{"id":67244,"date":"2021-06-19T02:43:16","date_gmt":"2021-06-19T02:43:16","guid":{"rendered":"https:\/\/websitedesigns.com.au\/elankanew\/?p=67244"},"modified":"2021-06-19T02:43:16","modified_gmt":"2021-06-19T02:43:16","slug":"cyber-security-mesh-clusters-of-network-monitoring-redefining-security-by-aditya-abeysinghe","status":"publish","type":"post","link":"https:\/\/websitedesigns.com.au\/elankanew\/cyber-security-mesh-clusters-of-network-monitoring-redefining-security-by-aditya-abeysinghe\/","title":{"rendered":"Cyber security Mesh: Clusters of network monitoring redefining security By Aditya Abeysinghe"},"content":{"rendered":"<h1 style=\"text-align: center;\"><span style=\"color: #003366;\">Cyber security Mesh: Clusters of network monitoring redefining security <span style=\"color: #333399;\">By Aditya Abeysinghe<\/span><\/span><\/h1>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 20px; color: #000000;\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" class=\" wp-image-62338 alignleft\" src=\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2021\/04\/Aditya-Abeysinghe1.jpg\" alt=\"\" width=\"235\" height=\"207\" \/>Conventional network security monitoring involves establishing a security perimeter around all devices of a network. This method has been followed since the kindergarten days of computer networks and is the de facto standard used to monitor and secure most internal networks at present too. While this may sound easy for monitoring and securing devices in a network, the main disadvantage is that if the perimeter is hacked in some way, then the entire network could be vulnerable to attacks. Furthermore, security policies are often imposed at the edge of the network rather than at identity or other access management levels. Cyber security mesh is a concept that addresses these issues by enforcing security at each access point or similar level, thereby clustering these networks into a mesh of networks that are monitored separately.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 20px; color: #000080;\"><strong>Covid-19 and network security<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 20px; color: #000000;\">Cyber security mesh is not a new concept. It has been used in more complex networks that are highly guarded and regularly monitored. However, Covid-19 caused a major change in the manner people use networks. For example, today most people work on a \u201cwork-from-home\u201d method and students study utilizing online classrooms and meetings are conducted online. When working from home, people often login to organizational networks from outside the usual internal network and data is shared between multiple networks. In this manner of working, and studying, this type of changes (deviating from physical face to face to face interactions) have caused many issues in managing the security of networks from hackers who have developed new ways of attacking these systems.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 20px; color: #000000;\">Cyber security mesh has been thus increasingly used in many networks, since the Covid-19 pandemic began as a measure of redefining network policies and permissions to networks. With this architecture, the authorized person is provided access to only the segment that he\/she is required to access.<\/span><\/p>\n<p><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-67245\" src=\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2021\/06\/Cyber-security-Mesh-Clusters-of-network-monitoring-redefining-security.jpg\" alt=\"Cyber security Mesh Clusters of network monitoring redefining security\" width=\"389\" height=\"231\" \/><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 20px; color: #000080;\"><strong>Identity and Access Management<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 20px; color: #000000;\">Identity and access management (IAM) is simply the process of authentication and authorization users based on policies and permissions. The traditional security of a system involves the username and password based approach where the user is authenticated at a logon service such as a database or directory, and then redirected based on the role the user has on a system.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 20px; color: #000000;\">With IAM a user is often grouped into a user category. Instead of providing access level rules on which components are accessible to a user, the access is granted to the user category, so that all users inherit these policies. In this manner, managing identities (people) and access is productive and security efficient. Typically, security in an IAM based system is enhanced with MFA* and SSO*.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 20px; color: #000000;\"><strong>Why is a Cyber security mesh important?<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 20px; color: #000000;\">With new methods of accessing networks remotely, new methods of securing systems as described earlier is required. One of the main issues in IAM in securing systems is the difficulty in identity proofing users. Identity proofing or identity verification is the process of proving that a user is the user that needs to be authenticated. As a hacker can bypass MFA and SSO or other capabilities in IAM, impersonation of users to get authorized to systems is easy given that many processes are operated remotely at present. By using a mesh where the network is divided into segments and then using IAM and other access control mechanisms, even impersonated users have minimal capability of attacking the entire system instead, attacks could be identified in the first defense layer and thereafter, mitigated.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 20px; color: #000000;\">Cyber security mesh is also important to defend networks which span on heterogeneous systems. In these systems, the method of securing data and devices are different, based on factors such as internal policies, technologies used and the architecture of the system. Hence, the security of such type of systems is complex to be maintained when these systems are joined together. Instead, by using a mesh of smaller manageable components, the system could be monitored and managed efficiently.<\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li><span style=\"font-size: 20px; color: #000000;\"><strong>MFA: <\/strong>Multi-Factor Authentication is a method of using more than one method of authentication to a system. For example, a user may be authenticated with a username and password and a one-time password may be required to access critical components of an authorized system.<\/span><\/li>\n<li><span style=\"font-size: 20px; color: #000000;\"><strong>SSO: <\/strong>Single Sign On is a method of authenticating a user once and then providing access to multiple systems without authenticating at each system.<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\">\n<p><span style=\"font-size: 20px; color: #000000;\"><strong>Photo courtesy:<span style=\"color: #003366;\"> <a style=\"color: #003366;\" href=\"https:\/\/www.technorad.com\" target=\"_blank\" rel=\"noopener\">https:\/\/www.technorad.com<\/a>\u00a0 <\/span><\/strong><\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber security Mesh: Clusters of network monitoring redefining security By Aditya Abeysinghe &nbsp; Conventional network security monitoring involves establishing a security perimeter around all devices of a network. This method has been followed since the kindergarten days of computer networks and is the de facto standard used to monitor and secure most internal networks at [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":67245,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"aside","meta":{"footnotes":""},"categories":[33978,20],"tags":[33977,35347,35348,35349],"class_list":{"0":"post-67244","1":"post","2":"type-post","3":"status-publish","4":"format-aside","5":"has-post-thumbnail","7":"category-aditya-abeysinghe","8":"category-articles","9":"tag-aditya-abeysinghe","10":"tag-cyber-security","11":"tag-mfa","12":"tag-sso","13":"post_format-post-format-aside"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.7.1 (Yoast SEO v25.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber security Mesh: Clusters of network monitoring redefining security By Aditya Abeysinghe - eLanka<\/title>\n<meta name=\"description\" content=\"Conventional network security monitoring involves establishing a security perimeter around all devices of a network. This method has been followed since the kindergarten days of computer networks and is the de facto standard used to monitor and secure most internal networks at present too. While this may sound easy for monitoring and securing devices in a network, the main disadvantage is that if the perimeter is hacked in some way, then the entire network could be vulnerable to attacks. Furthermore, security policies are often imposed at the edge of the network rather than at identity or other access management levels. Cyber security mesh is a concept that addresses these issues by enforcing security at each access point or similar level, thereby clustering these networks into a mesh of networks that are monitored separately.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber security Mesh: Clusters of network monitoring redefining security By Aditya Abeysinghe\" \/>\n<meta property=\"og:description\" content=\"Conventional network security monitoring involves establishing a security perimeter around all devices of a network. This method has been followed since the kindergarten days of computer networks and is the de facto standard used to monitor and secure most internal networks at present too. While this may sound easy for monitoring and securing devices in a network, the main disadvantage is that if the perimeter is hacked in some way, then the entire network could be vulnerable to attacks. Furthermore, security policies are often imposed at the edge of the network rather than at identity or other access management levels. Cyber security mesh is a concept that addresses these issues by enforcing security at each access point or similar level, thereby clustering these networks into a mesh of networks that are monitored separately.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/websitedesigns.com.au\/elankanew\/cyber-security-mesh-clusters-of-network-monitoring-redefining-security-by-aditya-abeysinghe\/\" \/>\n<meta property=\"og:site_name\" content=\"eLanka\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/eLanka.com.au\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-19T02:43:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2021\/06\/Cyber-security-Mesh-Clusters-of-network-monitoring-redefining-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"291\" \/>\n\t<meta property=\"og:image:height\" content=\"173\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"eLanka admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"eLanka admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/cyber-security-mesh-clusters-of-network-monitoring-redefining-security-by-aditya-abeysinghe\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/cyber-security-mesh-clusters-of-network-monitoring-redefining-security-by-aditya-abeysinghe\/\"},\"author\":{\"name\":\"eLanka admin\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/person\/f6e635b74ab35ef88a68a9973cacc5bd\"},\"headline\":\"Cyber security Mesh: Clusters of network monitoring redefining security By Aditya Abeysinghe\",\"datePublished\":\"2021-06-19T02:43:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/cyber-security-mesh-clusters-of-network-monitoring-redefining-security-by-aditya-abeysinghe\/\"},\"wordCount\":750,\"publisher\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#organization\"},\"image\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/cyber-security-mesh-clusters-of-network-monitoring-redefining-security-by-aditya-abeysinghe\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2021\/06\/Cyber-security-Mesh-Clusters-of-network-monitoring-redefining-security.jpg\",\"keywords\":[\"Aditya Abeysinghe\",\"Cyber security\",\"MFA\",\"SSO\"],\"articleSection\":[\"Aditya Abeysinghe\",\"Articles\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/cyber-security-mesh-clusters-of-network-monitoring-redefining-security-by-aditya-abeysinghe\/\",\"url\":\"https:\/\/websitedesigns.com.au\/elankanew\/cyber-security-mesh-clusters-of-network-monitoring-redefining-security-by-aditya-abeysinghe\/\",\"name\":\"Cyber security Mesh: Clusters of network monitoring redefining security By Aditya Abeysinghe - eLanka\",\"isPartOf\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/cyber-security-mesh-clusters-of-network-monitoring-redefining-security-by-aditya-abeysinghe\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/cyber-security-mesh-clusters-of-network-monitoring-redefining-security-by-aditya-abeysinghe\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2021\/06\/Cyber-security-Mesh-Clusters-of-network-monitoring-redefining-security.jpg\",\"datePublished\":\"2021-06-19T02:43:16+00:00\",\"description\":\"Conventional network security monitoring involves establishing a security perimeter around all devices of a network. This method has been followed since the kindergarten days of computer networks and is the de facto standard used to monitor and secure most internal networks at present too. While this may sound easy for monitoring and securing devices in a network, the main disadvantage is that if the perimeter is hacked in some way, then the entire network could be vulnerable to attacks. Furthermore, security policies are often imposed at the edge of the network rather than at identity or other access management levels. Cyber security mesh is a concept that addresses these issues by enforcing security at each access point or similar level, thereby clustering these networks into a mesh of networks that are monitored separately.\",\"breadcrumb\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/cyber-security-mesh-clusters-of-network-monitoring-redefining-security-by-aditya-abeysinghe\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/websitedesigns.com.au\/elankanew\/cyber-security-mesh-clusters-of-network-monitoring-redefining-security-by-aditya-abeysinghe\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/cyber-security-mesh-clusters-of-network-monitoring-redefining-security-by-aditya-abeysinghe\/#primaryimage\",\"url\":\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2021\/06\/Cyber-security-Mesh-Clusters-of-network-monitoring-redefining-security.jpg\",\"contentUrl\":\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2021\/06\/Cyber-security-Mesh-Clusters-of-network-monitoring-redefining-security.jpg\",\"width\":291,\"height\":173,\"caption\":\"Cyber security Mesh Clusters of network monitoring redefining security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/cyber-security-mesh-clusters-of-network-monitoring-redefining-security-by-aditya-abeysinghe\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/websitedesigns.com.au\/elankanew\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Articles\",\"item\":\"https:\/\/websitedesigns.com.au\/elankanew\/category\/articles\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber security Mesh: Clusters of network monitoring redefining security By Aditya Abeysinghe\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#website\",\"url\":\"https:\/\/websitedesigns.com.au\/elankanew\/\",\"name\":\"eLanka\",\"description\":\"eLanka - Sri lanka events in Australia\",\"publisher\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/websitedesigns.com.au\/elankanew\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#organization\",\"name\":\"eLanka\",\"url\":\"https:\/\/websitedesigns.com.au\/elankanew\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2020\/03\/elanka-logo.jpg\",\"contentUrl\":\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2020\/03\/elanka-logo.jpg\",\"width\":192,\"height\":82,\"caption\":\"eLanka\"},\"image\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/eLanka.com.au\/\",\"https:\/\/www.linkedin.com\/in\/elanka\/\",\"https:\/\/www.youtube.com\/user\/SriLankanDownUnder\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/person\/f6e635b74ab35ef88a68a9973cacc5bd\",\"name\":\"eLanka admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2e0d346a7f97b80e861cdeafe7b7de523b59f5060666f1a5da8369457bf9b6c3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2e0d346a7f97b80e861cdeafe7b7de523b59f5060666f1a5da8369457bf9b6c3?s=96&d=mm&r=g\",\"caption\":\"eLanka admin\"},\"sameAs\":[\"https:\/\/websitedesigns.com.au\/elankanew\"],\"url\":\"https:\/\/websitedesigns.com.au\/elankanew\/author\/elanka\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber security Mesh: Clusters of network monitoring redefining security By Aditya Abeysinghe - eLanka","description":"Conventional network security monitoring involves establishing a security perimeter around all devices of a network. This method has been followed since the kindergarten days of computer networks and is the de facto standard used to monitor and secure most internal networks at present too. While this may sound easy for monitoring and securing devices in a network, the main disadvantage is that if the perimeter is hacked in some way, then the entire network could be vulnerable to attacks. Furthermore, security policies are often imposed at the edge of the network rather than at identity or other access management levels. Cyber security mesh is a concept that addresses these issues by enforcing security at each access point or similar level, thereby clustering these networks into a mesh of networks that are monitored separately.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Cyber security Mesh: Clusters of network monitoring redefining security By Aditya Abeysinghe","og_description":"Conventional network security monitoring involves establishing a security perimeter around all devices of a network. This method has been followed since the kindergarten days of computer networks and is the de facto standard used to monitor and secure most internal networks at present too. While this may sound easy for monitoring and securing devices in a network, the main disadvantage is that if the perimeter is hacked in some way, then the entire network could be vulnerable to attacks. Furthermore, security policies are often imposed at the edge of the network rather than at identity or other access management levels. Cyber security mesh is a concept that addresses these issues by enforcing security at each access point or similar level, thereby clustering these networks into a mesh of networks that are monitored separately.","og_url":"https:\/\/websitedesigns.com.au\/elankanew\/cyber-security-mesh-clusters-of-network-monitoring-redefining-security-by-aditya-abeysinghe\/","og_site_name":"eLanka","article_publisher":"https:\/\/www.facebook.com\/eLanka.com.au\/","article_published_time":"2021-06-19T02:43:16+00:00","og_image":[{"width":291,"height":173,"url":"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2021\/06\/Cyber-security-Mesh-Clusters-of-network-monitoring-redefining-security.jpg","type":"image\/jpeg"}],"author":"eLanka admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"eLanka admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/websitedesigns.com.au\/elankanew\/cyber-security-mesh-clusters-of-network-monitoring-redefining-security-by-aditya-abeysinghe\/#article","isPartOf":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/cyber-security-mesh-clusters-of-network-monitoring-redefining-security-by-aditya-abeysinghe\/"},"author":{"name":"eLanka admin","@id":"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/person\/f6e635b74ab35ef88a68a9973cacc5bd"},"headline":"Cyber security Mesh: Clusters of network monitoring redefining security By Aditya Abeysinghe","datePublished":"2021-06-19T02:43:16+00:00","mainEntityOfPage":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/cyber-security-mesh-clusters-of-network-monitoring-redefining-security-by-aditya-abeysinghe\/"},"wordCount":750,"publisher":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/#organization"},"image":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/cyber-security-mesh-clusters-of-network-monitoring-redefining-security-by-aditya-abeysinghe\/#primaryimage"},"thumbnailUrl":"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2021\/06\/Cyber-security-Mesh-Clusters-of-network-monitoring-redefining-security.jpg","keywords":["Aditya Abeysinghe","Cyber security","MFA","SSO"],"articleSection":["Aditya Abeysinghe","Articles"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/websitedesigns.com.au\/elankanew\/cyber-security-mesh-clusters-of-network-monitoring-redefining-security-by-aditya-abeysinghe\/","url":"https:\/\/websitedesigns.com.au\/elankanew\/cyber-security-mesh-clusters-of-network-monitoring-redefining-security-by-aditya-abeysinghe\/","name":"Cyber security Mesh: Clusters of network monitoring redefining security By Aditya Abeysinghe - eLanka","isPartOf":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/#website"},"primaryImageOfPage":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/cyber-security-mesh-clusters-of-network-monitoring-redefining-security-by-aditya-abeysinghe\/#primaryimage"},"image":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/cyber-security-mesh-clusters-of-network-monitoring-redefining-security-by-aditya-abeysinghe\/#primaryimage"},"thumbnailUrl":"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2021\/06\/Cyber-security-Mesh-Clusters-of-network-monitoring-redefining-security.jpg","datePublished":"2021-06-19T02:43:16+00:00","description":"Conventional network security monitoring involves establishing a security perimeter around all devices of a network. This method has been followed since the kindergarten days of computer networks and is the de facto standard used to monitor and secure most internal networks at present too. While this may sound easy for monitoring and securing devices in a network, the main disadvantage is that if the perimeter is hacked in some way, then the entire network could be vulnerable to attacks. Furthermore, security policies are often imposed at the edge of the network rather than at identity or other access management levels. Cyber security mesh is a concept that addresses these issues by enforcing security at each access point or similar level, thereby clustering these networks into a mesh of networks that are monitored separately.","breadcrumb":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/cyber-security-mesh-clusters-of-network-monitoring-redefining-security-by-aditya-abeysinghe\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/websitedesigns.com.au\/elankanew\/cyber-security-mesh-clusters-of-network-monitoring-redefining-security-by-aditya-abeysinghe\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/websitedesigns.com.au\/elankanew\/cyber-security-mesh-clusters-of-network-monitoring-redefining-security-by-aditya-abeysinghe\/#primaryimage","url":"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2021\/06\/Cyber-security-Mesh-Clusters-of-network-monitoring-redefining-security.jpg","contentUrl":"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2021\/06\/Cyber-security-Mesh-Clusters-of-network-monitoring-redefining-security.jpg","width":291,"height":173,"caption":"Cyber security Mesh Clusters of network monitoring redefining security"},{"@type":"BreadcrumbList","@id":"https:\/\/websitedesigns.com.au\/elankanew\/cyber-security-mesh-clusters-of-network-monitoring-redefining-security-by-aditya-abeysinghe\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/websitedesigns.com.au\/elankanew\/"},{"@type":"ListItem","position":2,"name":"Articles","item":"https:\/\/websitedesigns.com.au\/elankanew\/category\/articles\/"},{"@type":"ListItem","position":3,"name":"Cyber security Mesh: Clusters of network monitoring redefining security By Aditya Abeysinghe"}]},{"@type":"WebSite","@id":"https:\/\/websitedesigns.com.au\/elankanew\/#website","url":"https:\/\/websitedesigns.com.au\/elankanew\/","name":"eLanka","description":"eLanka - Sri lanka events in Australia","publisher":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/websitedesigns.com.au\/elankanew\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/websitedesigns.com.au\/elankanew\/#organization","name":"eLanka","url":"https:\/\/websitedesigns.com.au\/elankanew\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/logo\/image\/","url":"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2020\/03\/elanka-logo.jpg","contentUrl":"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2020\/03\/elanka-logo.jpg","width":192,"height":82,"caption":"eLanka"},"image":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/eLanka.com.au\/","https:\/\/www.linkedin.com\/in\/elanka\/","https:\/\/www.youtube.com\/user\/SriLankanDownUnder"]},{"@type":"Person","@id":"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/person\/f6e635b74ab35ef88a68a9973cacc5bd","name":"eLanka admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2e0d346a7f97b80e861cdeafe7b7de523b59f5060666f1a5da8369457bf9b6c3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2e0d346a7f97b80e861cdeafe7b7de523b59f5060666f1a5da8369457bf9b6c3?s=96&d=mm&r=g","caption":"eLanka admin"},"sameAs":["https:\/\/websitedesigns.com.au\/elankanew"],"url":"https:\/\/websitedesigns.com.au\/elankanew\/author\/elanka\/"}]}},"_links":{"self":[{"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/posts\/67244","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/comments?post=67244"}],"version-history":[{"count":1,"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/posts\/67244\/revisions"}],"predecessor-version":[{"id":67246,"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/posts\/67244\/revisions\/67246"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/media\/67245"}],"wp:attachment":[{"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/media?parent=67244"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/categories?post=67244"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/tags?post=67244"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}