{"id":9798,"date":"2015-07-26T22:00:57","date_gmt":"2015-07-27T05:00:57","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=9798"},"modified":"2015-07-24T09:45:04","modified_gmt":"2015-07-24T16:45:04","slug":"how-data-center-threats-are-evolving","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/07\/how-data-center-threats-are-evolving\/","title":{"rendered":"How Data Center Threats are Evolving"},"content":{"rendered":"<p>Cyber attacks are on the rise and the costs to businesses are increasing \u2013 recent estimates show that this could be as much as $USD500,000 and take an average of 24 days to identify and resolve. These figures in isolation make the situation appear dire. But understanding the cyberattack lifecycle before it reaches your data center\u00a0\u2013 how a breach occurs, what happens once it\u2019s in, and even just how long it takes to resolve \u2013 means you\u2019re in the best position possible to prevent a successful attack from taking place at all.<\/p>\n<p>Think about securing your organisation not as a house, with your security at front and back doors, but as a hotel, with security segmented by rooms and access levels. Network segmentation means multiple layers of protection that prevent hackers from moving freely within the network should they break through one layer.<!--more--><\/p>\n<p><iframe loading=\"lazy\" width=\"477\" height=\"1898\" style=\"border: 1px solid #CCC; border-width: 1px; margin-bottom: 5px; max-width: 100%;\" src=\"\/\/www.slideshare.net\/slideshow\/embed_code\/key\/fU0eXleYsQB7UI\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" allowfullscreen=\"allowfullscreen\"> <\/iframe><\/p>\n<div style=\"margin-bottom: 5px;\"><strong> <a title=\"How Datacenter Threats are Evolving Infographic\" href=\"\/\/www.slideshare.net\/PaloAltoNetworks\/datacenter-infographic-final\" rel=\"nofollow,noopener\"  target=\"_blank\">How Datacenter Threats are Evolving Infographic<\/a> <\/strong> from <strong><a href=\"\/\/www.slideshare.net\/PaloAltoNetworks\" rel=\"nofollow,noopener\"  target=\"_blank\">PaloAltoNetworks<\/a><\/strong><\/div>\n<div style=\"margin-bottom: 5px;\"><\/div>\n<div style=\"margin-bottom: 5px;\"><\/div>\n<div style=\"margin-bottom: 5px;\">\n<p>Check out this infographic in other languages:<\/p>\n<ul>\n<li><a href=\"http:\/\/www.slideshare.net\/PaloAltoNetworks\/pan-datacenter-infographicarabic-50710307\" rel=\"nofollow,noopener\"  target=\"_blank\">Arabic<\/a><\/li>\n<li><a href=\"http:\/\/www.slideshare.net\/PaloAltoNetworks\/pan-datacenter-infographicswedish\" rel=\"nofollow,noopener\"  target=\"_blank\">Swedish<\/a><\/li>\n<li><a href=\"http:\/\/www.slideshare.net\/PaloAltoNetworks\/pan-datacenter-infographicdutch\" rel=\"nofollow,noopener\"  target=\"_blank\">Dutch<\/a><\/li>\n<li><a href=\"http:\/\/www.slideshare.net\/PaloAltoNetworks\/pan-datacenter-infographicfrench\" rel=\"nofollow,noopener\"  target=\"_blank\">French<\/a><\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cyber attacks are on the rise and the costs to businesses are increasing \u2013 recent estimates show that this could be as much as $USD500,000 and take an average of 24 days &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,75,108],"tags":[1326,316],"coauthors":[716],"class_list":["post-9798","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-data-center-2","category-threat-prevention-2","tag-cyberattack-lifecycle","tag-infographic"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9798","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=9798"}],"version-history":[{"count":6,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9798\/revisions"}],"predecessor-version":[{"id":9804,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9798\/revisions\/9804"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=9798"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=9798"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=9798"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=9798"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}