Cybersecurity Question of the Month: Tools for Increased Efficiency

Posted by Fuel HQ on Jan 2, 2018 11:20:15 AM

We share your responses to the December Cybersecurity Question of the Month
Tuesday, January 2, 2018

Each month, we ask Fuel members to weigh in with their opinions on the Cybersecurity Question of the Month, and we’re sharing their answers here.

Fuel Member Asim Saleem shared his perspective on the most recent Cybersecurity Question of the Month.

As cyber threats become increasingly complex and frequent, it’s essential for cybersecurity professionals to be more agile in detecting and responding to threats.

What techniques or tools have you adopted throughout your career that allow you to be more efficient and effective in your work?

I have worked in various organizations and managed firewalls, proxies and IDM for enterprise-level security. The techniques which I have worked with security and compliance teams is to implement the device compliances, layered security with dedicated firewalls, device security, iOS security, patches, ACL and proxies (mail and web). Organizations may use one or two vendors, or a blend of vendors at L2, L3, L4 security, like Cisco ACL, Pix at enterprise level, Juniper at DC level and BlueCoat/Cisco Iron Port proxies at internet layers. Efficiency depends on how the traffic is routed and scanned with low latency models, as adding more devices, especially security devices, contributes towards increased latency.

About our contributor:

Asim Saleem joined Fuel in 2015. Currently he is Telecom Regional Ops Lead ANZ with GE.  


Check Out Our Next Cybersecurity Question of the Month

Weigh in with your opinions and we'll share your answers on Fuel for Thought. It's an easy, quick way for you to share your expertise and make a contribution to the Fuel community.

Topic: Using Multi-Factor Authentication 

Using two- or multifactor authentication on your Remote Access systems is a must. At any moment in time, millions of user credentials are stolen — credentials that can potentially lead to unauthorized access into your network.

Which tools are you using for a large variety of configurations, and what is your strategy for success?

 

Submit your response

 


Related Reading 

Check out these Fuel blog posts for further reading:

 

Topics: Cybersecurity, Palo Alto Networks, Fuel member, cybersecurity question of the month, cybersecurity tools

Posts by Topic

see all

Subscribe to Blog Updates

Recent Posts

Posts by Topic

see all