PERIMETER-BASED DEFENCES
VS. DETECT AND CONTAIN
Businesses traditionally enclose all of their data and devices within
a perimeter, comprised of a combination of firewall, email scanners and web filtering solutions.
This screens everything that comes into the network, then blocks or removes anything that is flagged as malicious. The business should then be able to trust that it will keep out invaders and that all activity within it is safe. But this is no longer the case. If your system is infiltrated, you need a proactive solution to defend it.
Our human immune system is a great metaphor for this: if we’re unlucky enough to fall ill, our white blood cells rush to the rescue and fight off the infection.
This, broadly speaking, is how a containment-based defence system works for your business. It supplements your firewall by quickly identifying and containing ransomware attacks, stopping it from spreading and highlighting affected files for easy recovery.