Untitled
Untitled
Untitled
by Dan Sullivan
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Cybersecurity Mesh Architecture For Dummies®, Fortinet
Special Edition
Published by
John Wiley & Sons, Inc.
111 River St.
Hoboken, NJ 07030-5774
www.wiley.com
Copyright © 2023 by John Wiley & Sons, Inc., Hoboken, New Jersey
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any
form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise,
except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without
the prior written permission of the Publisher. Requests to the Publisher for permission should be
addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ
07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.
Trademarks: Wiley, For Dummies, the Dummies Man logo, The Dummies Way, Dummies.com,
Making Everything Easier, and related trade dress are trademarks or registered trademarks of
John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not
be used without written permission. Fortinet is a registered trademark of Fortinet, Inc. GARTNER
is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and
internationally and is used herein with permission. All rights reserved. All other trademarks are
the property of their respective owners. John Wiley & Sons, Inc., is not associated with any
product or vendor mentioned in this book.
For general information on our other products and services, or how to create a custom For Dummies
book for your business or organization, please contact our Business Development Department in
the U.S. at 877-409-4177, contact info@dummies.biz, or visit www.wiley.com/go/custompub. For
information about licensing the For Dummies brand for products or services, contact
BrandedRights&Licenses@Wiley.com.
ISBN 978-1-394-16164-5 (pbk); ISBN 978-1-394-16165-2 (ebk)
Publisher’s Acknowledgments
Some of the people who helped bring this book to market include the
following:
Project Manager: Jennifer Bingham Business Development
Acquisitions Editor: Ashely Coffey Representative: Cynthia Tweed
If there is one thing you take away from this book, it should be
that a strong security posture today requires integration of and
collaboration between the many deployed security solutions and
tools. Modern technology stacks are widely distributed and hard
to manage when separated into individual siloes, so integration,
aggregation, and coordination are crucial to a successful security
strategy.
Foolish Assumptions
It’s been said that most assumptions have outlived their useless-
ness, but this book assumes a few things nonetheless! Mainly,
that you’re a chief information officer (CIO), chief informa-
tion security officer (CISO), vice president, architect, engineer,
SOC professional, threat hunter, endpoint security manager,
or administrator working on an enterprise security, networking, or
infrastructure team. As such, this book is written primarily for
technical readers with at least a basic understanding of security
and networking technologies and challenges.
Introduction 1
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Icons Used in This Book
Throughout this book, you will see special icons to call attention
to important information. Here’s what to expect.
This icon explains the jargon beneath the jargon and is the stuff
legends — well, legendary nerds — are made of.
These alerts point out the stuff your mother warned you about
(well, probably not), but they do offer practical advice to help you
avoid potentially costly or frustrating mistakes.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Challenges facing cybersecurity experts
today
Chapter 1
The Dynamic Challenges
of Cybersecurity
T
his chapter looks at the primary concerns of cybersecurity
overall, and how they have shaped common security phi-
losophies seen in organizations today.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Another crucial part of a hardened security ecosystem is proper
access controls. While appropriate access permissions prevent
unauthorized people from accessing sensitive information or
resources, access controls also play an important role in monitor-
ing and logging an entire IT ecosystem.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Well-managed access controls both prevent unauthorized access
to sensitive data and help SecOps teams monitor broader security
concerns.
Email phishing scams are more popular than ever. The increasing
number of staff working from home means personal electronic
devices are more likely to be the targets of corporate-targeting
attacks.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
One Problem, One Solution
In the past, cybersecurity measures have targeted single elements
of the security landscape, creating siloed systems. This method
of securing IT systems involves pinpointing a problem area, such
as the need for a firewall, and using a single solution to fill the
one defense gap. This creates a silo, meaning an organization’s
IT systems will be split into branches of separated visibility and
functionality.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
add up to an intricate web of security risks and, using the silo
philosophy, might seem ready for one problem, one solution
security tools. But the lack of visibility and control is simply too
damaging to a cybersecurity ecosystem considering today’s threat
landscape.
Modern solutions
The last decade has seen the security market answer the call for
integrated solutions. Some early examples of tools that aimed to
simplify security operations were security information and event
management (SIEM) and security orchestration, automation,
and response (SOAR) solutions. Although SIEM and SOAR can be
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
useful solutions, and were important steps forward in IT security
when they came into common use, by themselves they are not
sufficient to defend against modern threats.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» What are distributed systems?
Chapter 2
Understanding Today’s
Security Challenges
T
he modern cybersecurity landscape is complex, varied, and
dynamic. New threat types emerge every year, white hats
and other security professionals find new ways to secure
sensitive data while attackers are on the lookout for new ways to
get around those defenses. There are smart, determined people on
both sides innovating to find the next big security loophole.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Complex Systems and Operations
The increasing breadth of a modern enterprise scale infrastruc-
ture presents new and unique hurdles to cybersecurity opera-
tions. The growing number of edge devices, hybrid cloud systems,
employees that work from home, and more add up to a large,
intricate attack surface that only the most modern security tools
are equipped to handle.
Distributed systems
Almost all large organizations have to face the effects of highly
distributed IT systems, and there is not a one-size-fits-all solu-
tion. Each organization has specific business and operational
needs that have to be met, unique ecosystems that have to be
hardened, and varying resources available to commit to SecOps.
For instance, say your business operations are spread across sev-
eral offices. Each device, network, and on-premises computing
resource or data base would need to be secured. Given the advan-
tages of cloud technologies, it’s likely public clouds would play a
large part in day-to-day operations. For each office, communica-
tions between public clouds and on-premises devices and applica-
tions would need to be secured, visibility and policy enforcement
requirements would increase, and most likely, the volume of data
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
and logs to sift through would increase. All that activity could lead
to detection and response times taking a big hit.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
The Fortinet report also found that 62 percent of organizations
thought cloud misconfiguration was the top security threat when
it comes to public clouds.
Lack of visibility
Traffic and general activity monitoring are key pain points for
security professionals, as they are the ones most often on the
front lines trying to sort through a web of interconnected systems
to find a threat’s source.
There are many modern security tools that make generating log
and monitoring data easy, but analyzing that data is another story.
The first problem is simply the volume of data generated with
SIEM and other solutions. Truly threatening events can get lost in
the haystack of alerts, unusual usage patterns can go unnoticed
due to the overwhelming amount of monitoring data, and security
professionals suffer from burnout trying to sort through the del-
uge of information.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Mean time to detect (MTTD) and mean time to remediate (MTTR)
are important metrics to look at when assessing the effectiveness
of your security systems. SecOps tools and practices will change
over time to meet new threats, but these metrics should follow a
downward slope as time goes on.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Regardless of your SecOps philosophies and methods, staying
agile and having the capability to adapt to new security threats
is a must. New threats emerge every day, attack patterns change,
and security teams should be able to change strategies to meet
these new attacks.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Of course, there are highly skilled security experts out there.
There just aren’t enough of them to fill the many high-skill secu-
rity roles needed in modern enterprises. Unfortunately, there’s
also another issue.
Expertise siloes
The second half of the larger personnel problem is expertise
siloes. This is yet another hurdle brought on by security ecosys-
tem siloes. Splitting networking, endpoint, and database secu-
rity between different teams, each with different area-specific
experts, often means that security staff itself is siloed!
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Overview of the security challenges
CSMA aims to tackle
Chapter 3
The Need for
Cybersecurity Meshes
C
ybersecurity innovations are not just found in new tools
and technologies, but in organizational and architectural
philosophies as well. Event detection and logging, analysis
tools, and playbook management solutions have all come a long
way in the last decade, but the complexity and wide distribution
of today’s attack surface calls for a more integrated approach to
security.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
larger cybersecurity puzzle. However, there is one problem that
most of these tools have in common: They generate a lot of data
and alerts.
Analysis challenges
Sorting through the sheer amount of data isn’t the only issue
presented by the large volumes created by modern security tools.
This data also needs to be analyzed and leveraged to get value out
of your extensive suite of security solutions.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
switch to another tool to start analyzing application logs. At this
point the process of correlating data from network and applica-
tions logs can be slow, tedious, and error prone.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
What Is a Cybersecurity Mesh?
While there will be more detail about what components make up a
security mesh later, for now let’s quickly go over the basics.
Boosting visibility
As discussed in Chapter 2, visibility is about seeing and under-
standing the many parts of a distributed security infrastructure.
CSMA’s integration-centric approach to IT systems increases vis-
ibility by aggregating security data and centralizing detection tool
information. In turn, this aggregation allows security teams to
discern patterns more easily in their data.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Cybersecurity meshes integrate with existing data collection and
threat detection tools by gathering the outputs of these systems
for further processing and analysis. Whether they are firewalls,
identity and access management tools, or endpoint protection
solutions, a properly implemented mesh can gather data from
each of them so that security teams can gain valuable threat
intelligence.
Again, merely seeing the data from each security solution is not
enough. A hardened security infrastructure allows security teams
to better understand the connections between elements.
Reducing complexity
In the case of cybersecurity, increased data aggregation usually
goes hand-in-hand with a reduction in overall complexity. Siloed
security resources are difficult to manage, as each section of an
organization’s security ecosystem will have different operational
upkeep needs, and this kind of structure can separate experts that
should be communicating with one another.
Intelligence sharing
Speaking of the importance of staff expertise, CSMAs also sup-
port more comprehensive threat intelligence and intelligence
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
sharing across an entire security ecosystem and SecOps division.
Siloed security tools and devices are problematic on their own,
but expertise siloes promote wasting one of the most valuable
resources a large organization has: an expert’s time and energy.
Automation
Attacks are progressive and well-coordinated. They also mask
their actions and intents by morphing and adapting their sequence
of events to make it more difficult to detect the attack. Security
professionals are working against the clock and can’t respond to
AI-based attacks in time without AI-powered automation. That
automation has to operate across the security ecosystem to effec-
tively address the risks posed by weaponized AI.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Covering the three basic layers of a mesh
architecture
Chapter 4
Critical Elements of a
Cybersecurity Mesh
Platform
W
hile a security mesh architecture is more of a philoso-
phy than a single security solution, there are common
elements that should be present in any cybersecurity
mesh architecture (CSMA). While the components that make up
the foundation of the mesh, such as existing security tools or
analysis solutions, might be different in each instance, how these
elements are brought together to create an integrated security
ecosystem has a basic structure.
This chapter discusses the three layers of any CSMA, how each
of those layers interacts with the others, how this architecture
contributes to a strong security posture, and how CSMAs, such as
the Fortinet Security Fabric, try to bring these elements together.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
The Three Layers of a
Cybersecurity Mesh
The three layers of a cybersecurity mesh are integration of data,
broad security intelligence, and automated response based on
policies and centralized management. A cybersecurity mesh also
has three characteristics that span layers: they are composable,
distributed, and support collaboration. These three layers and
the common characteristics shared among layers are the keys to
enabling the benefits of a security mesh.
Data integration
The first layer works to incorporate the disparate sources of data
across your security systems into a single line of communica-
tion. Not only does this set up the data for easier analysis and
intelligence mining down the road, it also enables these secu-
rity products to talk to one another, increasing each component’s
flexibility and effectiveness.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Broad security intelligence
The next layer in a CSMA is focused on security data analysis and
threat intelligence. This layer processes the aggregated security
tool data and processes it so that security pros can make informed
policy and management decisions. It also provides a centralized
analytical space for improving the threat analysis capabilities of
your entire security intelligence system.
Automated operations
The third layer aims to streamline policy, posture, and playbook
management. The previous two layers that focused on integration
and analysis aren’t too useful if you can’t control how they work.
The management layer enables security staff to set policies that
determine how and when alerts happen, how their analytics tools
process data, and security goals.
Centralized operations
The CSMA takes everything under it and utilizes dashboards,
operations controls, and visualization tools to bring it all together.
The operations dashboard concentrates on the operational aspects
of cybersecurity. A full cybersecurity mesh operations dashboard
is built over time and should encompass tools for event investi-
gations, event reporting, and various visualization tools. Because
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
meshes promote such comprehensive security data aggregation,
risk score visualizations of the entire security stack can also be
generated using visualization tools in the layer.
A Unifying Architecture
The Fortinet Security Fabric is a cybersecurity mesh platform
that encompasses a wide range of integrated security capabilities
across a broad ecosystem and utilizes artificial intelligence (AI)-
powered automation to improve security postures even in the face
of complex modern threats. Fortinet has worked hard to incorpo-
rate the three core layers of the cybersecurity mesh philosophy to
bring organizations a comprehensive security platform that fits a
range of infrastructure and deployment styles.
Broad
A well implemented cybersecurity mesh needs a base of observa-
tion and analysis tools to collect and process security data across
the entire IT ecosystem. CSMA only works if there is enough data
to confidently abstract the operations of each endpoint, network,
and cloud security solution. This means there must be a broad
range of high-quality security systems in place to support the
higher layers of the security mesh.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
solutions that fit their needs while still benefitting from all the
advantages that a cybersecurity mesh platform brings.
Integrated
Speaking of incorporating distinct security systems, the Fortinet
Security Fabric is bolstered by a centralized operations center, the
Fabric Management Center, which supports both SOC and NOC
use cases. The Fabric Management Center includes a suite of inte-
grated analysis and response solutions that help pull together the
many elements of distributed IT systems. FortiSIEM, FortiSOAR,
and FortiEDR are solutions that all fall under this umbrella, and
each integrates with the security ecosystem to provide threat
intelligence quickly and efficiently to security teams.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
actually defend against a real-world coordinated cyberattack, you
require end-to-end automation — all the way from prevention to
remediation.
Policies for all of these services can be set from a centralized loca-
tion and, when an attack occurs, are executed quickly and con-
sistently. Automated attacks are commonplace at this point, and
organizations will benefit from tools that can match those threats
in speed and efficiency.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Securing work-from-home environments
»» Cloud security
Chapter 5
Putting a Cybersecurity
Mesh Platform into
Practice
A
cybersecurity mesh is a comprehensive approach to pro-
tecting your information assets and infrastructure so it
should come as no surprise that it works in a wide array of
situations. This chapter examines three very different use cases:
work-from-home environments, cloud environments, and oper-
ational technologies environments. Each of these use cases has
distinct security challenges.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
unusual set of circumstances that demanded radically new ways
of working. Many turned to remote work for employees who did
not have to be in specific location for their roles.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
home, coffee shops, planes, and anywhere else a Wi-Fi connec-
tion is available. It is not uncommon to work from a publicly
accessible network. Attackers could find ways to use those net-
works to attack other devices on the network. They could even
spoof users into connecting to a network that looks legitimate but
is controlled by attackers.
Cloud Security
Cloud security is an emerging area of concern for enterprises.
Cloud computing offers significant advantages for many work-
loads and enterprises are rapidly adapting to use these new tech-
nologies. Of course, as with any new technology, comes new ways
of doing things — including developing and managing software.
To help understand some of the distinct security challenges of
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
cloud computing, it can be helpful to review some characteristics
of applications designed specifically for the cloud.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Injection
»» Insecure design
»» Security misconfiguration
»» Vulnerable and outdated components
»» Identification and authentication failures
»» Software and data integrity failures
»» Security logging and monitoring failures
»» Server-side request forgeries
Cybersecurity mesh can help with many of these.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Overview of operational technology
Operational technology has at its core, a collection of industrial
controls systems (ICS). This can be a diverse array of sensors,
monitors, actuators, and other technologies used in industrial
settings.
Operational technology
security practices
Cybersecurity mesh can help with good OT security practices.
These include identifying assets and classifying them. It is par-
ticularly important to prioritize the value of different types of OT
assets. Some will be more important to your business than others.
Knowing which are the most important and securing those should
be a top priority.
You will also want to be able to analyze traffic along with threats
and vulnerabilities. This is similar to the needs of devices on-
premises, in remote work locations, or in the cloud. In all these
cases, security mesh can help significantly reduce the overall risk
to your infrastructure and services.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Looking at the past
Chapter 6
Putting It All Together
C
ybersecurity mesh architectures (CSMAs) provide a power-
ful framework for security infrastructure. Modern threats
are sophisticated and constantly evolving, but there are
many cutting-edge security tools rising to meet that challenge.
CSMA is one of them and aims to integrate an increasingly wide
deployment of company resources and applications.
Looking back to the successful security tools from the last decade
is no longer an option. There are too many attack strategies built
to infiltrate the highly distributed system so common today.
A hardened IT infrastructure doesn’t only need powerful tools,
though. SecOps teams need to be ready to face new challenges and
adapt to the changing state of cybersecurity.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
needs have pushed IT infrastructures into increasingly complex
states. IoT fleets, multiple corporate user devices per employee,
hybrid cloud deployments, and geographically separated offices all
contribute to the trend of widely distributed company resources.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
surfaces less visible to security staff, but the staff themselves can
become separated from one another, missing out on the benefits
of routinely interacting with other experts. An organization’s
SecOps teams are always its greatest security resource, and Sec-
Ops staff will work more effectively when able to freely commu-
nicate with one another.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
The Modern Security Landscape
Is Dynamic
The security landscape has become a fast-paced back and forth
between attackers and IT security professionals. Attack types
fall in and out of fashion, new threats are developed, and secu-
rity experts change configurations and innovate on new defense
methods to meet the challenge.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
about weak points in their own security systems while analyz-
ing threats, but lacking visibility can hinder investigations. The
complexity of modern systems requires easily accessible tools
to conduct thorough post-attack analysis, and a unified security
architecture is often the best way to do that.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Looking Toward the Future
Truly modern security systems are more than just sets of tools
to meet today’s cybersecurity threats. They are collections of
methods and solutions that meet those threats, while allowing
for flexibility in the fact of the ever-changing security landscape.
CSMA enables the creation and maintenance of dynamic security
systems, while also adding powerful integration and aggregation
capabilities that promote a strong security posture.
In this final section, let’s review some of the key points of cyber-
security meshes that make it a strong modern option for hard-
ening your organization’s resources against both old and new
attacks.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Comprehensive scope
Observing security data doesn’t do much good if you can’t do
anything with it, so another critical part of a flexible and efficient
security ecosystem is powerful control capabilities. A CSMA aims
to centralize as many security controls as possible by utilizing the
aggregated data to create comprehensive dashboards and control
consoles.
Automation is key
Security task automation becomes much more powerful when
solutions are integrated into a central control system. Many
cybercriminals are utilizing automation to quickly move through
breached systems and carry out complex attacks on internal
resources. Automated defense tools are important in the cur-
rent landscape and will become even more critical over the next
decade.
While there are other security solutions out there that enable task
automation and leverage machine learning and AI, a mesh archi-
tecture is built with tool integration as a core tenet which allows
for more dynamic configurations and policies.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 7
Ten Things to Remember
about CSMA
C
ybersecurity mesh is an architectural and philosophical
change that will be an asset to your business for many years
to come. Here are ten easily digestible bits of information
that will help you get on the road to incorporating cybersecurity
mesh.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
parts of the adoption plan. Before implementing new security
solutions, think like an attacker. External attack surface manage-
ment tools (EASM) and other methods of switching perspective
can help identify and prioritize vulnerable areas.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Centralize Threat Intelligence
and Analytics
Promoting unified security systems leads to lower detection and
response times, as well as more effective intelligence gathering
and analytics. A security mesh centralizes security system infor-
mation, making threat analysis more efficient. This speeds up
response plan development and leads to a richer understanding of
the cybersecurity landscape.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
skill gap is only widening. Pinpoint where your security teams
lack the most so you can shore up any security deficiencies.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
WILEY END USER LICENSE AGREEMENT
Go to www.wiley.com/go/eula to access Wiley’s ebook EULA.