{"id":2533,"date":"2020-07-28T09:05:06","date_gmt":"2020-07-28T13:05:06","guid":{"rendered":"https:\/\/zzzptm.com\/wordpress\/?p=2533"},"modified":"2020-07-28T09:05:06","modified_gmt":"2020-07-28T13:05:06","slug":"security-for-all-sizes-integrating-security-solutions","status":"publish","type":"post","link":"https:\/\/zzzptm.com\/wordpress\/?p=2533","title":{"rendered":"Security for All Sizes: Integrating Security Solutions"},"content":{"rendered":"\n<p>The sentence is simple: get all the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/security-solutions\">security solutions<\/a>&nbsp;to work with each other. So how do different sized firms deal with that directive?<\/p>\n\n\n\n<p>At the small company, the good news may be that there are only one or two&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/solutions\">solutions<\/a>&nbsp;to work with. The bad news may be that they&#8217;re&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/small-business\">small business<\/a>&nbsp;solutions that don&#8217;t have full&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/enterprise\">enterprise<\/a>&nbsp;features for integrating with anything. The bad news may also be that the IT person at that small&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/business\">business<\/a>&nbsp;is either a visiting consultant or someone that handles all the IT, from the production line&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/systems\">systems<\/a>&nbsp;on up to ordering replacement&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/ram\">RAM<\/a>&nbsp;for company laptops. Basically, someone that doesn&#8217;t have 100% attention on security.<\/p>\n\n\n\n<p>But let&#8217;s say that the small business IT person wants to do the right thing and be serious about security. She&#8217;s got an&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/antivirus\">antivirus<\/a>&nbsp;program for the PCs and a&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/firewall\">firewall<\/a>&nbsp;for the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/internet\">Internet<\/a>&nbsp;connection. She could stare at firewall&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/logs\">logs<\/a>&nbsp;all day long, or maybe she could spin up a&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/syslog\">syslog<\/a>&nbsp;server. That sounds like it would be both a fun&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/project\">project<\/a>&nbsp;and have a big payoff at the end of the work.<\/p>\n\n\n\n<p>Unless she&#8217;s unfamiliar with Linux. Because that&#8217;s where the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/free\">free<\/a>&nbsp;syslog servers live.&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/linux\">Linux<\/a>&nbsp;is not an intuitive sort of thing, and&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/learning\">learning<\/a>&nbsp;it can be a difficult and frustrating experience. Chances are, if this IT person is dedicated enough to get into Linux, she may have moved on to a better&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/opportunity\">opportunity<\/a>&nbsp;by the time she knows enough to start up a Graylog server.<\/p>\n\n\n\n<p>Now, if she&#8217;s staying with the small company out of sheer loyalty (maybe a family member or other dearly loved one is running the company), she&#8217;s got to learn&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/how-to\">how to<\/a>&nbsp;do&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/greylog\">Greylog<\/a>&nbsp;after that bout with Linux. Once that task is done, she can turn on&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/logging\">logging<\/a>&nbsp;on that firewall and create some rules in Greylog to&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/alert\">alert<\/a>&nbsp;her on specific rule violations or when there are multiple violations of the same rule from a single host&#8230;<\/p>\n\n\n\n<p>&#8230; and then come back the next day to see her inbox swamped with&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/alerts\">alerts<\/a>&nbsp;from the syslog server. Now she&#8217;s in the final phase of&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/implementation\">implementation<\/a>, tuning the alert frequency. After that, she&#8217;s still faced with manually inspecting&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/devices\">devices<\/a>&nbsp;that are generating the most alerts because that anitvirus solution at the small firm doesn&#8217;t have any&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/monitoring-tools\">monitoring tools<\/a>&nbsp;to go with it.<\/p>\n\n\n\n<p>By now, she is master of the firewall, syslog, a&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/fair\">fair<\/a>&nbsp;amount of Linux, and how to find great deals on copier paper and toner. Not wanting to develop her copier paper ordering&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/skills\">skills<\/a>&nbsp;any further, it is quite likely she&#8217;s ready to rationalize away whatever loyalty she has and move on to the next opportunity.<\/p>\n\n\n\n<p>And that&#8217;s the final obstacle for&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/security-solution\">security solution<\/a>&nbsp;integration at small companies. Quite frequently, they can&#8217;t pay enough to keep motivated, skilled professionals on the payroll. They&#8217;ll either have to deal with unmotivated IT people that really don&#8217;t care to stretch their skills or turn to a firm that will place someone onsite 2 or 3 times a week to check on how things are going there. If the previous person set up an alerting system, they&#8217;ll use it. Maybe. But they sure aren&#8217;t going to build one out. That&#8217;s work well above their pay grade.<\/p>\n\n\n\n<p>So we follow our&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/it-pro\">IT pro<\/a>&nbsp;to a medium-sized company. Here, she&#8217;s no longer a department of one. For sure, she&#8217;s no longer dealing with renewing&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/licensing\">licensing<\/a>&nbsp;for everybody&#8217;s softphones. She&#8217;s the security person, alongside the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/network\">network<\/a>&nbsp;person, the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/sysadmin\">sysadmin<\/a>, the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/phone\">phone<\/a>&nbsp;guy, the 3 techs that do&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/operations\">operations<\/a>, and the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/wireless\">wireless<\/a>&nbsp;person. Not bad, am I right? She can specialize now, no&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/question\">question<\/a>&nbsp;about it.<\/p>\n\n\n\n<p>Well, maybe there&#8217;s a few questions about it&#8230;<\/p>\n\n\n\n<p>For example, this medium-sized company has an&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/av\">AV<\/a>&nbsp;system, an&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/ips\">IPS<\/a>&nbsp;here and there, a&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/perimeter\">perimeter<\/a>&nbsp;firewall and a&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/datacenter\">datacenter<\/a>&nbsp;firewall (different&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/vendors\">vendors<\/a>, to boot!), a syslog&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/server-2009\">server<\/a>&nbsp;that is running at the very limits of the &#8220;free&#8221; offering from its&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/vendor\">vendor<\/a>, a&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/proxy\">proxy<\/a>&nbsp;server, and security is also in charge of the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/ipam\">IPAM<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/pam\">PAM<\/a>&nbsp;systems. There&#8217;s a good chance that our IT pro may not have heard of either IPAM or PAM and may even make the mistake of thinking they&#8217;re the same thing. But she&#8217;s on top of things and learns the difference between&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/ip-address\">IP Address<\/a>&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/management\">Management<\/a>&nbsp;and Privileged&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/account-management\">Account Management<\/a>, and all seems well, except for the fact that she has to ramp up on 6 different technologies. There won&#8217;t be any integration until that happens.<\/p>\n\n\n\n<p>As she&#8217;s ramping up on those techs, she&#8217;s also responsible for supporting them. That means lots of explaining to&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/users\">users<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/developers\">developers<\/a>&nbsp;why this security system or that one isn&#8217;t interfering with their application&#8217;s performance. She even posts this image in her cubicle and points to it as she sees a user or&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/developer\">developer<\/a>&nbsp;walk up:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/res.cloudinary.com\/peerlyst\/image\/upload\/c_limit,dpr_2.0,f_auto,fl_lossy,h_387,q_auto,w_400\/v1\/post-attachments\/not_the_firewall_tjkodb\" alt=\"\"\/><\/figure>\n\n\n\n<p>(On a personal note, I&#8217;ve used that image. It has yet to prove my case to a developer out of hand, but it does help to set the tone of the discussion to encourage the dev to look for other reasons why the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/app\">app<\/a>&nbsp;isn&#8217;t working.)<\/p>\n\n\n\n<p>While that helps with the firewall questions (see my personal note), it does nothing for the constant requests to exempt websites from the proxy filter. She&#8217;s barely got enough time to read&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/product\">product<\/a>&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/documentation\">documentation<\/a>, so when is she going to find time to integrate those solutions?<\/p>\n\n\n\n<p>Moreover, how does she go about automating actions between the systems? It&#8217;s not like the firewall is built to take direct input from the proxy server. The syslog server seems to be the logical choice as a clearing house of information, but how can it be configured to send commands to one system or another based upon logging info that&#8217;s coming in from another source?<\/p>\n\n\n\n<p>It&#8217;s possible that the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/security-systems\">security systems<\/a>&nbsp;have an&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/api\">API<\/a>&nbsp;that can allow commands to be sent to them. It&#8217;s also quite possible that the systems *don&#8217;t* have an API, or that the API is such that the syslog system can&#8217;t send commands to it. Even if the API is one that the syslog server can interact with, our IT pro would then have to learn how to write code. If she&#8217;s lucky, she can borrow a developer for a day or three to help with the project. If not, then she&#8217;s got a steep learning curve ahead of her if she&#8217;s never really done&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/programming\">programming<\/a>&nbsp;before.<\/p>\n\n\n\n<p>But there&#8217;s also a fair chance that she won&#8217;t have to do all this alone. It&#8217;s entirely possible that the medium-sized firm has enough wherewithal to contract professional&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/services\">services<\/a>&nbsp;from a vendor. If that can be done, then she can stay focused on her day-to-day work while the vendor&#8217;s pro serv person&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/hacks\">hacks<\/a>&nbsp;out the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/code\">code<\/a>&nbsp;and does a knowledge transfer at the end of the engagement.<\/p>\n\n\n\n<p>Now, I need to make a disclaimer here because I am part of a professional services team for a vendor. While someone could accuse me of wanting to feather my own nest, the truth is that, as a customer, I have benefited greatly from vendor professional services. They are definitely worth looking at.<\/p>\n\n\n\n<p>The pro serv route is also available at the large company level. If we have our IT pro start a&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/career\">career<\/a>&nbsp;at a large firm, she&#8217;s going to find that she can specialize more in the technologies she works with each day. This means that, while she gains a deeper knowledge of just 2 or 3 systems, she&#8217;s also no longer connected to *all* the systems. Other people on her team, possibly even other teams entirely, will handle those systems. Integration now means not just mastering the technology, but mastering the political considerations that go with cross-team projects. Will the integration mean one team or the other takes over a technology? If both teams manage the system, which managers are responsible for which functions?<\/p>\n\n\n\n<p>One of the stickiest questions is: will we wind up stretching one product to fill a role that is actually better suited to another product? Added to that one would be: which systems does it make sense to integrate with which other systems? Both of these questions deal with lines of demarcation, where one system ends and another begins. For example, at what point does the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/antivirus-protection\">antivirus protection<\/a>&nbsp;end and the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/vulnerability-scanner\">vulnerability scanner<\/a>&nbsp;responsibility begin? Which has priority over&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/web\">web<\/a>&nbsp;traffic, the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/data-exfiltration\">data exfiltration<\/a>&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/protection\">protection<\/a>&nbsp;or the proxy server?<\/p>\n\n\n\n<p>While any integration at the small or medium sized company was done pretty much as a solo or very small group effort, the large company integration could very well be impossible without a multidisciplinary product team, with an oversight committee made up of about a dozen operational and service-line managers.<\/p>\n\n\n\n<p>Like I said, &#8220;get all the security solutions to work with each other&#8221; is easy to say. Getting progress on that task means understanding the obstacles and then figuring out how to clear them out of the path.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The sentence is simple: get all the&nbsp;security solutions&nbsp;to work with each other. So how do different sized firms deal with that directive? At the small company, the good news may be that there are only one or two&nbsp;solutions&nbsp;to work with. The bad news may be that they&#8217;re&nbsp;small business&nbsp;solutions that don&#8217;t have full&nbsp;enterprise&nbsp;features for integrating with [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-2533","post","type-post","status-publish","format-standard","hentry","category-security"],"_links":{"self":[{"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/2533","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2533"}],"version-history":[{"count":1,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/2533\/revisions"}],"predecessor-version":[{"id":2534,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/2533\/revisions\/2534"}],"wp:attachment":[{"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2533"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2533"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2533"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}