Column Control DTX

Quick Tips on Security Resilience

Application Notes

While everyone knows that a security breach is a bad thing, many people do not understand that there are two ways to strengthen your network security. The first choice is to create multiple defenses against different types of threats. Unfortunately, you cannot defend against every threat. A second approach, security resilience, is a complementary approach to defensive security which addresses a security threat once it is inside the network.

Resilience, according to the Merriam-Webster dictionary, means “the ability of something to return to its original shape after it has been pulled, stretched, pressed, bent, etc.” From a network security perspective, resilience refers to the ability of an IT network to recover to normal, steady state operations after a security attack and breach have occurred. The resilience concept encompasses three components: information security, business continuity, and network/organizational resilience.

Security resilience focuses on “after breach” activities. The reason for focusing on this strategy is simple — you want to reduce costs. These activities, if done right, will help you reduce the costs of a breach either directly by limiting the data stolen, or by decreasing the financial amount of each fine incurred, and in turn, minimizing bad publicity.

×

Please have a salesperson contact me.

*Indicates required field

Preferred method of communication? *Required Field
Preferred method of communication? Change email?
Preferred method of communication?

By clicking the button, you are providing Keysight with your personal data. See the Keysight Privacy Statement for information on how we use this data.

Thank you.

A sales representative will contact you soon.

Column Control DTX