >
- Networking
- >
- Combatting ransomware with layered Zero Trust Secu...
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark
- Receive email notifications
- Printer Friendly Page
- Report Inappropriate Content
Combatting ransomware with layered Zero Trust Security
Ransomware is a growing threat to organizations, according to research independently conducted by Enterprise Strategy Group and sponsored by Zerto, a Hewlett Packard Enterprise company.
According to the report, 2023 Ransomware Preparedness: Lighting the Way to Readiness and Mitigation, 75% of organizations experienced ransomware attacks in the last 12 months, with10% facing daily attacks.[i]
46% of organizations experienced ransomware attacks at least monthly—with 11% reporting daily attacks.
“Regardless of whether the attack was successful, the reality is that it’s not a matter of if an attack will occur, but rather when it will strike,” the report stated. “Therefore, it’s crucial to acknowledge that ransomware poses a significant and immediate threat that cannot be ignored, and immediate action must be taken to combat it.”
Ransomware defense can be challenging. Sophisticated and well-funded cybercriminals often target high-profile organizations, conducting surveillance to effectively attack vulnerable users—employees and, more recently, third-party service providers with access to data from many different organizations.[ii] Social engineering and phishing emails (as well as texts and voice contacts) are the most common attack vectors for ransomware.[iii] Once the victim clicks on an infected attachment or link, malware is installed and ransomware can spread.
Defending against ransomware with Zero Trust Security
A good cybersecurity defense strategy starts with user education and threat awareness. When those measures fall short, Zero Trust Security can fill the gaps.
Zero Trust Security models support least-privilege access—restricting user and device access to just the resources needed to do their job or fulfill their function, as long as the subject meets security posture requirements and is not suspected of compromise.
Note that Zero Trust is a security paradigm—not a single product. In fact, the role-based network access controls at the core of Zero Trust are often cobbled together across multiple disparate solutions in a disjointed fashion, requiring manual effort, adding complexity, and increasing risk of inconsistencies.
Five core capabilities form the foundation of Zero Trust Security.
The importance of layered security
A layered Zero Trust Security approach to combatting ransomware involves establishing and continuously monitoring trust across multiple layers—potential attack surfaces and propagation points—of the IT architecture. Zero Trust Security trust mechanisms can be fortified by additional defenses and security services.
As a first step, consider the role the network can play in protecting the organization against ransomware.
- Identify and destroy malware before it takes hold. An employee receives an email with malware cloaked behind a legitimate-looking attachment—the organization is now just one click away from a potentially catastrophic ransomware incident. Organizations need a way to thwart malware-based attacks before they can propagate. HPE Aruba Networking SSE can help with a sandbox feature that enables organizations to test suspicious files in a safe virtual environment and destroy malicious files before they cause damage.
Five core capabilities form the foundation of Zero Trust Security.
Sandbox capabilities from HPE Aruba Networking SSE thwart ransomware attacks by destroying malicious files before they cause damage.[/caption]
- Prevent compromised devices from accessing the network. Should an attack originate via a corporate or BYOD endpoint device, endpoint and extended detection and response (EDR and XDR) systems can analyze and detect anomalous behavior to raise an alert. With HPE Aruba Networking ClearPass, IT teams can define policies that automate network enforcement and response based on threat telemetry data supplied by EDR/XDR solutions within the Aruba 360 Security Exchange. For example, when the EDR/XDR suspects a device is participating in an attack, ClearPass network access control can automatically limit or revoke network access pending further investigation.
- Limit lateral spread of attacks. Over-broad or poorly monitored network access policies can make it easier for attacks to expand throughout the organization. This lateral spread can lead to increased damage, more difficult remediation, and longer data breach response times. To avoid this, try a multi-pronged approach to delivering least-privilege access. For users that do not require corporate network access, HPE Aruba Networking ZTNA delivers least-privilege access to applications, providing a direct, secure path to the applications users need while restricting their access to other parts of the network, reducing potential attack surface. For users and devices on the network, Dynamic Segmentation unifies role-based access and continuous policy enforcement across network infrastructure, ensuring subjects only communicate with destinations consistent with their role, context, and security posture.—This prevents compromised devices from reaching corporate resources and external malware sites.
Given the increasing sophistication of ransomware attacks, not all attacks may be thwarted at the network level. Continuous data protection plays an important part in comprehensive ransomware protection strategies by enabling organizations to manage, protect, recover, and move data and applications across on-premises or cloud destinations. Ransomware resilience solution Zerto detects anomalous encryption activity in real-time, then allows organizations to quickly rewind to a point in time just prior to the infection and restore the unencrypted files and VMs.
As a last line of defense, the Zerto Cyber Resilience Vault—including HPE Aruba Networking switching—uses an ultra-secure Zero Trust architecture to provide an ironclad recovery solution tailored to specific regulatory and compliance requirements.
Protect your organization with Zero Trust Security
Though Cybersecurity Awareness Month may be wrapping up, it’s always a good time to explore how Zero Trust Securitycan protect your organization from threats like ransomware. Check out these resources to learn more.
- Protection against Ransomware and Extraction with IDS/IPS in Edge-to-Cloud Architecture (video)
- Architecting to Protect Against Ransomware (blog)
- Recovering from Ransomware: Before and After (infographic)
- What’s the state of Zero Trust Security? (research)
- Get the facts about Zero Trust Security models (blog)
-----
[i] 2023 Ransomware Preparedness: Lighting the Way to Readiness and Mitigation. Enterprise Strategy Group. September 2023.
[ii] Rundle, J. “Ransomware Comes Back in Vogue for Cybercriminals.” Wall Street Journal Pro Cybersecurity. October 17, 2023.
[iii] Kelley, D. “Top 3 ransomware attack vectors and how to avoid them.” Tech Target. August 2023.
Eve-Marie_Lanza
Eve-Marie Lanza is a Senior Security Solutions Marketing Manager at HPE Aruba Networking, where she leads marketing for Edge-to-Cloud Security solutions. She brings to the role more than 15 years of experience in portfolio and solutions marketing with a focus on enterprise networking and data center technologies. Eve-Marie holds an MBA from the University of California at Davis.
- Back to Blog
- Newer Article
- Older Article
-
AI-Powered
23 -
AI-Powered Networking
22 -
Analytics and Assurance
4 -
Aruba Unplugged
7 -
Cloud
9 -
Corporate
3 -
customer stories
4 -
Data Center
19 -
data center networks
19 -
digital workplace
2 -
Edge
4 -
Enterprise Campus
9 -
Events
5 -
Government
10 -
Healthcare
2 -
Higher Education
2 -
Hospitality
4 -
Industries
1 -
IoT
8 -
Large Public Venue
1 -
Location Services
3 -
Manufacturing
1 -
midsize business
1 -
mobility
17 -
Network as a Service (NaaS)
12 -
Partner Views
4 -
Primary Education
1 -
Retail
1 -
SASE
21 -
SD-WAN
12 -
Security
103 -
small business
1 -
Solutions
7 -
Technical
5 -
Uncategorized
1 -
Wired Wireless WAN
90 -
women in technology
2
- « Previous
- Next »