Category Archives: Cloud Computing

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments

After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw in 2014 to a whopping $84 billion global market by 2019.

Hybrid cloud environments offer companies the resilience and scalability of the cloud, while also providing the compliance, availability and security typically found in on-premise infrastructures. For IT teams, hybrid infrastructures offer a variety of benefits. The on-premise infrastructure component offers secure, worry-free storage for confidential company information, for instance, and the cloud component offers the ability to easily build new networks and applications without having to worry about scalability, deployment or maintenance.


(Image Source: Shutterstock)

Perhaps the biggest benefit of hybrid cloud environments, however, is the cost savings. Instead of needing to devote entire IT teams and significant capital to build infrastructure that can withstand occasional bursts in network usage that may occur only very rarely, companies can leverage cloud technology to offload some of their heavy network traffic and only pay for it as needed.

Given the plethora of benefits hybrid cloud infrastructures can offer, it’s no wonder so many companies are embracing such environments. However, maintaining the performance and security of hybrid cloud environments can prove difficult. Cloud technology introduces critical security risks that can seriously harm a company’s financial state, not to mention their reputation and customer satisfaction levels. Additionally, the very nature of hybrid cloud environments can put pressure on network performance, which can lead to compromised service levels or even network downtime.

To maintain high performance levels in hybrid cloud environments while also protecting your company against cyber security risks, IT departments should adhere to the following four practices:

1. Prioritize network monitoring

To successfully manage hybrid cloud environments, IT teams need to embrace monitoring solutions that can provide actionable intelligence into the state of their networks, servers and applications. Consider implementing an automatic monitoring tool that can analyze network traffic patterns and offer end-to-end visibility into your applications (e.g. remote desktops or secure file services), your availability (e.g. windows servers, virtual machines, firewalls or load balancers) and your connectivity (e.g. internet-facing links, VPN tunnels to remote offices or interface status/statistics). To ensure critical infrastructure availability and security at all times, IT teams should continually monitor the following basic network components:

  • Routers, switches, firewalls, load balancers, intrusion prevention systemsInternet connectivity, VPN sessions, network traffic and flow records
  • Servers, remote desktops, virtual machines, applications

2. Collect network flow records


By collecting and analyzing network flow records (such as NetFlow, sFlow, J-Flow, and IPFIX), IT teams can view the overall usage of the LAN, WAN and internet, and also determine which users, applications and protocols are consuming the most bandwidth. To simplify network management, improve visibility into traffic and bandwidth usage, and drive performance, IT teams should collect network traffic information on the following:

  • Senders, receivers and conversations
  • Sender and receiver domains
  • Sender and receiver countries
  • Applications and protocols
  • Incoming and outgoing interface traffic
  • Incoming and outgoing interface utilization
  • Bandwidth usage by host and group

Additionally, IT teams should analyze network traffic based on flow data, and pinpoint any network users of non-business applications. Aligning this data with in-depth packet analysis is crucial for obtaining cohesive insights into overall network performance, which can also help reduce ISP costs.

3. Implement log management

IT teams can more effectively detect and alert on any unauthorized activity or security threats to their network by automating the collection, storage and back-up of logs. Some examples of log collection include server and application logs, security logs from firewalls, DDoS and intrusion prevention systems, Syslogs from any source, IIS web server logs, or secure file server logs. Be sure to track, alert and report on events like access and permission changes to Files, Folders and Objects, and always collect the most common log types such as Syslog, Microsoft event or W3C/IIS to help identify potential threats to your network.

With automated log collection and analysis, IT teams can proactively detect any unusual activity on their network and immediately rectify the situation. Additionally, they can leverage log management data to produce monthly reports to provide evidence for audit and compliance purposes at the corporate or executive level.

4. Run penetration tests

In order to discover any network blind spots that hackers could use to gain access to sensitive company information, IT teams should regularly run network penetration tests.

When properly performed, such testing can:

  • Determine the feasibility of certain attack vectors
  • Assess the magnitude of operational impacts by successful attacks
  • Provide evidence that your department needs a larger budget
  • Test the department’s ability to detect and defend against agile attackers
  • Identify vulnerabilities that a simple scan or security assessment might miss
  • Help meet industry compliance specifications such as PCI DSS and/or HIPAA

IT teams should also test their company’s security incidents identification and response capabilities, as well as employee security awareness and security policy compliance. Consider leveraging free, open source penetration testing tools such as Metasploit or BackTrack, as such solutions can help IT teams think like hackers and stay ahead of any potential network threats.

The benefits of hybrid cloud infrastructures are undeniable. Such environments can provide companies with impressive scalability, availability and efficiency, while also offering significant cost savings. However the security risks hybrid environments can introduce need to be taken seriously, as even the smallest network vulnerability can lead to dire consequences. Case in point: The Ponemon Institute recently calculated that the average cost to respond and remediate a network data breach averages companies over $3 million.


Don’t jeopardize the health of your hybrid cloud environment and the future of your company. Implement flexible and comprehensive monitoring solutions to analyze your network and keep tabs on your applications, availability and connectivity. Analyze network flow records and automate the collection of logs. Lastly, run network penetration tests in order to find any infrastructure vulnerabilities and determine their specific risk. In doing so, your company can realize the benefits of hybrid cloud environments while also maintaining optimal performance and security.

By Nirav Shah,

Business Line Director, Network Management Products at Ipswitch

Why Are Hackers So Interested In Your Medical Data?

Why Are Hackers So Interested In Your Medical Data?

The Interest In Medical Data

The term “hackers” might bring to mind visions of dark basements, powerful computers and people with nefarious goals stealing credit card or government data. Most of us, however, don’t associate a hacker with the theft of medical data, but there are a growing number of hackers who are choosing to collect medical data instead of potentially more lucrative information. Why are these hackers so interested in your medical data, and what can you do to make sure you are protected?

What’s It Worth?

Why are so many hackers seeking out medical data instead of their more traditional fare, credits cards and identity data? In a word: profit.

The idea behind stealing data is selling it. If they can’t sell it, there is little to no point in stealing it in the first place. Credit card information, as of right now, goes for about $1/piece. Medical information, which usually includes things like personal information, birth dates, billing information, and medical diagnosis codes, can be sold for between $10-20 each to as high as $60 (As seen in the infographic below discovered via Trend Micro). That’s 10 to 20 times what a hacker can make with the same amount of credit card data.


Why Is Medical Data Worth So Much?

Why is medical data worth so much more than credit card or personal identity data? There are two primary reasons: It’s harder to track and so is less likely to be discovered, and its uses are limitless.

People keep track of their identity and their credit report. There’s an entire industry designed around helping people keep track of their credit scores and protect their identity, and people pay hundreds of dollars into it every single year. Once someone finds something odd on their credit report or history, the stolen data becomes useless.

What most people don’t keep track of is their medical information. No one monitors their medical history to see if someone is using their name or information.

The potential for profit when using stolen medical information is nearly endless. Clever hackers can use an individual’s medical data to obtain fraudulent prescriptions or even purchase medical equipment, which can be later sold for a profit. Depending on the type of information that’s been stolen, these hackers can even trick insurance companies into paying for the purchases, increasing the profit threshold exponentially.

Backdoors in the Internet of Things (IoT)

How are these hackers making their way into a system that should be otherwise secured? High-tech medical devices and the trend toward IoT-based devices is leaving backdoors for hackers to make their way into otherwise protected systems.

These attacks aren’t malicious. The hackers are not trying to harm patients by shutting down the equipment for compromising its function. Instead, devices that run on older versions of Windows allow hackers to install backdoors in the system so they can walk in and collect any information they might need.

Protecting Your Information

The days of doctor’s offices being filled top-to-bottom with paper medical histories are a thing of the past. In the spirit of expediency and shared information, most medical practitioners have transitioned to electronic data capture (EDC) forms to make your visits more efficient. This also enables doctors and specialists to request data with a couple of keystrokes instead of waiting for hard copies of medical records to be faxed or delivered.

If your medical information is ever hacked or stolen, it can make it hard or even impossible to get proper medical treatment as your medical history is corrupted by whatever diagnosis the hackers think they can use to make the most money. By simply keeping a copy of your electronic medical file, you can restore it to its original state.

About one in 13 people will be affected by a security breach in the medical system at some point over the next five years. So, another thing you can do to protect your medical information is to review your insurance statements and take note of fraudulent activity. Many insurance companies aren’t even prepared for this sort of hack, and it can take them quite a while to discover the breach and take steps to contain it. By going over your insurance statements, you can bring potential breaches to your insurance company’s attention before they may even be aware of it.

Medical data theft may be the next chapter in the ever-growing book on cyber security and information protection, but it’s not the newest and definitely not the first. All we can do is take all the necessary steps to protect ourselves and our information while new security solutions are discovered.

By Kayla Matthews

Messaging Service ‘WhatsApp’ Has Tough Week

Messaging Service ‘WhatsApp’ Has Tough Week

WhatsApp shutdown in Zimbabwe

This week Zimbabwe was rocked by national protests against government corruption, economic collapse and the long-tenure of Mugabe, now 92. The response of the government was to shut down the messaging service WhatsApp, which is owned by Facebook. It is also alleged that they limited the access to the Internet for most of the day.

The protests were largely organised and mobilized over WhatsApp and social media. Hashtags such as #ShutDownZim, #ZimbabweShutdown and #ZimShutdown dominated social media websites like Twitter in efforts to bring the country to a standstill in order to address the protester’s demands. Early in the morning then it was noticed that WhatsApp had stopped working for many users. Later it became apparent that only the users of certain Zimbabwean cellular networks no longer had access to the messaging service. The cellular networks did not appear to know the exact reason for the prohibited access. Econet, the largest Internet provider in Zimbabwe, merely acknowledging that it was not working.


(Image Source: Statista)

All sim cards in Zimbabwe are registered in the name of the user. Perpetrators can easily be identified” warned the Postal and Telecommunications Regulatory Authority of Zimbabwe. A letter issued by the regulating body expressed disdain at the use of social media to organize the protests and threatened the arrest of anyone. The Minister of Higher Education of the country tweeted in response to provoking tweets of protestors that “If there’s a stay away as you claim then stay away from WhatsApp…

Many users were able to circumvent the blackout by downloading and using a VPN app on their phones. By after midday, fortunately, access to WhatsApp had been restored.

That the Zimbabwean government limited communication and allegedly limited access to the Internet is especially chilling considering the fact that only days ago the United Nations declared the right of access to the Internet one that should be promoted and protected, something that was clearly not done here.

For anyone unfamiliar with the social media app can review the attached infographic discovered via shoponless outlining 47 interesting facts and stats about WhatsApp.


By Jason de Klerk

How Cloud Technology Is Boosting Business Success

How Cloud Technology Is Boosting Business Success

Boosting Business Success

In a research study by HyTrust, it’s apparent that adoption of public cloud services is accelerating in all verticals, and it’s not expected to slow down any time soon. Says Eric Chiu, president of HyTrust, “Without much fanfare, this critical technology advance has become woven into the basic fabric of organizations. The potential of virtualization and the cloud was always undeniable, but there was genuine concern over security and skepticism regarding the processes required. What we find in this research is that the challenges are being overcome, and every kind of function in every kind of industry is being migrated. There are some holdouts, to be sure, but they’re now the exception, and we’re betting they won’t stay that way for long.”

An Obvious Move?

The business landscape is almost completely enmeshed with technology and its advances, many providing the tools and services to improve competitive performance, reduce operating costs, and improve productivity. Moreover, the spread of mobile and IoT solutions is encouraging business leaders to focus on new directions and implement radical new strategies. With Gartner’s predictions that 5 million people will have enterprise-confidential information on their smartwatches by 2018, and smartphone and wearables will be causing so much disruption by 2020 that organizations will have to implement restrictive policies, the increasing impact of technology on business is clear.

Correctly applied, the majority of businesses surveyed by HyTrust believe that cloud and software-defined computing adoption will increase, offering faster deployment, and greater tangible benefits and ROI. Business and IT professionals do, however, hold security as the leading challenge, and the perceived lack of inadequate or robust security in cloud and software-defined data centers is considered the biggest deterrent to adoption. However, 70% of respondents believe that security will be less of an obstacle in the coming years. Many others also point to a lack of solutions, interoperability issues, and immaturity of offerings as limitations.


Migration to the public cloud is particularly evident in tech companies and business consulting and management firms, but they’re followed closely by emergency services, financial services, information and analytics services, energy and utilities, and education services. Concerns during migration, however, are prevalent with the risk of data breach, the necessity of infrastructure-wide security and control, and effective monitoring and visibility noted as the three top interests. Nevertheless, 75% of those surveyed plan to move workloads to the public cloud.


Small Business Benefits

Cloud tools and services are popular with entrepreneurs, and studies by SCORE find that 92% use at least one cloud-based solution, while 52% employ cloud-based storage facilities. Cost-effectiveness, flexibility, ease of use, improved business agility, and security are the top five benefits observed. Unfortunately, many small business owners are overwhelmed with the number of technologies available, and though most recognize the value, only 29% use a customer relationship management (CRM) system. Security is, of course, not only a concern for big business, and in fact 60% of cyber crime attacks are against small businesses. Considering only 50% of those surveyed by SCORE protect their internet data, fewer than half have email security, and only one-fifth has network security encryption, better data security is an absolute must for progressive small businesses.

Virtualization increases the worth of physical server hardware, allowing businesses to do more with less at lower costs. Businesses can lower power usage, IT requirements, and space requirements, and spend less time on installation, maintenance, and support. Cloud computing also allows for greater integration, collaboration, and improved flexibility. Specialized services integrate with back-office operations, and the flexibility of cloud solutions could allow for cost-effective BYOD policies. Cloud computing makes collaboration much simpler and efficient, and the appropriate solutions also help control and manage data access. Though the range of solutions available is extensive and probably daunting for companies with small IT teams, cloud computing is an area worth spending time investigating.

By Jennifer Klostermann

Moving Medicine Forward: The Internet of Medical Things

Moving Medicine Forward: The Internet of Medical Things

The Internet of Medical Things

By now the Internet, and by extension the Internet of Things (IoT), is not an uncommon part of our daily lives. Everyday items such as TVs, security systems and fitness accessories or wearables are being connected to the Internet in ways previously unimaginable. However, increasingly the possibilities of the IoT extends beyond mere convenience and could become vital to our health.

Unlike our households, phones and businesses, the healthcare industry has been weary of embracing some aspects of the Internet and connectivity into practice. But the emergence of the Internet of Medical Things (IoMT) shows that this could be changing. It involves a connection of medical and other healthcare devices to the Internet, increasing the capacity for storing and analysing of personal and public data as well as more direct and rapid responses to medical conditions or emergencies. In a way, it’s goal is to “rehumanize the doctor-patient relationship”.


Of course then, the success of this move requires a buy-in by or a culture change in the healthcare industry towards modern end-to-end medical solutions. The potential changes brought by a smoothly running IoMT would mean a significantly cheaper healthcare industry for both patients and professionals, which at present is an expensive and profiting industry. It is estimated that the most savings could be in chronic disease management. Furthermore, it would mean better and more responsive healthcare. Patients’ vitals such as temperature, heart rates and glucose levels can be remotely monitored, meaning less time spent at the doctor and more immediate response times when something goes awry. Moreover, data on the changes to these vitals can be stored in a way for doctors to review, providing a clearer picture of a person’s condition.

The IoMT is not without its hurdles though. Healthcare is a highly regulated industry and standardizing the IoMT or making it standard-compliant, while necessary, can slow down the adoption of many advances in this regard. There are many security issues surrounding the devices and the data they collect, which make room for more cyber attacks and security breaches, certainly concerning when dealing with a person’s health.

Nevertheless, it appears that the IoMT can play a large role in bringing medicine into the modern era while also improving the doctor-patient relationship.

Some notable examples in the IoMT include:

  • Propeller Health, which has released an FDA-approved asthma inhaler with a GPS-sensor. This allows for tracking of the time and location of the use of the inhaler, allowing a user to even avoid those areas which may prompt their asthma attacks.
  • Contact lenses for diabetics produced by Novartis and Google, that allows a patient to measure the level of blood sugar through tears and transferred to a smart device.
  • Monitoring of medication through Vitality, a medication container system that can notify a patient to take their prescribed medication through smartphone notifications or even a phone call.

By Jason de Klerk

Economic Arguments For Cloud-Based ERP

Economic Arguments For Cloud-Based ERP

Cloud-Based ERP

If your business has reached the point where an ERP system is necessary and it’s time to decide which type of implementation is best for your business, there are a lot of factors to consider before taking the plunge. The two main discrete options for an ERP implementation are either an on-premise or cloud-based solution. On-premise solutions are privately hosted on your own local servers and network and managed by your internal IT resources.

Cloud-based ERPs are hosted online and the data, security, and infrastructure are all managed off-site and the system can be accessed from any location with internet access. Between uptime, security, accessibility, standardization, customization, and updates, both options have their benefits and drawbacks. But when it comes to cost, cloud-based ERP systems can have quite the advantage over on-premise solutions. Let’s take a look.

Lower Cost of Ownership

An on-premise solution has many costs associated with it that are at least partially absorbed by a cloud solution. On-premise ERP systems often require a large up-front purchase, the time and focus of IT staff, the cost of hardware, customization, training, maintenance, security, upgrades, and the general overhead to keep the lights on and your system running. Cloud ERP systems, on the other hand, are priced on a monthly or annual subscription that can take the pain out of the initial costs of implementation. This leaves a business with the freedom to cancel or choose a different level of service if necessary.

cloud erp strategy

No Cost to Upgrade

Upgrades and patches, in general, can be costly and time-consuming. Where a cloud-based system comes with automatic updates, an on-premise system will require you to allocate the time of your IT staff to deploy the update in-house. A cloud-based ERP system provides you with the ability to redirect staff to focus on areas that bring the most value to your business.

Because these updates are online and automatic, and you are effectively subscribing to an ERP service versus purchasing the system up-front, you are not responsible for the cost of upgrades. Where upgrading an on-premise solution may require scheduling to meet budgetary needs and therefore leave valuable features waiting on the table that could benefit your business, a cloud solution offers these at the moment they are available, automatically and free of charge. This results in greater system stability and better opportunities to grow your business.

No Software, Security, or Hardware Maintenance Costs

When it comes to your business, security is paramount. With an on-premise solution, data is the responsibility of the organization. And it can be costly to maintain cutting-edge electronic and physical security layers.

In addition to security costs, an on-premise solution carries with it the cost of hiring an installation expert and purchasing enterprise-grade servers, operating systems, databases, and backup systems to support those servers. A cloud-based solution takes on these responsibilities and leaves your business more secure and less liable for the financial burden of additional maintenance and infrastructure requirements. A hosted solution also combines many of these costs at a lower overall rate. Most notably, cloud ERP provides your business with the ability to only pay for only what you need, whether it be number of users or amount of digital storage space.

Response to Business Needs

A cloud-based ERP system allows members of a business to communicate information in real-time, all the time. This improves collaboration and allows your business to adapt to any number of situations.

The standardization of a cloud-based ERP system means a reduction in time spent reconciling data, converting information, and bridging gaps between different systems at different locations. Whether it be customer questions or concerns, a need to adjust a line of supply to meet demand, vendor issues, or any other everyday requirement, a cloud-based ERP system can help provide clear, accessible, continuous communication.

Faster to Deploy Means Improved Time to Value

With an out-of-the-box solution, your business will spend less time on selecting the appropriate hardware, negotiating IT capacity, deploying software, training employees, and making the back-end adjustments and customizations necessary to ensure your solution is up to snuff and ready for business. A cloud-based ERP system means you’re up and running in no time, which reduces the often prohibitive costs of ERP implementation that can leave businesses pushing back their purchase and losing out on improved efficiency across all departments.

Guaranteed Uptime


(Image Source: Shutterstock)

Anyone who has had their servers go down knows that it can lead to a significant financial hit. On-premise solutions leave the business in charge of ensuring uptime and keeping IT staff on call in case of emergency. In addition, network and system downtime can cost a business much more than simple dollars per hour. It can also impact the reputation of a business, and leave doubt in the minds of consumers as to whether the company they are investing their time and money in is dedicated to running a reliable business. With around the clock technical support, cloud-hosted solutions mean no scrambling to find someone who is still in the office to handle a system issue, and no expenses for additional IT and other employee hours or replacement of hardware or software infrastructure.

The crucial decision in choosing the best ERP for your business should not come lightly. Managing your ERP on-site versus opting for a cloud-based solution brings with it many separate decisions. But when it comes to comparing the costs of each implementation, one can find a great deal of financial value associated with a cloud-based ERP deployment. These include faster time to value, low cost of ownership, quick and painless upgrades, and a lack of hardware, security, IT support, and maintenance costs. All of these benefits can help you and your employees focus on the big-picture initiatives that keep your business moving forward.

By Aaron Continelli

Big Data Solutions For The Gaming Industry

Big Data Solutions For The Gaming Industry

Big Data, The Cloud and Gaming

Big Data plays a major role in gaming, an industry valued at over $90 billion today. With the gaming industry more competitive than ever, developers are trying to understand player psychology and behavior to ensure games are constructed in such a way that players find their “flow zone.” Ensuring gamers keep coming back through game optimization, refining factors which encourage titles going viral, and additionally monetizing games through in-game purchasing is a blueprint to a gaming business’s success.

Big Data Analytics for Gaming

Every player interaction, mouse click, and keyboard press creates valuable data in game logs. However, if you’ve ever opened a game log, you’ll wonder how on earth you’re supposed to find it. This is where Big Data analytics steps up to the plate. Aggregated and analyzed, game logs explain what engages players and what encourages them to return. With the added social media and web access integrated, player profiles can be further developed, allowing gaming companies to provide personalized experiences and drive game attraction.


(Image Source: Shutterstock)

Through combined user behavior and demographic information, merged with brands regularly engaged with, it’s possible to understand preferences and create specifically targeted digital ads, improve user experience, and identify VIPs. Analyzing combined logs and player data also enables the identification of common characteristics, helping recognize what drives particular gaming segments to play, and play longer. This has the added benefit of enabling gaming businesses to target new users most likely to engage with their titles. Finally, testing and analyzing results ensure constant gaming development and tweaking, based on real player data feedback.

Big Data Solutions for the Gaming Industry

No longer a market only for the giants, thousands of smaller game designers and developers are creating successful products for both traditional and emerging platforms, such as social media or mobile devices. With some estimates suggesting approximately two billion video game players worldwide, Big Data services are more relevant than ever, but the nearly unlimited data collected poses its own problem. Sources include gameplay data, social media, micro-transactions, price points, in-game advertising, payment systems, virtual goods, real-time events, multiplayer interactions, and content updates, and developers run the risk of recording data merely because it might, at some time, become relevant. Suitable Big Data solutions are shifting the focus to the right data for generation of actionable insights.

Cloud-Based Architecture

Uniquely able to address many technical challenges of the gaming industry, cloud-based architecture can provide scalable data storage solutions as well as the essential real-time availability. With billions of records streamed and immediately analyzed, cost-effective and low CAPEX cloud solutions are attractive. For the small gaming providers, analytics and storage vendors are offering tailored cloud solutions that provide the necessary speed, scale, cost, and capacity through fully managed, cloud-based Analytics as a Service platforms. With their near real-time analytics of current and historical data, smaller gaming companies are able to compete with the likes of Sony and Microsoft through these innovative and cost-effective Big Data analysis platforms.

Swiftly adopting Big Data technologies, the gaming industry is refining customer engagement, optimizing game development and end-user experiencing, and creating more effective targeted and personalized advertising. The blending of cloud-based tools offers further advancement as complicated and expensive infrastructures are outsourced to cloud service providers who manage the IT staffing and maintenance necessary to these platforms. High performing, scalable, service-based analytics cloud solutions mean game developers can focus on what they do best, leaving the Big Data analysis to experts and directly embedding the insights gleaned into gaming projects for improved traction, larger market engagement, and greater business success.

By Jennifer Klostermann

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach

For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy. Are they trying to say the perimeter is changing, or that the perimeter no longer exists?

In the context of the devices that allow humans to look at data, that perimeter is changing dramatically. From the workstations and laptops, to handheld computing devices, trying to define a security perimeter in this perspective can be challenging. Mobility has changed the client-side perimeter overnight. However, does the concept of mobility mean that perimeters can no longer exist?

Regardless of where data resides, anytime data is accessed, it is done through a perimeter. The world has benefited from wireless technologies that enabled mobility for years. But is there such a thing as the “virtual wire”? Anytime data enters a server, or is uploaded to or downloaded from a server, it will eventually traverse a piece of wire. That wire may be made of copper, or that wire may be made of fiber optics. Either way it’s still a piece of wire where both good guys and bad guys access data. That piece of wire needs to be protected at all costs.

Hackers today are after the data

The most secure method of protecting data on a server is to remove the wire that allows clients to access it. However, we all know what happens when you remove the wire. Short of that, how does one go about protecting that piece of wire? It all begins with a comprehensive, in-depth defense approach. Hackers today are after the data and will go to almost any length to get it. That piece of wire is where most attackers break in.

data breach

(Image Source: Shutterstock)

Years ago, organizations realized that their firewalls were nothing more than speed bumps to the seasoned hacker. Organizations began deploying end-point protection, intrusion detection systems, intrusion preventions systems, web applications firewalls, sandboxes, and the list goes on and on; all in an attempt to protect that piece of wire, and the data that traverses it. One of the main impediments to deploying these point solutions (often manufactured by different vendors) is their failure to interoperate. No single vendor had a complete, end-to-end solution.

Today, organizations understand the evolutionary dilemma of deploying disparate technologies. Instead, most organizations desire an ecosystem of solutions and technologies that interoperate, are fully aware of each other, communicate with each other, and defend that piece of wire to the fullest. They’re looking for a one-stop-shop that can completely defend the perimeters that still exist, and it all begins with the fully aware, hybrid-cloud approach as shown in the picture below.


On the far left, both good (green) and malicious (red) clients are shown. On the far right shows a perimeter that exists when accessing data within a datacenter (or even within a cloud). What you put in between those two entities makes all the difference in the world.

As shown above, attackers erode your defenses, consume your resources, control your systems, and steal your data. In addition, attackers use a host of different attacks shown in red to achieve their goals.

How does one manage the risks while blocking the threats?

In the fully aware, hybrid-cloud approach, the first line of defense begins with Cloud DDoS Defenses as shown on the bottom left. These defenses ensure that your organization is never taken offline due to a large, volumetric DDoS attack. But more importantly, they play a vital role ensuring all other defenses are not affected by a DDoS attack. All types of flooding attacks are simply eliminated by the Cloud DDoS Defenses.

On-Premises DDoS Defenses is the second line of defense. These defenses are deployed to ensure that low and slow, short-duration, and/or partial saturation attacks never consume your resources – including your security team. On-Premises DDoS Defenses must work in concert with the Cloud DDoS Defenses, ensuring that all unwanted denial of service (and other traffic types) are dropped with no further downstream inspection.

The third line of defense includes Next-Gen IPS with Sandbox. These systems are designed to eliminate malware intended to compromise and control your devices. These defenses look deep inside payloads to determine the intent of the traffic that makes it through the Cloud and On-Premises Defenses. Known malware is eliminated by the IPS. Unknown malware is eliminated by the Sandbox. Working in concert, both known and unknown malware, which are the sources of many advanced persistent threat attacks, are eliminated.

Web Application Firewalls (WAF) are the final line of perimeter defense. WAFs ensure that all client traffic behaviors when accessing data, align with corporate security policies. Data is given the utmost protection. WAFs provide complete defense for the OWASP Top Ten vulnerabilities, regardless of clear-text or encrypted traffic streams, and are deployed as close to the data as possible.

One may ask where the traditional firewall falls into all of this? The defense layers described above are designed to augment your existing firewall and provide protection for threats that the firewall is not able to prevent. Simply put, the firewall is able to block unwanted TCP and UDP ports but is not capable of preventing modern advanced threats.

The hybrid-cloud approach to security is very effective. However, the best protection is provided by a defense-in-depth architecture incorporating the four lines of defense covered above. The real power of this approach is realized if the architecture also uses closed-loop threat intelligence, whereby all four lines of defense not only collect attack data, but also share that data across all defenses. In this way, all four enforcement layers have the latest information about the complete threat landscape to reduce the overall security risk for any organization.

By Stephen Gates, Chief Research Analyst, NSFOCUS

CloudTweaks Comics
Cloud Infographic: Security And DDoS

Cloud Infographic: Security And DDoS

Security, Security, Security!! Get use to it as we’ll be hearing more and more of this in the coming years. Collaborative security efforts from around the world must start as sometimes it feels there is a sense of Fait Accompli, that it’s simply too late to feel safe in this digital age. We may not…

The DDoS That Came Through IoT: A New Era For Cyber Crime

The DDoS That Came Through IoT: A New Era For Cyber Crime

A New Era for Cyber Crime Last September, the website of a well-known security journalist was hit by a massive DDoS attack. The site’s host stated it was the largest attack of that type they had ever seen. Rather than originating at an identifiable location, the attack seemed to come from everywhere, and it seemed…

Cloud Infographic – DDoS attacks, unauthorized access and false alarms

Cloud Infographic – DDoS attacks, unauthorized access and false alarms

DDoS attacks, unauthorized access and false alarms Above DDoS attacks, unauthorized access and false alarms, malware is the most common incident that security teams reported responding to in 2014, according to a recent survey from SANS Institute and late-stage security startup AlienVault. The average cost of a data breach? $3.5 million, or $145 per sensitive…

A New CCTV Nightmare: Botnets And DDoS attacks

A New CCTV Nightmare: Botnets And DDoS attacks

Botnets and DDoS Attacks There’s just so much that seems as though it could go wrong with closed-circuit television cameras, a.k.a. video surveillance. With an ever-increasing number of digital eyes on the average person at all times, people can hardly be blamed for feeling like they’re one misfortune away from joining the ranks of Don’t…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

5 Ways To Ensure Your Cloud Solution Is Always Operational

5 Ways To Ensure Your Cloud Solution Is Always Operational

Ensure Your Cloud Is Always Operational We have become so accustomed to being online that we take for granted the technological advances that enable us to have instant access to everything and anything on the internet, wherever we are. In fact, it would likely be a little disconcerting if we really mapped out all that…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

What You Need To Know About Choosing A Cloud Service Provider

What You Need To Know About Choosing A Cloud Service Provider

Selecting The Right Cloud Services Provider How to find the right partner for cloud adoption on an enterprise scale The cloud is capable of delivering many benefits, enabling greater collaboration, business agility, and speed to market. Cloud adoption in the enterprise has been growing fast. Worldwide spending on public cloud services will grow at a…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…


Sponsored Partners