Understand the demanding situations and cybersecurity responses provided through the cloud

This content is through Zscaler.

Cyber ​​security responses delivered through the cloud have been a game changer for federal agencies. Managing on-premises security equipment and devices was a limitation for frontline cyber security professionals. flexibility to track users wherever they are.

But agencies will have to actively tame a zero-trust security posture; what they already have is not smart enough. One on site. . .

READ MORE

This content is through Zscaler.

Cybersecurity responses delivered through the cloud have been a game-changer for federal agencies. Managing on-premise security equipment and devices was a limitation for frontline cybersecurity professionals. flexibility to track users wherever they are.

But agencies will have to actively tame a zero-trust security posture; what they already have is not smart enough. A controlled security stack on site will hinder your efforts.

“If it doesn’t pass those litmus tests, it’s not 0 trust. It’s just a managed solution in the cloud,” said Hansang Bae, lead public sector technologist at Zscaler. “If it’s available from the outside in, it’s not trusted; anyone can go out and play. Remember that if it is available, it is inviolable. So be sure to assess your threat on 0-day attacks. If you want to rely on the network to direct traffic to your security solution, it’s not trust 0. Wherever the user is, regardless of the device they are using, coverage should be maintained with the user’s workload, the application, and not be provided over the network.

It’s not the fault of agencies that haven’t yet reached 0’s confidence, Bae said. The technology was replaced virtually overnight, and suddenly, a whole generation of equipment (firewalls, access lists, and VLANs) were simply no longer up to the task. task. Now there are new demanding situations and new equipment to combat them.

“You need instant or near real-time visibility into that telemetry knowledge, cutting it out and having processes to massage the knowledge and ingest it correctly,” said Danny Connelly, lead data officer for the Americas at Zscaler. “Sometimes there can be a bit of a delay, from the service provider’s point of view, but from what the company needs to do and the perspectives they need to see. So, by taking credit for cloud solutions, they can scale faster. “

Another major challenge is cultural resistance. It can be tricky for some IT professionals to get rid of their piles of knowledge and physical security. There are two main concerns Bae says he sees regularly: concern about the line and concern about functionality. In any case, it’s about wasting control, he said. Online worry is about blocking knowledge, while concern about functionality is the worry that cloud service providers simply can’t take care of you as well as you do.

“It’s about the scalability of the cloud,” Bae said. “The total explanation for why it’s automation. And with that automation comes scalability, with that scalability comes performance. It’s elasticity. “

And not only can agencies not do this with their own hardware, but lately they cannot accept as true with the chain of origin to get more curtains when they want. The cloud is your only option for scaling.

Cybersecurity responses provided through the cloud also gain advantages from specialization. Big business, especially federal agencies, have many positions and interests. Cloud service providers, on the other hand, can specialize. They are professionals armed with the right tools. It is much less difficult for them, for example, to fix zero-day vulnerabilities as revealed. Agencies just can’t keep up with that anymore. improve by calling specialists. They still retain the flexibility to administer their own policies. They only offload the overheads.

“Being able to react temporarily to this changing cyber environment is a great credit to taking this path,” said Jose Padin, director of the U. S. public sector. UU. uu. en Zscaler. ” When we communicate in real time, telemetry what’s going on from an attitude and being able to react temporarily to that, that’s what responses are designed for. We can prevent active cyber attacks from you and spread this information to the cloud, protecting all of our users temporarily, in near real-time, rather than what it would take to navigate and run updates reactively.

And 0 accept as true with is a team sport; no cloud service provider can do everything when it comes to modernizing an agency’s cybersecurity. That’s why cloud responses are designed to be integrated. The entire ecosystem is already integrated. Agencies don’t want one-time answers to urgent problems.

The cloud security style also improves the user experience. Traffic is not forced into on-site security stacks that they cannot scale. It goes directly to the Internet, where it is intended.

“If I’m looking for a fast site in a company that’s on the web, or anything on the web that I need to do to perform my task where you’re the most applications and the most knowledge, why can’t I just go straight to the web through a security stack that’s on the web?”Padine said, “Forcing users to move around the site creates a lot of disruption in terms of user enjoyment. So, not only does it increase your security, your flexibility, your ability to scale, but you can also have a much larger user. “enjoy doing so.

Leave a Comment

Your email address will not be published. Required fields are marked *