This article looks at cloud as the final frontier for security, exploring the topic as follows:
- CSO: 5 Ways Security Solutions Will Change
- Change #1 â€“ Web as Network Perimeter
- Change #2 â€“ SaaS Beats Out Endpoint Solutions: Swig of Kool-Aid
- Change #3 â€“ Integration of Network and Endpoint Protection
- Change #4 â€“ Transition from Alerts to Smart Use of Data
- Change #5 â€“ Internet of Things Will Use Cloud Protections as Its Basis
- Superb Internet: Audited and Certified
CSO: 5 Ways Security Solutions Will Change
Security isnâ€™t running away from the cloud but moving toward it. After all, the third platform (cloud, social, big data, and mobile) is where the action is.
Thatâ€™s the thrust of a message by Paul Lipman of iSheriff, who wrote in CSO magazine last week that the standard methods businesses have used for security in the past are â€œinsufficient for modern businesses.â€ While the third platform continues to build and overtake the second platform (personal computers) as the primary means through which the Internet is used, across-the-board security systems can help companies to streamline their operations and scale effectively.
Lipman argues that the current, highly disruptive state of technology â€“ led by red-hot segments such as cloud computing, the Internet of Things, and data analytics â€“ is prompting security professionals to come up with innovative means to protect the enterprise. Whitman argues that five major shifts will occur in the security world in response to the turbulently competitive, increasingly virtualized environment:
Change #1 â€“ Web as Network Perimeter
Even just in the recent past, security officials at companies were concerned with preventing unauthorized intrusion into the network, accomplishing that goal through a variety of in-house applications and hardware. That worked fine when everything was contained within the enterpriseâ€™s firewall â€“ which of course is not the case anymore.
Now, the chief information security officer (CISO) grapples with a bring-your-own-device (BYOB) environment in which employees tap into corporate apps based in the public cloud through their cell phones and tablets. The result? Says Lipman, â€œThe potential attack surface has expanded from the corporate network perimeter â€“ which was challenging enough to protect â€“ to encompassing a completely unbounded environment.â€
One area that has been growing as a result is cloud-based security, Security-as-a-Service. Three critical notes related to that approach:
- It means the company no longer needs to backhaul traffic.
- It creates a consistent umbrella of security that is ultimately managed by the CISO and adapts reasonably to the parameters of user privileges, network of access, and applications.
- It positions the organization on â€œhigh ground,â€ with lightning-fast real-time monitoring.
Change #2 â€“ SaaS Beats Out Endpoint Solutions
Okay, so letâ€™s get real here. This article is written by a guy who is the CEO of a cloud security company, so itâ€™s not all that surprising that he projects a bright future for his business. Yummy, that Kool-Aid is good! What is it, grape? Well, you call it cherry. I call it grape. We agree to disagree. Life isnâ€™t about getting it right.
Nonetheless, Lipman does have a strong argument in terms of the challenge of integration of multiple endpoint products. The differentiation of security applications throughout the enterprise creates gaps, which means that the CISOâ€™s experience becomes foggy: they canâ€™t see everything. Cloud security could better fuse together the system and, surprisingly, improve clarity.
Change #3 â€“ Integration of Network and EndpointProtection
Up to this point, security companies have created two different types of products for two different audiences: network solutions and endpoint solutions. That approach doesnâ€™t cut it in the current threat environment: â€œThe network layer [needs] to become aware of, and responsive to, endpoint device activity both on-network and off-network.â€
What if a handful of PCs at one of your companyâ€™s locations start shooting out packets of information to a possibly criminal IP address in Russia? You can stop it immediately if your system is properly integrated, forming a web of protection that Lipman compares to the bodyâ€™s connective tissue, fascia.
Change #4 â€“ Transition from Alerts to Smart Use of Data
You donâ€™t want to rely on fire alarms. You want predictive analysis that can prevent fires before they start. Hence, we move from alert systems to intelligent security.
When we pull all the elements of security together into one unified front, we can look at interactions and potential aberrations within the intranet, endpoint hardware, SaaS and cloud virtual machine environments, and the overall Web â€“ creating a comprehensive strategy that is â€œimpossible with todayâ€™s organizationally siloâ€™d, event-driven approaches.â€
Change #5 â€“ Internet of Things Will Use Cloud Protections as Its Basis
The advancement of the Internet of Things is unlikely without security organized and delivered through the cloud. Whether iSheriff represents the best possible platform or not, many commentators have noted that the Internet of Things is at this point highly questionable due to the ridiculous lack of security exhibited by many devices. Along those lines, Lipman makes a sound point: many connected appliances have low processing capabilities, so it would be â€œimpossible or prohibitively expensiveâ€ to enable security at the level of the device.
Superb Internet: Audited and Certified
Everyone knows that you need to set up your public cloud environment to optimize your security. That should be a no-brainer. Itâ€™s the reason why private and hybrid clouds are becoming so popular: speed, reliability, and enhanced protection as needed.
Still, donâ€™t trust anyone with your cloud infrastructure. Superb Internet is audited and certified to meet three internationally recognized standards. Plus, we wonâ€™t waste your time. As our customer Howard Barr said, â€œI use three other hosting companies, and none of them are as efficient as Superb.â€
Try out our Cost Estimator today.
By Kent Roberts
Image Credit: Licensed for Free Use via Flickr