Organizations are spending on cybersecurity, but threat vectors continue to outpace corporate outlay. As noted by Tech Genix, 2019 will see a rise in everything from cryptojacking attacks and supply chain compromises, to the misuse of biometric data and malicious use of artificial intelligence (AI) to hack corporate networks. Businesses need a better approach to handle new infosec challenges. Enter unified threat management (UTM).

What exactly is UTM? And how does better threat management help address the concerns of complexity, compromise and cybersecurity response? Here’s what you need to know about the future of effective information security.

What Is Threat Management?

Threat management is exactly what it sounds like: policies, procedures and system processes that help manage, mitigate and respond to network threats. Organizations have been deploying threat management solutions for years — including antivirus, firewall, spam filtering and intrusion detection systems — to reduce overall network risk.

The challenge is that as IT environments rapidly scale up thanks to mobile and cloud-based technology, potential attack surfaces scale exponentially. This means organizations can’t just address current threats; they must keep one eye on the hacker horizon to help predict what comes next — and how to stop it.

Given the increasing speed of data creation, complexity of IT environments, growing skills gap and limitations of current threat management methods, many organizations struggle to secure systems in what amounts to a 360-degree threat cycle. Blurred lines between public, private and hybrid resources mean threats can come from any direction, at any time and targeting any system.

To address the changing threat landscape, a new class of defense mechanisms has emerged: unified threat management solutions. Deployed as software or hardware resources, advanced UTM solutions combine the common threat management techniques listed above while also making room for emerging technologies, such as AI and automation.

Let’s break it down: What’s holding your enterprise infosec back? Why do you need UTM? What problems can it solve for your organization?

The Complexity Compromise

Security expert Bruce Schneier said it best 20 years ago in his essay, “A Plea for Simplicity“: “The worst enemy of security is complexity.” But what’s causing increased security complexity? And why is it so problematic for enterprises?

Answering the first question is easy: digital transformation. As noted by Gartner, almost 90 percent of organizations now have some type of digital transformation initiative in progress to help improve current products and services. The problem is that there’s no road map for effective transformation, and in a digital-first market where speed grants a critical competitive advantage, companies are adopting multiple solutions simultaneously — from public cloud deployments, to big data collection solutions, to end user analytics tools — forcing them to also adopt multiple security controls in an effort to keep pace. The result is a fractured, complex environment that rapidly becomes difficult (or impossible) to protect.

This is the critical problem of complexity: The more complex your IT environment, the more difficult it becomes to implement cybersecurity techniques such as effective data protection or real-time visibility. In effect, excessively complex environments provide security shade for attackers, allowing them to fly under threat management solutions even as IT professionals look to bolster existing defenses.

One solution is multivendor security collaboration that drives true UTM. Much like the infancy of cloud computing, interoperability of security vendors and offerings has been limited for the past several years as solutions diversify and enterprises develop security best practices. But as the market has begun to standardize, multipartner threat management vendors with solutions that meet NIST’s Cybersecurity Framework benchmarks have emerged to help reduce total complexity and boost overall network security.

Put simply, collaboration is the complexity cure of the future.

I Get Knocked Down (But I Get Up Again)

Threat prevention and detection are critical, but what happens when malicious actors break through corporate systems. If isn’t the question, but when. From large retailers, to government agencies, to cryptocurrency firms, internet service providers (ISPs) and security vendors, no business or sector is safe from potential compromise. Most enterprises understandably put IT emphasis on finding and stopping threats before they cause major network issues, but spend minimal time and resources figuring out what happens when they’re figuratively and digitally knocked down. How do they get back up?

The first priority is to start thinking like a hacker. Recognize that no matter your size, industry or the potential value of your data, you’re a target for threat actors. Have a robust security system? You must be protecting something precious. Have minimal security staffing and resources? You’re the perfect place to try out new attacks without the risk of getting caught. Recognizing your risk is the first step toward knowing your enemy — understanding the most common ways malicious actors attempt to compromise your network and developing key countermeasures.

The next step is to build out robust incident response (IR) plans. Define what happens when an incident occurs: What defense mechanisms are activated? Who gets called in? Who’s in charge? What’s your ideal recovery time objective (RTO)? How are threats categorized, minimized and eliminated? Critical here are specificity and repetition. While organizations can’t account for every threat vector, they can define specific processes that activate in response to general threats. Repetition, meanwhile, is essential for effective response; teams should regularly stage both in-house and third-party penetration testing exercises to ensure IR plans are effective against both current and emerging threats.

The addition of UTM solutions to IR plans help IT teams think like threat hunters instead of hapless prey by providing transparency into key security shortcomings and offering actionable insights to build out better security programs.

Stop Whacking Moles With Unified Threat Management

The cybersecurity skills gap is real — and growing. According to Dark Reading, while the number of infosec graduates has increased by 40 percent in the last five years, demand has risen 94 percent as the increasing need for skilled professionals outpaces the uptick in supply.

As a result, IT professionals often spend their time reacting to security events and playing whack-a-mole with emerging incidents as they attempt to land hard hits on big security issues. Here, unified threat management tools offer the potential to deliver three critical outcomes:

  • Priority processing — Not every threat alert demands a threat response. But how do organizations differentiate between must-solve security issues and more run-of-the-mill malicious attacks? Advanced UTM solutions provide the critical analytic capabilities necessary to prioritize threats and ensure IT teams tackle your biggest problems first.
  • Programmatic protection No matter how large or how experienced your IT team, they can’t keep up with the sheer number of threat vectors now emerging to target email accounts, access points and connected devices. Here, AI and automation offer critical advantages: AI can help stop cyberthreats up to 60 times faster than manual processes, while automation helps eliminate repetitive tasks such as data entry and alerting to increase IT response speed.
  • Proactive potential — Reactivity makes organizations easy targets; attackers can get in and out before teams know what hit them. By mastering the art and science of threat hunting, your team can gain the ability to both address threats as they occur and create intelligent hypotheses about what’s on the horizon.

In sum, what is threat management? It is the science of finding and mitigating current attack vectors. Unified threat management, on the other hand, is a set of collaborative, proactive and transparent tools and services that combine science and art to deliver the future of innovative information security.

Learn more about leveling up your threat management capabilities

More from Intelligence & Analytics

BlackCat (ALPHV) Ransomware Levels Up for Stealth, Speed and Exfiltration

9 min read - This blog was made possible through contributions from Kat Metrick, Kevin Henson, Agnes Ramos-Beauchamp, Thanassis Diogos, Diego Matos Martins and Joseph Spero. BlackCat ransomware, which was among the top ransomware families observed by IBM Security X-Force in 2022, according to the 2023 X-Force Threat Intelligence Index, continues to wreak havoc across organizations globally this year. BlackCat (a.k.a. ALPHV) ransomware affiliates' more recent attacks include targeting organizations in the healthcare, government, education, manufacturing and hospitality sectors. Reportedly, several of these incidents resulted…

9 min read

Despite Tech Layoffs, Cybersecurity Positions are Hiring

4 min read - It’s easy to read today’s headlines and think that now isn’t the best time to look for a job in the tech industry. However, that’s not necessarily true. When you read deeper into the stories and numbers, cybersecurity positions are still very much in demand. Cybersecurity professionals are landing jobs every day, and IT professionals from other roles may be able to transfer their skills into cybersecurity relatively easily. As cybersecurity continues to remain a top business priority, organizations will…

4 min read

79% of Cyber Pros Make Decisions Without Threat Intelligence

4 min read - In a recent report, 79% of security pros say they make decisions without adversary insights “at least the majority of the time.” Why aren’t companies effectively leveraging threat intelligence? And does the C-Suite know this is going on? It’s not unusual for attackers to stay concealed within an organization’s computer systems for extended periods of time. And if their methods and behavioral patterns are unfamiliar, they can cause significant harm before the security team even realizes a breach has occurred.…

4 min read

Why People Skills Matter as Much as Industry Experience

4 min read - As the project manager at a large tech company, I always went to Jim when I needed help. While others on my team had more technical expertise, Jim was easy to work with. He explained technical concepts in a way anyone could understand and patiently answered my seemingly endless questions. We spent many hours collaborating and brainstorming ideas about product features as well as new processes for the team. But Jim was especially valuable when I needed help with other…

4 min read