Key Takeaways: Gartner Security and Risk Management Summit

Cybersecurity is on everybody’s mind these days, and people are beginning to realize that traditional security is simply not enough.

It appears as though people are beginning to think outside the box for different ways to protect themselves, including the experts who are searching far and wide for the right solution. At our recent visit to Gartner Security and Risk Management Summit 2018, we gained some key insights into how the approach to cybersecurity is evolving:

Nothing is a cure-all

The concept of a multi-layered cybersecurity strategy isn’t new, but there’s an air of “status quo” coming from too many companies’ multi-layered strategies lately. It’s why, when vulnerabilities like Meltdown and Spectre were discovered, a world’s worth of cybersecurity professionals entered a state of alarm. Deep down, everyone knew despite their many expensive layers of cybersecurity, there were – and still are – holes.

At Gartner, organizations showed they’re now approaching security in a more thorough way than the previous “as secure as the other guy” mentality. As Ozzie Nelson, BlueCat’s VP of Government Sales put it,

“Pretty much everyone we spoke to already had a layered security strategy but they all seemed to be looking to understand where there could be gaps, or find complementary solutions to what they already had.”

It’s why BlueCat’s DNS Edge product was so popular at the event. A favorite feature about Edge with our customers is that it enables cybersecurity teams to monitor entire corporate networks, to quicker detect anomalous activity. It also distils what is typically an unusable amount of DNS activity logs into useable, actionable information for not only incident response teams but for anyone invested in keeping internal data safe.

(P.S. You can learn how DNS Edge works here.)

Leaders are re-evaluating their security stack

No organization is perfect, but doing nothing about it means you’re a sitting duck in a virtual pond. Cybersecurity executives know this, and it’s why we saw many attendees at Gartner revising the strategic elements of their multi-layered security stack. It’s a sign enterprises are actively looking to fortify their cybersecurity postures.

Now, while helping organizations take fuller stock of their cybersecurity arsenal at GartnerSec, we found many leave their DNS an unmonitored hallway for threats to wander freely and undetected. That said, the questions that we were asked this week give us a lot of hope for the direction in which cybersecurity attitudes are heading. According to another BlueCat in attendance, Darren McPhee, Director Product Marketing,

“People seemed to get the idea of the value of DNS from a security perspective, but when you show them the granularity of visibility and the level of control we can provide, you could see some lightbulb moments.”

It’s very encouraging to see the shift in thinking towards leveraging DNS to help fortify cybersecurity posture; a proper, well-rounded approach will be the ideal defense against a magnitude of threats.

Even the best and brightest still have a lot to learn, but no time to learn it

Given that security evolves so darn fast, even cybersecurity’s best and brightest are finding themselves hanging on the edge of their seats (no pun intended). We had many incredibly qualified security experts stopping by our booth, prepared with questions that dug into the details of how DNS Edge helps with cybersecurity. Everyone that visited was ready to jump right into a Q&A about everything DNS, and we were there to deliver.

We often found ourselves explaining, and creating even more lightbulb moments as a result, that Edge gives organizations the control to reduce their attack surface by giving IT Ops and Security Architects the ability to enforce specific policies to control access to sensitive data. To further that, Edge’s smart analytics detect data exfiltration on networks, which it’s able to block before that data gets out. Should a breach occur, Edge’s full-network visibility also helps reduce response time by tracking a threat’s spread to other clients and data sources that need to be immediately be looked into.

So, what did we learn?

Overall, it’s pretty clear the intersection of DNS with cybersecurity was a hot topic at Gartner 2018 – and we think this is an awesome pathway towards the future. Organizations are aware of their need to get ahead of breaches and limit access to their network, and they’re now seeing the potential of using DNS data to investigate a breach. DNS is able to provide the answers to what’s going on both internally and externally on the network, while also reducing the amount of time it takes to remediate a breach. If you want to learn more about DNS Security, please take a look at BlueCat DNS Edge.

An avatar of the author

Hilary has worked as a copywriter in digital advertising and the FinTech startup world. She is now working as a Digital Copywriter at BlueCat and learning more every day.

Related content

Detect anomalies and CVE risks with Infrastructure Assurance 8.4 

The Infrastructure Assurance 8.4 release features an anomaly detection engine for outliers and a CVE analysis engine to uncover device vulnerabilities.

Read more

Get fast, resilient, and flexible DDI management with Integrity 9.6

With Integrity 9.6, network admins can get support for new DNS record types, architect and configure multi-primary DNS, and automate IP assignments.

Read more

Deepen your security insight with Infrastructure Assurance 8.3

BlueCat Infrastructure Assurance 8.3, with an enhanced analytics dashboard, including interactive widgets and top 10 alerts, is now available.

Read more

Security, automation, cloud integration keys to DDI solution success

Only 40% of enterprises believe they are fully successful with their DDI solution. Learn how to find greater success with new research from EMA and BlueCat.

Read more

Our commitment to Micetro customers and product investment

From CEO Stephen Devito, a word on BlueCat’s ongoing commitment to supporting Micetro customers and Micetro’s evolution as a network management tool.

Read more

Seven reasons to rethink firewall monitoring and boost automation 

With BlueCat Infrastructure Assurance, you can better protect your network with automated alerts and suggested remedies for hidden issues in your firewalls.

Read more