cyber security – MEC Networks Corporation https://mec.ph Your Partner in Innovation: The ICT and Physical Security Distributor in the Philippines Thu, 15 Feb 2024 05:43:41 +0000 en-US hourly 1 https://storage.googleapis.com/stateless-mec-ph-storage/2021/04/2a9b1c0d-cropped-mec-logo-email-signature-32x32.png cyber security – MEC Networks Corporation https://mec.ph 32 32 Email Phishing is a Pervasive Phenomenon. Fortinet Suggests 3 Things to Combat It. https://mec.ph/news/fortinet-suggests-how-to-combat-email-phishing/ Fri, 27 Oct 2023 07:00:13 +0000 https://mec.ph/?p=72609 In the ever-evolving world of cybersecurity, email phishing is still a persistent ultimatum. Threat actors have long posed as trusted sources to target unsuspecting individuals through email and text messages, all in the quest to steal sensitive data. Statistics from the Fortinet 2023 Global Ransomware Report highlight the effect of phishing as a top tactic,… Continue reading Email Phishing is a Pervasive Phenomenon. Fortinet Suggests 3 Things to Combat It.

The post Email Phishing is a Pervasive Phenomenon. Fortinet Suggests 3 Things to Combat It. appeared first on MEC Networks Corporation.

]]>

In the ever-evolving world of cybersecurity, email phishing is still a persistent ultimatum. Threat actors have long posed as trusted sources to target unsuspecting individuals through email and text messages, all in the quest to steal sensitive data.

Statistics from the Fortinet 2023 Global Ransomware Report highlight the effect of phishing as a top tactic, accounting for 56% of successful network infiltrations and ransomware attacks. 

Gone are the days of easily recognizable email phishing attempts with glaring errors in spelling and grammar. The advent of AI-driven content tools has ushered in a new era where cybercriminals use artificial intelligence to create more convincing text messages and email phishing. This sophistication raises the stakes, increasing the likelihood of users unknowingly clicking on malicious links.

In this era of AI-crafted communications, employee vigilance is crucial in defending organizations against potential breaches. Traditional methods of spotting phishing attacks are no longer sufficient to ensure safety. To bolster organizational security, it is paramount to invest in the right technologies, such as robust spam filters and multi-factor authentication. Equally important is the ongoing education of employees, as their awareness and actions can make all the difference in protecting organizations from the ever-evolving threats of phishing and ransomware.

Phishing: The Top Weapon in Ransomware Attacks

Recent findings shed light on a concerning reality: phishing still reigns supreme as the primary delivery method for ransomware. This choice by cyber attackers is not without reason, as it continues to yield alarming success rates. Statistics from the Cybersecurity and Infrastructure Security Agency reveal that a staggering 80% of organizations faced at least one incident where an employee was lured by a simulated phishing attempt.

Ransomware, a threat that knows no bounds in terms of industry or location, continues to plague businesses of all sizes. Despite 78% of business leaders believing they are well-prepared to obstruct ransomware attacks, the harsh truth is that half of them have fallen victim to such an attack within the past year.

Empower Your Workforce with Education Against Phishing

Safeguarding your enterprise from the ever-looming threat of ransomware begins with a well-informed workforce. Recognizing that most ransomware breaches enter through the gateway of phishing, employee education takes center stage. However, there is no one-size-fits-all approach to this endeavor; the key lies in tailoring the education to your unique organizational needs.

Fortinet gives some strategic services and programs that can serve as a solid foundation for a comprehensive employee security awareness initiative.

1. Security Awareness Training

Your employees are high targets for threat actors. To keep your organization safe, an ongoing cyber-awareness education program is important. Fortinet’s Security Awareness and Training Service, a SaaS-based solution, offers prompt and up-to-date awareness training on the latest security threats. This service enables IT, security, and compliance leaders to foster a culture of cyber-awareness, making employees more adept at recognizing and evading potential attacks. For organizations with compliance requirements, this service also aids in fulfilling regulatory and industry compliance training obligations. 

2. Phishing Simulation Services

Preparing your employees to identify malicious communications is a proactive approach to defense. FortiPhish Phishing Simulation Service conducts real-world simulations, allowing organizations to test and enhance user awareness and resilience against phishing threats. It equips users with the knowledge and skills to respond effectively when they suspect a phishing attack.

3. Free Fortinet Network Security Expert (NSE) Training

The Fortinet Training Institute offers free, self-paced NSE training modules. These modules empower users to find and shield themselves from various threat types, including phishing attacks. These resources can easily complement your existing internal training programs, reinforcing crucial concepts. Furthermore, Fortinet Authorized Training Centers (ATCs) supply instructor-led training, broadening access to the NSE curriculum on a global scale.

Stay One Step Ahead of Threat Actors Through Security Awareness Programs

As technology advances, so do the tactics of cybercriminals. They persistently explore new ways to exploit these innovations for their malicious agendas. In response, both security teams and every individual within organizations must heighten their vigilance against threats.

This underscores the importance of assessing and enhancing your existing cyber-awareness programs. The goal is to equip learners and employees with the latest, most pertinent knowledge, ensuring their ability to safeguard not only themselves but also the organizations invaluable data.

In the constantly changing sphere of cybersecurity, knowledge is your best defense.

The post Email Phishing is a Pervasive Phenomenon. Fortinet Suggests 3 Things to Combat It. appeared first on MEC Networks Corporation.

]]>
Cato Networks Software Defined Perimeter (SDP) https://mec.ph/datasheet/cato-networks-software-defined-perimeter/ Fri, 26 Nov 2021 08:33:00 +0000 https://staging.mec.ph/?p=52817 INQUIRE NOW Download Resources Now Optimized and Secure Remote Access for Everyone and Everywhere Enterprises are seeing a growing need for employees to work remotely. In particular, during times of crisis, the ability to work securely and productively from home is a critical pillar of business continuity planning. Cato SDP enables remote users, through a client or… Continue reading Cato Networks Software Defined Perimeter (SDP)

The post Cato Networks Software Defined Perimeter (SDP) appeared first on MEC Networks Corporation.

]]>

Optimized and Secure Remote Access for Everyone and Everywhere

Enterprises are seeing a growing need for employees to work remotely. In particular, during times of crisis, the ability to work securely and productively from home is a critical pillar of business continuity planning. Cato SDP enables remote users, through a client or clientless browser access, to access all business applications, via the secure and optimized connection.

Why choose CATO SDP?

Cloud-native SDP delivers secure remote access as an integral part of a company’s global network and security infrastructure. A global, cloud-scale platform supports any number of remote users within their geographical regions. Performance improves with end-to-end optimized access to any application using a global private backbone. Risk is minimized before and after users access the network through strong authentication and continuous traffic inspection for threat prevention. Cloud-native SDP makes mobile access easy — easy to deploy, easy to use, and easy to secure.

Easy deployment, instant secure access
Multi-factor Authentication & Single-Sign-On
Flexible Client-based or Clientless Access Options
Continuous Security Inspection for All Remote Access Traffic
Access Performance Optimization to All Applications
Cloud-scale Remote Access for Everyone, Anytime and Anywhere

Browse Cato Networks Solutions

The post Cato Networks Software Defined Perimeter (SDP) appeared first on MEC Networks Corporation.

]]>
Sonicwall TZ Series https://mec.ph/datasheet/sonicwall-tz-series/ Mon, 25 Jan 2021 00:49:23 +0000 https://mec.ph/?p=46340 INQUIRE NOW Download Resources Now Deliver enterprise-class security without the enterprise-grade complexity SonicWall TZ firewalls deliver enterprise-grade protection without the cost or complexity. Protect your small business or branch location from intrusion, malware, and ransomware, with an easy-to-use, integrated security solution designed specifically for your needs. Integrated Security Solution Choose optional PoE and Wi-Fi options… Continue reading Sonicwall TZ Series

The post Sonicwall TZ Series appeared first on MEC Networks Corporation.

]]>

Deliver enterprise-class security without the enterprise-grade complexity

SonicWall TZ firewalls deliver enterprise-grade protection without the cost or complexity.

Protect your small business or branch location from intrusion, malware, and ransomware, with an easy-to-use, integrated security solution designed specifically for your needs.

Integrated Security Solution

Choose optional PoE and Wi-Fi options with deep integration of the SonicOS operating system to deliver an integrated gateway security solution.

SD-WAN and Zero-Touch Deployment Capabilities

SonicWall Secure SD-WAN integrates with TZ firewalls without requiring an additional license and scales quickly with Zero-Touch Deployment capability.

SSL/TLS Decryption and Inspection

Leverage industry-leading decryption and inspection of TLS/SSL-encrypted traffic in real-time, along with TLS 1.3 support.

Deep Memory Inspection

Block even the most advanced attacks with Real-Time Deep Memory Inspection (RTDMI™) and Capture Advanced Threat Protection (ATP).

Superior Performance and Features

Get advanced threat protection at lightning speeds without compromising on performance, with expandable storage, redundant power, SonicExpress App onboarding, and more.

Single-pane-of-glass’ Management & Reporting

Manage everything from one location with Network Security Manager, a unified firewall management system that scales for any environment.

With Zero-Touch Deployment and simplified centralized management, installation and operation are easy.

Detect sophisticated threats, including encrypted attacks, with advanced networking and security features, like the multi-engine Capture Advanced Threat Protection (ATP) cloud-based sandbox service with patent-pending Real-Time Deep Memory Inspection (RTDMI™). With optional features like PoE/PoE+ support and 802.11ac Wi-Fi, create a unified security solution for wired and wireless networks.

SonicWall Gen7 TZ Series Does It Better

✔ First desktop firewall to deliver multi-gigabit malware and ransomware protection

✔ Branch capabilities and a redesigned cloud-native management console.

✔ First SonicWall desktop firewall to deliver redundant power.

✔ Groundbreaking performance in desktop firewall

✔ Share license across HA unit at no extra cost

✔ Side Channel attack protection

Browse SonicWall Security Solutions

The post Sonicwall TZ Series appeared first on MEC Networks Corporation.

]]>
Sonicwall Capture Client powered by SentinelOne https://mec.ph/datasheet/sonicwall-capture-client-powered-by-sentinelone/ Thu, 12 Nov 2020 22:11:44 +0000 https://mec.ph/?p=45238 INQUIRE NOW Download Resources Now Effective, Holistics, and Consumable Next-Generation Endpoint Protection Solution Benefits of Capture Client – Independent cloud-based management – Synergizes with SonicWall firewalls – Security policy enforcement – DPI-SSL certificate management – Continuous behavioral monitoring – Highly accurate determinations achieved through machine learning – Multiple layered heuristic-based techniques – Unique rollback capabilities… Continue reading Sonicwall Capture Client powered by SentinelOne

The post Sonicwall Capture Client powered by SentinelOne appeared first on MEC Networks Corporation.

]]>

Effective, Holistics, and Consumable Next-Generation Endpoint Protection Solution

Benefits of Capture Client

– Independent cloud-based management

– Synergizes with SonicWall firewalls

– Security policy enforcement

– DPI-SSL certificate management

– Continuous behavioral monitoring

– Highly accurate determinations achieved through machine learning

– Multiple layered heuristic-based techniques

– Unique rollback capabilities

Offerings and Platform Support

The SonicWall Capture Client is available in two offerings:

SonicWall Capture Client Basic

delivers all SonicWall next-generation malware protection and remediation features, along with DPI-SSL support capabilities.

SonicWall Capture Client Advanced

delivers everything listed above for Basic, plus Advanced rollback capabilities and Capture ATP integrations.

Both offerings are available for Windows 7 and higher, as well as for Mac OSX.

Browse SonicWall Security Solutions

The post Sonicwall Capture Client powered by SentinelOne appeared first on MEC Networks Corporation.

]]>
Sonicwall SonicOS 7 https://mec.ph/datasheet/sonicwall-sonicos-7/ Wed, 11 Nov 2020 00:25:08 +0000 https://mec.ph/?p=45220 INQUIRE NOW Download Resources Now Scale Faster, Protect More, and Regain Control What’s New in SonicOS7 Multi-instance Support SonicOS 7’s multi-instance support for NSsp enterprise firewalls allows multiple independent firewall instances to run on the same hardware, achieving multi-tenancy and maximizing operation simplicity. Advanced Protection Against Encrypted Threats TLS 1.3 decryption detects threats hiding in… Continue reading Sonicwall SonicOS 7

The post Sonicwall SonicOS 7 appeared first on MEC Networks Corporation.

]]>

Scale Faster, Protect More, and Regain Control

What’s New in SonicOS7

Multi-instance Support

SonicOS 7’s multi-instance support for NSsp enterprise firewalls allows multiple independent firewall instances to run on the same hardware, achieving multi-tenancy and maximizing operation simplicity.

Advanced Protection Against Encrypted Threats

TLS 1.3 decryption detects threats hiding in encrypted traffic without sacrificing performance.

Easy, Zero-Touch Deployment

The new SonicExpress Mobile App offers true zero-touch deployment, eliminating truck rolls, saving money, and easing the deployment of golden configs at branch locations.

Simplified Integrations

New Rest APIS allows SonicWall firewalls to be integrated with other security solutions, including hybrid policy orchestrators, SIEM, RMM, NAC, SOAR, and more.

Simplify Oversight with a Modern User Interface

Enhanced Dashboards

Network and threat dashboards provide a top-level summary of the overall health of the appliance and threat insights based on what the firewall sees in your network.

Security Rule Optimization

SonicOS 7 includes new features such as visibility in custom rules and hit counts, shadow rule detection, and rule optimization to eliminate misconfigurations.

Security Rule Visualization

To reduce user’s cognitive load, SonicOS 7 features rule visualization that offers quick and intuitive insights into the type of traffic the rule is for, what it does from a security inspection perspective, and what traffic is hitting it. 

Unified Improved Visibility

SonicOS 7 provides a topology view of your firewall and the endpoints behind it – including dashboards that detail the traffic passing through your firewalls, who is responsible for it, and what threats it contains.

Browse SonicWall Security Solutions

The post Sonicwall SonicOS 7 appeared first on MEC Networks Corporation.

]]>
Forcepoint: Best Practices For A Data Breach Response Plan https://mec.ph/forcepoint-news/data-breach-response/ Fri, 11 Oct 2019 07:46:42 +0000 https://mec.ph/?p=38314 Addressing the risks of transition to the cloud with Forcepoint

The post Forcepoint: Best Practices For A Data Breach Response Plan appeared first on MEC Networks Corporation.

]]>

Data breaches happen, however they aren’t necessarily the end of an organization. In several cases, a breach is an inflection point, with the organization coming back stronger. With a data breach response plan, corporations have an improved probability of mitigating the negative consequences of a breach.

 

By following these best practices for a knowledge breach response arrange, corporations are ready to retain business, customers, and shift the whole perception within the market.

 

1. Prepare with a data Breach Response plan.

 

While breaches could vary in nature, having a solid blueprint to arrange can streamline a timely response. First, recruit the key organizational players that should be involved. who should be on your incident response team? Typical players embody Human Resources, Legal, Governance, Business Continuity Officers, Information Technology, Security, and Communications – however, it varies based on your organization. Gathering the stakeholders and documenting a response plan with detailed actions and owners ensures an outlined path for the initial steps. Don’t forget to incorporate a list of extra partners to engage such as authorities, law firms, PR firms, and security groups to concentrate on breach incident and response.

 

2. Be transparent and timely.

 

Large breaches don’t remain secrets for long, and the timeframe of exposure is a measurement within the public eye. it’s necessary to make sure fast communication and response to breaches. Communicate among the organization, as well as with customers and partners who can be affected, with clarity on what happened and also the next steps. Work with any applicable regulatory bodies to ensure adherence to laws or regulations. For instance, a GDPR incident response plan would guarantee disclosure to the right authority within 72 hours of discovering the occurrence of a breach. Failure to do so may subject your organization to hefty fines. A decent rule of thumb is having a 24-48 hour response plan – particularly if personal information was breached, or user credentials may be compromised. Make sure that you’re releasing information quickly, and advising customers on options or actions that might limit or eliminate exposure.

 

3. Construct your communication strategy.

 

The majority of breaches’ initial assessments underestimate the impact. Given this factor, it’s vital to assume the worst cases and begin to reach out proactively. This might mean credit reporting companies, financial firms, and theft protection services, along with PR and the news media. An amazing tactic to have prepared are email templates that might provide communication across the digital landscape (social media, email, website, response/KB articles with details, blogs), along with your announcement and any customer portals you may have.

 

4. Determine the root cause beyond the technical aspects.

 

Ascertaining the technical details of a breach is important. Understanding how people act with technical tools is paramount to understanding breaches – including but not exclusive to phishing. whether it’s upkeep, maintenance/patching, best practices in architecture, audit/reporting, data model flow mapping, identity/credentials, and access management, or beyond – it involves individuals and business processes. Understanding the human component involved is crucial to fulfill ing the challenge of security.

 

5. Strengthen your posture, don’t just remediate.

 

Developing a sturdy security posture is an ongoing effort. Immediate remediation steps are vital, however, it’s more crucial to look at risk exposure over time to ensure data and IP protection. This might take the form of response planning for the security organization, or instituting coaching to fortify the data protection strategy. It takes long-term investment.

 

Securing a company is like competing in a track meet: there is a range of challenges, from immediate, short-term needs like sprints and hurdles, to the endurance and strategy needed for long-distance events, to the specialized skill-sets needed for events like the shot put and pole jumping. It takes long term strategy, planning, and partnering with the proper team to make a winning legacy — equating to long-term brand equity. wherever you’re in your journey as an enterprise, whether you’re racing to the cloud or focusing on safeguarding important IP in a new service or offering, Forcepoint continues to invest in innovation around data protection to partner with organizations on their overall security approach. let us know how we can help!

Download Free Forcepoint Resource


Get access to authentic content from one of the leading cyber security experts in the world from the Philippines’ premiere technology provider.

The post Forcepoint: Best Practices For A Data Breach Response Plan appeared first on MEC Networks Corporation.

]]>
Take the MEC Digital Maturity Quiz https://mec.ph/infographics/digital-maturity-quiz/ Fri, 13 Sep 2019 06:40:11 +0000 https://mec.ph/?p=37977 Axis Addressing the Cyber Security Threats from Physical Security

The post Take the MEC Digital Maturity Quiz appeared first on MEC Networks Corporation.

]]>
Get to Know Your Digital Maturity Today!

Take MEC’s Digital Maturity Quiz and find out how well you are in the age of digital transformation.

The post Take the MEC Digital Maturity Quiz appeared first on MEC Networks Corporation.

]]>
Axis: The Benefits of Network Audio in Retail https://mec.ph/axis-news/retail-network-audio/ Thu, 12 Sep 2019 09:10:36 +0000 https://mec.ph/?p=37969 Axis Addressing the Cyber Security Threats from Physical Security

The post Axis: The Benefits of Network Audio in Retail appeared first on MEC Networks Corporation.

]]>

The retail market has begun to appreciate the worth that network audio systems can bring to an organization, without impacting on their bottom line. These systems are an all-in-one solution for a variety of uses, creating pre-recorded, live announcements or enjoying background music. In this post, we take a glance at several advantages of putting in a network audio system.

Integrating network audio without overheads

Compared to analog systems, network audio systems have away a lower total cost of ownership and a lot of flexibility. Retailers no longer have to be compelled to sustain and manage separate systems for announcements and background music, something which will be expensive and time-consuming.

 

With no expensive or giant central component controlling every individual unit, there are fewer points at which connection will fail, which decreases the chance of specially trained technicians being sent out to conduct expensive repairs. Through network audio, every individual unit is a complete system. Its features like onboard intelligence, equalizer, amplifier, digital signal processor, microphone, power supply, and loudspeaker, so that one system may be used for several of the retailers’ needs.

 

It has a built-in MP3 player and streaming support which means retailers will play any content locally or online. The built-in scheduling functionality for the content ensures the best communication mix. And it’s the advantage of starting and stopping automatically, therefore, the store managers can rest knowing the planned announcements are played at the proper time.

 

Network audio solely needs one cable for connectivity, power, and communication, which means the systems are easy to put in and connect. The audio is already preconfigured for the best sound because of the built-in signal processing, eliminating the need to contact audio specialists throughout the installation.

Easy to manage

As it’s all connected to standard networks it is simple to remotely monitor the health of the system further, reducing the necessity to send technicians for the onsite observance. If a system is down, IP capabilities provide updates to require place from the centrally managed hub, reducing the necessity to update and replace units separately. Should there be an issue with the software or hardware, the redundancy secure system prevents one disconnected device from affecting the remainder of the system.

Stores can take advantage of integrated applications like streaming support services and audio player applications integrated within the speakers. Through this, retailers have access to music streaming services. As an alternative, store managers can use local playlists stored on memory cards that are on the network sound system.

 

Also, stores can select the audience for announcements with smart zoning. Retailers can prefer to use as many or as few speakers as they want, for each announcement and background music in order that they don’t end up playing similar music within the adult section as the children’s section or shouting out a message to a whole crowd if it had been solely directed at one person. Zoning configurations are simply adjustable as there’s no need for brand new cabling or new devices, all retailers got to do is change the formation to match their preferred layout.

Scalability and flexibility

These easy installation and management processes mean the systems can, simply, adapt and change depending on store demands. If retailers change the scale of their store, open extra outlets, or relocate, it’s easy to add or take away devices to satisfy the store’s existing demands, future-proofing the technology.

 

Additionally, network audio systems come with an open API for simple integration with different systems and future applications. for instance, network audio systems have an integrated audio player to store numerous audio clips. This will complement a network video system by having pre-recorded clips play out once a camera detects somebody going into a no-access area. Or, the system can be embedded with audio detection software which might send alerts once detecting high-level sounds, like gunshots or loud aggressive shouting.

The endless possibilities of network audio

Network audio systems aren’t limited to applications in retail but can be expanded to appear in any appropriate environments like faculties, health care, and commercial buildings. Its flexibility and scalability mean that cost savings are created through having the ability to add best of breed technologies, instead of proprietary solutions to a network, whereas any increasing customer satisfaction through optimized customer experience.

The post Axis: The Benefits of Network Audio in Retail appeared first on MEC Networks Corporation.

]]>
Axis: Be Ahead Of The Game With Video Analytics https://mec.ph/axis-news/vide-analytics-forewarning/ Fri, 30 Aug 2019 08:09:15 +0000 https://mec.ph/?p=37876 Axis Addressing the Cyber Security Threats from Physical Security

The post Axis: Be Ahead Of The Game With Video Analytics appeared first on MEC Networks Corporation.

]]>

According to the old byword, “forewarned is forearmed”, and also the ability to take proactive action to prevent incidents before they happen is something to which everybody concerned about safety and security will simply relate. Whereas, previously, this ability was exclusively dependent on the abilities of the surveillance operator, whose expertise would permit them to spot suspicious or dangerous behavior and take action, nowadays smart video analytics may be utilized to reinforce and enhance human skills.

Motion detection as the foundation

It’s an apparent thing to mention, however, the overwhelming majority of incidents where forewarning would help allow a response will feature some kind of movement, whether from people or vehicles. Motion detection, therefore, provides the base for proactive intervention. But clearly, the attributes of motion and their indication of suspicious, dangerous, or threatening behavior will differ throughout the day: a warehouse door in constant use throughout operating hours is entirely normal, of course. However, individuals approaching it in the middle of the night would be of great concern. Additionally, the solution should be ‘smart’ enough to ignore movement caused by wind, vehicle headlights, or tiny animals.

 

It is vital, therefore, that any analytics-enhanced video surveillance solution permits for the creation of multiple configuration profiles, establishing those areas to be included at totally different times of the day or night, totally different times of the week, and for various kinds of movement.

 

In addition to these variations, not all areas among a particular camera’s field of view are seen as crucial to unusual movement: a dangerous or prohibited area next to a busy corridor or pathway will need to be isolated so that only someone entering it will trigger an alert and also the appropriate response. Again, analytics currently permits for the identification of precise ‘include’ zones among the camera’s field of view to be highlighted, and technology like fence guard permits for the creation of virtual fences and tripwires to safeguard sensitive areas.

Alerts that drive proactivity, and potency

For smaller organizations, while not having the power to use full-time video police work operators providing 24/7 coverage, alerts created by analytics may be the distinction between stopping an occurrence happening, and easily handling the implications. To use another well-known phrase, ‘prevention is best than cure.

 

But an answer increased by analytics has further edges. Cameras may be established to solely record once motion is detected, or once a virtual fence is broken, which saves prices associated with information measure and knowledge storage.

 

For organizations wherever price potency, simple use, and comprehensive coverage square measure of central concern, analytics are a vital facet in an end-to-end video police work answer, like that that you get with AXIS Camera Station.

The post Axis: Be Ahead Of The Game With Video Analytics appeared first on MEC Networks Corporation.

]]>
Forcepoint: Thinking About Cloud App Security In A Direct-To-Cloud World https://mec.ph/forcepoint-news/cloud-app-security/ Thu, 29 Aug 2019 07:33:17 +0000 https://mec.ph/?p=37867 Addressing the risks of transition to the cloud with Forcepoint

The post Forcepoint: Thinking About Cloud App Security In A Direct-To-Cloud World appeared first on MEC Networks Corporation.

]]>

An increasing range of organizations is embarking on the ‘direct-to-cloud’ journey. This provides many advantages from a performance, operations and cost perspective because of the efficiencies achieved by remote and branch locations routing traffic differently.

There are a couple of more things to think about once considering direct-to-cloud connectivity: how it impacts cloud application usage and organizational security.

 

Impact of direct-to-cloud on business applications

 

Traditional environments have on-premises infrastructures to support most of the business applications. When we migrate from a central hub infrastructure, will that mean there’ll be inflated dependency on cloud applications?

 

Most likely, yes!

 

A larger percentage of new business services are going to be cloud-hosted to achieve the advantages that come with it like a mobile workforce that’s a lot of productive and competitive while on-the-go, reduced the cost of operations, scalability, business continuity, etc. Over time, even on-prem solutions can presumably have a migration path to the cloud.

 

What are the considerations for security within this new environment?

 

One of the most things we tend to hear from our discussions with organizations migrating business services to the cloud is around visibility. Historically, security groups had full visibility to the environment once services were hosted on-prem. Now they wonder about things like:

 

  • Who is accessing the cloud service?
  • When are they accessing it?
  • Where are they accessing it from
  • How are they accessing it?
  • What info are they accessing?

With a shared security responsibility model, the cloud becomes another attack surface in addition to the on-prem company environment. Think about this scenario: a worker using a personal device (BYOD) to access a sanctioned cloud service like Office365, can have access to the business data. However, the IT/IS team never sees that traffic hit the company infrastructure.

In a cloud environment, we also ought to consider compliance, which can be streamlined to keep the auditors happy. Some things to think about:

 

  • How do on-prem policies reach the cloud?
  • Do you need a central console for compliance policy management?
  • Do you have the visibility to attain compliance within the cloud?

 

To achieve this, we need to alter the approach around security.

 

Thinking about security differently

 

Security in a cloud or hybrid environment doesn’t need to be complex. It simply needs us to think about it differently. We don’t have to dismiss the great things we’ve in place around on-prem security. however, we do have to be compelled to add cloud visibility and management to the combination. Cloud Access Security Broker (CASB) will offer the visibility and management for cloud applications that organizations are searching for. Gartner listed CASB as one of the ‘Top 10 Security projects for 2019’. Adding cloud protection or CASB to an existing on-prem environment doesn’t need to be done in a silo. On the contrary, it becomes simpler if done in an integrated manner. This will be done in multiple ways. If you have web security already in place, you’ll be able to augment it with cloud application security as an add-on. As an example, Forcepoint web Security comes with the power to add a cloud app management module to induce visibility and management over cloud applications in an integrated manner. If your organization is concentrated on data protection with a solution like DLP even it will be extended to the cloud to have unified policy management. No matter where you come from adding cloud security to it should be simple. No matter where you’re in the ‘direct-to-cloud” journey, the benefits of embracing a cloud/hybrid environment can remodel your business. It’ll bring larger productivity, lower cost thanks to infrastructure and operational efficiencies, scale back risk with frictionless security and additionally streamline compliance.

Download Free Forcepoint Resource

 

Get access to authentic content from one of the leading cyber security experts in the world from the Philippines’ premiere technology provider.

The post Forcepoint: Thinking About Cloud App Security In A Direct-To-Cloud World appeared first on MEC Networks Corporation.

]]>