Do you ever wonder what’s happening on your network when you’re not looking? Unauthorized, or rogue, devices gain access and drop off the network before you spot them. Individual users overconsume bandwidth or inadvertently download malware onto their laptops and phones. Botnets and zero-day threats hide on the network for months at a time until the designated time of attack. You can’t be everywhere at once, and even if you could, the network logs generated by a typical network are beyond what even a team of experts could digest – and new data never stops coming!
WatchGuard Dimension is a cloud-ready network security visibility solution that comes standard with WatchGuard’s flagship Unified Threat Management and Next Generation Firewall platform. It provides a suite of big data visibility and reporting tools that instantly identify and distill key security issues and trends, and deliver valuable insights to set meaningful security policies across the network.
WatchGuard Dimension brings big-data visibility to network security, without the associated cost and complexity. By tracking network security threats, issues and trends, it accelerates your ability to eliminate threats, set meaningful security policies across the network, and meet compliance mandates.

What Are Network Blind Spots and How Are They Exploited?

Organizations are struggling to identify threats in a timely and actionable way in large part because they lack the necessary visibility into their environment needed to detect malicious actions. According to a recent report by SANS Institute, while 97% of organizations collect logs, only 44% of these organizations review their logs regularly and only 14% feel confident in their ability to accurately analyze large data sets for security trends.
  • BYOD. The continued adoption of Bring Your Own Device (BYOD) policies adds to this challenge by introducing hordes of unknown mobile devices to your wireless networks. Personal laptops and mobile devices rarely have the same strong endpoint protection that is required at the corporate level. When an employee connects their personal device to your network, it is a risk to the entire company.
  • Shadow IT. Meanwhile, well-intentioned employees may have installed their own server applications or software, such as a webserver, without approval from IT. That employee most likely will not follow best practices in patching regularly to maintain protection against vulnerability exploits.
  • Rogue Wireless Hotspots. Employees may also install unauthorized wireless access points to provide more convenient network access in their office. These rogue access points could allow outsiders to more easily attack your protected network, without even stepping foot inside your building. In more serious attacks, the criminal may install their own rogue access point to maintain access after a physical intrusion.
  • Botnets. In other attacks, botnets may have installed software that is calling home to the Command and Control server using your network. This Command and Control traffic is often disguised as normal web browsing traffic and can be difficult to detect.
Visibility into your network is critical for identifying hidden threats. At a minimum, administrators should establish a baseline of normal network activity and investigate any major deviations from this baseline. WatchGuard Dimension provides this visibility into all network activity with detailed reports and easily reviewed dashboards, allowing IT staff to quickly identify emerging threats.



Template powered by