Corero
Blog & News

Blog Series: Mitigating Risk on the Digital Transformation Journey – Chapter 2

This blog is the second in a series of five articles emphasizing the need for businesses to implement ‘Always-on in Real-time’ DDoS Security Solutions.

The first blog in this series introduced the value and risks of digital transformation. It highlighted how such transformation can enable risks that could outweigh the primary performance, accessibility and connectivity benefits. We now reflect on the reach potential that connectivity provides, to whoever, whenever and wherever.

Are you connecting one step to far?

A Network Effect exists when the addition of another element [to the network] makes all the existing elements in it stronger. It’s a positive feedback loop. As the network grows, the more value it provides. The more value it [the network] provides, the bigger it grows. The digital economy thrives on inter-connectivity. As the Network Effect expands, the user can extend their reach in the digital world, realizing the full experience that software and communication providers are promising.

When businesses exploit Network Effects, each use-case comes with its own strengths and weaknesses. In addition, each can exploit one or [many] more network effects.

Direct (same-side, or symmetric) network effects (physical, protocol, personal utility, personal and market network) happen when an increase in users directly creates more utility for all of the users, resulting in a better product or service. Indirect (cross-side, or asymmetric) network effects (marketplace, platforms, data, belief, etc.) happen when an increase in users indirectly creates more utility for other types of users.

An ecommerce market (exploiting an indirect network effect) grows every day, with over 1.9 billion citizens changing their purchasing behaviors with digital platforms. This Network Effect creates a spend capability exceeding $11.9 billion for 2020 at an average transaction rate of $220.

Supply chains make frequent use of Network Effects. Intelligent agents (delivered via the use of artificial intelligence) as part of a telematics solution automate logistics solutions (such as loading dock appointments, create and change orders, or expedite shipments) to keep service levels high and the supply-chain running smoothly. This provides visibility of “what and who is where” for the vehicle, the driver and any passengers, the container, its contents, its route and the receiving customer.

Challenges

The Network Effect benefits take advantage of the relationship between 1) multiple nodes/users, 2) the availability of communication networks and protocols, and 3) the willingness of the user (consumer & business) to take advantage of the data to increase their experience.

These three advantages can also become risks across the operational collaborative network, as below.

  • The critical success factor across the entire operation is connectivity. Without the ability for the nodes to “talk to each other”, they become ineffective and isolated from intelligence. Partial or full network unavailability means the user-experience is at risk due to the many critical elements they are relying on.
  • The value of near- or real-time data requires a continuous flow of new data to maintain that value. The lack of all, or some, of this data, including the manipulation of that data (bias), as a result of cybercriminal activity can cause the user to make incorrect or uninformed decisions.

Both the intentional and unintended growth of the network effect have major benefits as organizations adopt a more digital-first approach to their business operations – and the growth in network connections needed to reach the point of usable value – can also be a risk to every person and node across the network [effect].

Cyber criminals have the capability to intentionally disable or inject malware into communication networks to influence your operations and apply a negative network effect for their own purposes.

The initial euphoria of expanding your connectivity for operational value, via direct and indirect Network Effects, can be short lived once you start to experience disruption caused by unexpected infiltration across boundaries by users and cybercriminals. It is critical, during the planning of these expansion projects, to provide the appropriate DDoS security solutions to ensure that connectivity and dataflows remain at the levels required by users consuming your Network Effect(s).

Always-On in Real-Time

This is the era where real-time protection is rising. These supposed ‘always-on’ DDoS security offerings may be awake, but are they delivering the ‘real-time’ mitigation response in case of an attack attempt?

You may already have a DDoS solution in place. That’s great and should provide some comfort to stretched CISOs. While there are many DDoS offerings available, it is increasingly essential to have real-time mitigation response and processes.

  • When was the last time you considered the impact of a delay in protection processes when subjected to a DDoS attack?
  • Is your protection delivered via a scrubbing service that needs to redirect traffic to its cloud before it can even begin to mitigate your DDoS attacks?
  • Or, an on-premise service that will incur significant delays detecting and then redirecting affected traffic to an internal out-of-band scrubbing center?

Corero is dedicated to improving the security, availability, and success of the connected world, with always-on, real-time, DDoS mitigation services.

Ready to learn more about how Corero supports enterprise, hosting and service provider customers? Download our latest report, powered by analyst firm Omnisperience & SynergySix Degrees: “The need for Always on in Real-Time for DDoS security solutions”.