{"id":3352,"date":"2013-03-15T09:18:08","date_gmt":"2013-03-15T16:18:08","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=3352"},"modified":"2013-03-21T06:14:07","modified_gmt":"2013-03-21T13:14:07","slug":"moving-away-from-a-swiss-cheese-security-model","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2013\/03\/moving-away-from-a-swiss-cheese-security-model\/","title":{"rendered":"Moving Away from a Swiss Cheese Security Model"},"content":{"rendered":"<p>For the past few months, our team has been hard at work to research and build our latest Application Usage and Threat Report (see more from <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/author\/matt\/\">Matt Keil<\/a> on the report <a href=\"http:\/\/www.paloaltonetwrks.com\/autr\" rel=\"nofollow,noopener\" >here<\/a>, <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2013\/02\/applications-and-threats-analyzed-together\/\">here<\/a> and <a href=\"http:\/\/media.paloaltonetworks.com\/documents\/Application-Usage-and-Risk-Report-Mar2013-regionalfindings.pdf\">here<\/a>). Some of the most interesting data that we uncovered addressed the security of Internet social networking applications:<\/p>\n<ul>\n<li>While most assume social networking applications represent the highest volume of risks, they actually only represented 0.4 percent of all threat logs observed.<\/li>\n<li>Our research also uncovered that 97 percent of all exploits logs were found in ten applications such as internal or infrastructure applications integral to many business functions.<\/li>\n<\/ul>\n<p>This research suggests that the old network security model of \u201chard and crunchy on the outside, soft and gooey on the inside\u201d (shore up your perimeter defenses with firewalls and you\u2019re good-to-go) is no longer sufficient. With internal threats dominant on a network, security must sharply focus on data center applications and the monitoring of internal traffic.<\/p>\n<p>If you\u2019d like to learn more about the best practices to secure data center applications, check out my latest <a href=\"http:\/\/www.securityweek.com\/moving-away-swiss-cheese-security-model-data-center\" rel=\"nofollow,noopener\" >SecurityWeek article<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For the past few months, our team has been hard at work to research and build our latest Application Usage and Threat Report (see more from Matt Keil on the report here, &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[75],"tags":[31,124,12],"coauthors":[771],"class_list":["post-3352","post","type-post","status-publish","format-standard","hentry","category-data-center-2","tag-application-control","tag-application-usage-threat-report","tag-data-center"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3352","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=3352"}],"version-history":[{"count":10,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3352\/revisions"}],"predecessor-version":[{"id":3363,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3352\/revisions\/3363"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=3352"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=3352"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=3352"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=3352"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}