Chances are, if you aren’t playing Pokemon GO yourself, someone in your family or circle of friends is playing. Right Now. However, security professionals have been playing a similar game for most of their career, except the stakes are higher. The object of Pokemon GO is to catch as many of the Pokemon as you can. And how a player finds the Pokemon (characters), is via the display of a user’s phone, with a mix of characters, locations maps, and 3D objects within augmented reality.
With this game, you search for Pokemon (pocket monsters), and it is your job to train the monsters for battle. In the information security world, your IT infrastructure is constantly in the battle. The question becomes, how do you catch the monsters within your infrastructure?
In the real world, networks can be far more complex than the roads in Pokemon GO. Security professionals must nagivate these complex networks while searching...no hunting for the monsters within. Because in our world and your world, the world of security, the monsters are real. You can zoom out in Pokemon GO to help find monsters. Doing the same on your network is difficult without a tool that can analyze the entire landscape and look for unauthorized changes or threats.
The point being, this isn’t a game. For many of us, this is life.
Beyond the fact that you might be required to have FIM in place for various compliance drivers such as PCI-DSS, your system security is significantly weaker if you can’t readily identify and deal with IT security threats. Sort of like an augmented reality game. Sound familiar?
Improve your security posture by reducing your exposure to external threats and unauthorized changes that are made internally.
To learn more about how to fight the monsters in your network, click here.
Since 1999, Jacqueline has written for corporate communications, MarCom agencies, higher education, and worked within the pharmacy, steel and retail industries. Since joining the tech industry, she has found her "home".