8 Reasons You Need a Security Penetration Test

...

To help you optimize security as you cope with complexity, InformationWeek is offering you an excl

One of the biggest challenges in IT security is determining whether the tools and configurations you have in place are giving your organization the level of security you require. Here's how penetration testing can help.

The IT security landscape is a complex maze of technologies, architectures and policies which can be incredibly difficult to navigate. A defense-in-depth strategy consists of any number of security tools working in conjunction to form an overall security posture. One of the biggest challenges is determining whether the tools and configurations you have in place are giving your organization the level of security you require. A penetration test, or pen test, is one way to accomplish this.

The Pentagon recently brought in white-hat hackers through a bounty penetration testing program to help it identify more than 100 security vulnerabilities in its systems. Individuals who could find security problems on Pentagon systems could be awarded up to $15,000 each. Approximately 1,400 hackers participated. It might sound like a lot, but considering the amount of damage security breaches cause these days, it's peanuts compared to letting black hat hackers breach your organization.

Part of a solid data security strategy is understanding what your weaknesses are and dedicating the right tools and resources to properly shore up any vulnerabilities. It's an endless game of cat and mouse that requires a unique look from the outside-in. This is why penetration tests are so valuable.

[ DevOps and Agile aren't synonyms. It pays to know the difference. Read Agile Vs. DevOps: 10 Ways They're Different. ]

Instead of implementing a bug bounty pen test program, most companies opt to hire an external firm well-versed in data security to perform penetration tests. These tests can focus on one specific part of an infrastructure, a specific application, or the network as a whole. Focused penetration tests are valuable when implementing a brand new application, cloud service, or other new feature. For most organizations, though, a pen test which validates a wide range of security tools and policies is where the real value of the practice is discovered.

Simply implementing security tools and walking away isn't good enough anymore. Instead, you need to put your tools through the paces of simulated breaches which mimic real-world scenarios. Doing so will help determine the value of each of your security tools, as well as reveal areas of weakness. And finding out where data security needs to be bolstered is incredibly useful for quickly eliminating high-risk areas where breaches can occur.

There are at least eight good reasons why investing in network-wide penetration testing is money well spent. Once you've reviewed these, tell us about your own pen testing strategy. Is this a practice your organization regularly undertakes? Is it something you've tried and decided you didn't need? Do you focus on a single app or service, or do you apply pen testing across a wide range of security tools? We want to hear from you in the comments section below.

Categories
APPLICATIONS
0 Comment

Leave a Reply

Captcha image


RELATED BY

  • 5300c769af79e

    The Weather Company Brings Together Forecasting And IoT

    The Weather Company estimates that weather is perhaps the single largest external factor affecting business performance, to the tune of nearly $1 trillion lost annually in the US alone.With the rise of the Internet of Things (IoT), The Weather Company has positioned itself to move well beyond its original charter of predicting weather and helping companies make better decisions based on weather predictions.
  • 5300c769af79e

    Best Buy Slips Details of ASUS Chromebook Flip 2, Unveiling Likely Set for CES

    Likely scheduled to debut at CES next week, the Flip 2 looks like a very nice successor to one of ASUS’s more popular Chrome OS options.Before being pulled on Best Buy, the listing detailed a 12.
  • 5300c769af79e

    Poll: Where Are You Spending Your IT Dollars In 2017?

    Despite enterprises spending more money annually on cybersecurity defense than ever before, the nu We want to know about your top IT spending priorities for the year ahead.Last week, Gartner released its list of strategic tech trends for 2017 and highlighted CIO priorities for the year ahead.
  • 5300c769af79e

    The 10 'Perks' IT Workers Want Most

    Demand for IT workers continues to outpace supply, meaning that employers face stiff competition when it comes to attracting talent.In order to appeal to job seekers, some companies offer exceptional or unusual perks, like nap rooms, on-site spas or free dry cleaning.