How Sassy (SASE) Is Your Network?

Four Steps Toward Securing Your Digital Transformation

The term SASE, pronounced ‘sassy,’ is kind of cute, isn’t it? But secure access service edge (SASE) is a serious focus for organizations seeking to protect their data in the cloud, across the Internet, and within private networks.

In its Research Note, “The Future of Network Security Is in the Cloud,” global IT research and advisory firm Gartner defined SASE as “a converged cloud-delivered secure access service edge.”

Why is this security edge so important in defending data?

Best practice security is multi-layered, and establishes security intricacies along the way, seamless and nonintrusive to the digital user experience, but which effectively make it difficult for malicious parties including bots to breach the network.

Whether you believe in the cute SASE term or not, the edge (aka your network endpoint connections) is integral in perimeter security and for protecting against threats, the spread of malware, loss of control, and massive contamination and business damage. The edge is almost always the initial point of digital infection; a vector for infiltration.

In what Gartner characterized as its early stages of adoption, SASE is being driven by digital transformation, the adoption of cloud-based services, software-as-a-service (SaaS), and mobile and distributed workforces. We have to connect to do our jobs, but along the way, we might ingest malware, which can lay dormant, waiting to spread. Spoofing the identity, looking for that next jump… We all know those unfortunate individuals on Facebook, whose identities have been used to spread contagious links.

Understanding the risk that comes with digital business growth, you definitely want to filter all this traffic coming into your network, so you might run it back through your on-premises security appliances and over network resources. This eats up a lot of network bandwidth and costs more than use of the public internet, IaaS, and the cloud.

SASE enables organizations to overcome this difficult security-versus-Internet-access tradeoff; this business transformation hurdle.

SASE Business Drivers

Why get SASE in your security approach?

When the data center is the center of your network universe, it can inhibit transformational business architectures. A social, non-engineering side of your “network” wants to grow: A workforce cost-effectively using the Internet to amplify business potential, and partners and customers plugging into your network, making transactions. But amid all these new connection points, is it really your network anymore? It’s understandable to have sudden network blind spots as connections outside your visibility test you for access versus maintaining digital security.

Gartner reports, “More users, devices, applications, services and data are located outside of an enterprise than inside.”

How do you encrypt and inspect all this traffic and filter all those packets and links before you allow them into the business’s bloodstream?

Rather than hairpin traffic back through your datacenter, smart and more cost-efficient network service can be achieved through software-defined networking (SDN) and SD-WAN deployments that are secured through the infusion of security-as-a-service from the cloud.

Why Evaluate OPAQ SASE?

Digital business transformation requires anywhere, all-the-time access to business IT services, many now located in the cloud.

OPAQ enables organizations to:

  1. Shift inspections out to the session layer vs. routing the sessions to software engines that have to centrally inspect and then reroute communications. Network traffic and sensitive data storage is shifting to cloud platforms vs. enterprise data centers. Why haul it all in for costly inspection when the OPAQ SASE cloud provides a safe, cost-effective barrier?
  2. Get over the business transformational hurdle of risk aversion. Use SD-WAN and MPLS backhaul offload projects as catalysts to modernize and optimize security through enterprising software-defined perimeters. Cloud-based SASE offerings heavily reduce the need to update security at the physical or software level. Network and IT staff won’t have to spend all their time setting up equipment and performing maintenance and instead can focus on business transformation, business tools, privacy requirements, as well as advanced, next-generation security schemas.
  3. Reduce network security complexity by moving to one or two third-party providers for the key components of SASE: i.e., secure web gateways, DNS, zero trust network access (ZTNA), and workstation segmentation. This favorable software portfolio reduction can reduce agent bloat and performance issues at the end-user level. OPAQ also provides the requisite peering partnerships critical for points of presence, reducing latency for performance-sensitive apps such as video, web conferencing and VoIP.
  4. Easily bolster network segmentation to avoid kill-shots as you connect with new data sources as part of digital business transformation. OPAQ protects your organization with separate secure tunnels for: A) private enterprise data access (through MFA and monitoring for sensitive data and malware) and B) always-on protection for remote employees surfing the web for business connections and while on public WiFi.

OPAQ delivers the core SASE components to protect your digital business transformation investment:

  • Secure Web Gateways
  • Firewall-as-a-service (FWaaS)
  • Leading advanced endpoint protection and segmentation
  • ZTNA (Zero Trust network architecture)
  • CASB capabilities

Enterprise data centers, which traditionally scrubbed the network from contagion, aren’t suddenly vanishing; they just aren’t the center of the universe anymore when it comes to granting secure access. To protect endpoint connections, SASE clouds can drift more flexibly and cost-effectively to secure the fluctuating perimeter

Get secure where the user requires access with OPAQ.

Download the Secure Network Modernization white paper

Download the Securing Remote Workers solution brief

Can In-House Cybersecurity Expertise Grow Under Cloud Coverage?

The overwhelming consensus: There’s a cybersecurity skills shortage. Some surveys have identified the cybersecurity skills gap in slightly more than half of surveyed companies, while other studies calculated the deficit higher and more dire, with those lacking cybersecurity expertise registering in the high-sixties or seventies percentile. Why is this important? In a survey, ESG found […]

Ransomware, and Why Organizations of All Sizes Should Evaluate Network Segmentation

You’ve probably read or discussed the news articles and public disclosures.

A major bank gets hacked, the personal data of a 100 million customers falls into the wrong hands, and it costs the bank hundreds of millions of dollars to fix.

A major U.S. municipality is held ransom for database control, forcing it to rely on old-school data-keeping methods as it courageously defies the extortive criminal demands.

How can these kinds of attacks succeed in today’s cyber-vigilant day and age?

The aforementioned are just the high-profile cases. Below the radar of the headlines, smaller companies encounter spoofing ploys, ransomware and evolving malware, and every day too many of them get compromised or deceived into sending funds to a cybercriminal.

There will always be human errors and cyber-villains seeking to capitalize, so, what is it that we can actually change? The answer lies in an evolving security architecture and how we define next-generation network segmentation.

Traditional Security Architectures Pose Risks

Nearly every harmful corporate cyber-assault is a lesson in unsound traffic patterns, of network blind-spots, of organizations not sufficiently insulating enterprise jewels, not properly segmenting network traffic and not adequately shoring up endpoint protection and access control against powerful automated takeover attacks.

It’s nobody’s fault really. The private network has changed, gotten more complex, become a WAN without boundaries. You have users connecting into the private network while they’re plugged into data transaction points outside your network security team’s control on the Internet and in the cloud, some of these access points potentially vulnerable. Do you want to allow traffic and files from Internet and multiple cloud access points to merge with important private network traffic and databases via common pathways? From a smart central security perspective, the twain should never meet.

What’s more, cybersecurity skills, especially in cloud network security, are in short demand, and network and IT departments have to wear many other hats in their jobs. It gets challenging to structure network patterns to keep roaming users connected and satisfied while also prohibiting sneaky lateral movement of suspicious or known threats. A zero trust network approach must not result in an unintended plethora of zero-access lines. Connection hurdles can hurt your business: employees still need to get data and communicate.

Network Segmentation, Microsegmentation, and Access Control

Your users are traversing myriad websites and Internet access points, downloading tools, plugging in at public charging stations and then connecting to private enterprise assets. Network segmentation is about restricting direct gateways into the heart of the business so traffic flow patterns don’t inadvertently put the organization at high risk. But network segmentation has been difficult and expensive due to the amount of resources and effort needed to reconfigure distributed physical equipment such as VLANs, routers and switches.

A next generation of network segmentation, microsegmentation (or software-defined segmentation) is the partitioning of workloads from one another, including in the cloud, between multi-cloud access points, and between data centers and databases.

Gartner wrote: “Microsegmentation (also referred to as software-defined segmentation, zero trust network segmentation or logical segmentation) uses policy- and workload-identity-driven firewalling (typically software-based) or network cryptography to isolate workloads, applications and processes in data centers, public cloud IaaS and containers. This includes workloads that span on-premises and multiple public cloud IaaS providers.”

What this translates into from a security perspective is when some of your databases and servers are hosted they creep out of your view and control, so keeping the workloads of these different transaction points separate is mandatory in order to protect your most precious enterprise data and digital assets.

Workstation Microsegmentation

Securing this larger, more distributed attack surface without talking about endpoint agents (i.e., software-defined networking on portable laptops and other human-manned mobile workstations as well as virtual machines) is unrealistic. These devices are all part of your network, whether you’re in the cloud or not, and an initial point of potential compromise.

It’s a hybrid, multi-cloud network for many organizations, not just one big tidy cloud environment. More-granular segmentation is needed in both cloud environments and your endpoint-defined private network.

Microsegmentation tends to merely represent a granular, cloud- and data-center-workload-focused approach to segmentation. But your segmentation should not be restricted to just data centers and clouds when you have to also protect end users connecting to each other, to the cloud, and to on-premises network assets.

OPAQ offers both network segmentation and microsegmentation at the endpoints, that is, on the devices that connect or traverse Internet, cloud and multi-cloud access points. Each protected endpoint, whether stationary or mobile, carries security and segmentation policy, ensuring that these devices don’t act as the conduits for infection with each other or networks, servers or databases.

Microsegmentation doesn’t have to be impossible for small and midsize enterprises or new branch offices, all in the crosshairs of powerful distributed attacks. Neither should the ability to rapidly roll out next-gen network security policy to endpoints, which nowadays is crucial for small and midsize enterprises and large-enterprise branch offices alike. Your endpoints are your weakest links, a ‘way in’ for the sophisticated attack and bad actor. Segmenting cloud and database workloads is smart, but a lateral spread can still afflict your workforce and cost you if you don’t bolster your endpoints with advanced security policy including network segmentation by host and user groups.

Don’t underestimate the threat of malicious lateral movement through your security architecture.

Find out more.

Endpoint Control

Request a demonstration.

 

SECaaS: How Cybersecurity-as-a-Service Can Enhance Coverage; Shrinks Costs

In our digital world, we tend to talk about the cloud, automation and virtualization as if every business professional and organization is consciously adopting virtual assets and deeply indoctrinated and invested in these technologies. Let’s face it… the cloud and virtual machines (cloud-hosted computers, databases and servers) are predominantly a large-enterprise, high-tech or platform-provider perspective bias, and those of us with a technologist bent tend to assume that every real-world company is digitally transformed in this regard.

However, it’s not so simple when you look beyond basic business network computing, Internet access and mainstream cloud app usage (AWS and Office 365).

Today’s reality is most network IT teams are still forced to patch and reconfigure hardware and software on an as-available human-resource basis versus leveraging automation as a way to try to stay ahead of evolving threats. For most companies, physical equipment is still predominant. It’s often still on premises, whether that’s a regional office or small branch office.

Most companies are still managing firewall hardware; some even have no firewall at all. They still treat network and security management as if the perimeter is ‘fixed in place,’ and trust their users will log into the company VPN when outside the fixed LAN security perimeter.

Meanwhile, end-user employees, coated only with antivirus protection, are roaming on their portable devices, connecting on this network host to that IP address. Ahh, digital business transformation… Your people want to expand their connections and help you to grow your business, but this wandering presents big IT security risk. Denial of service attacks, ransomware, phishing, identity spoofing, and increasingly sophisticated malware can breach and then tunnel into your digital network like a worm through an apple.

Digital transformation is an ongoing journey, a continuum, not a lasting status that an organization one day crowns itself with and then uses to rule over the market for many years while everyone else uses less-advanced tools. Because of this fluctuating landscape, small and midsize organizations can take giant leaps via digital-economy equalizers in the cloud that enable them to catch up or achieve strategic edge.

One of these digitally transformational accelerators is network- and security-as-a-service. There’s an IT skills shortage; network and cybersecurity expertise (the two often go hand in hand) are in short supply.

With an estimated 74% of organizations affected by a cybersecurity skills shortage, it’s ‘Advantage Hackers.’ One recent study reported 94 percent of IT security professionals believe the advantage has tilted to cyber-adversaries over cyber-defenders. (ISSA and ESG.)

This can lead to struggles in defending against the latest, most sophisticated cyber-attack or cybercriminal methods as well as the inability to patch software and hardware vulnerabilities rapidly. It can also leave your enterprise employees, workstations, networks and servers reliant solely on one or two static barriers, instead of a sounder, multilayered security architecture.

Exacerbating this cybersecurity skills shortage is network complexity, product overlap, and product fatigue. As the workforce becomes more distributed, network endpoints are moving and changing, making them difficult to inventory and manage. Meanwhile, backhauling all branch office and remote worker traffic through the core network is many times more expensive than providing these individuals with direct Internet access, and can introduce QoE latency. From both a business access and security perspective, small network and IT teams just can’t keep up across the many products, pieces of computing equipment and user access needs they have to manage across distributed sites.

Help for the network IT staff can come from automation and the cloud.

Security as a Service (SECaaS) for the Changing Network Architecture

What is security as a service (SECaaS) and why is it so important in a network without boundaries world?

At a high level, SECaaS is a rapid deployment that immediately solidifies both your network perimeter and lateral traffic security. It accomplishes this by providing key advantages over traditional IT security deployments.

  • Speed. With advanced cybersecurity skills in low supply, do you wait for the on-device reconfiguration to be performed, or do you deliver advanced security agents that don’t require routine in-house patch releases? SECaaS is distributed network security protection in minutes versus weeks or months.
  • Cost. The cloud empowers organizations, large and small, to more easily and rapidly facilitate less-expensive remote-office activation and branch-to-Internet connections. In this cost-efficient environment, SECaaS enables organizations to receive advanced security capabilities previously accessible only to deep-pocket large enterprises, and to do so without myriad tool acquisition and maintenance costs.
  • Network Performance. You don’t have to compromise on security or performance as you migrate some of your traffic off the private network and into the cloud. Conduct your traffic with greater precision and quality of service, taking advantage of less-expensive yet high-performant network transports while orchestrating and automating advanced network security across distributed domains.
  • Advanced Protection Against Targeted End Users. Firewalls do a good job of protecting the perimeter against north-south invasion, but when something inevitably does slip through the cracks (perhaps by compromising a device outside the firewall or VPN), it can spread laterally like wildfire. Secure your flexing and fluxing network, with always-on protection at the endpoints, which also defends against lateral movement leading to widespread infection, hijacks or outages.
  • Central Management. Hackers prey upon inconsistent security policy enforcement across distributed network infrastructures. SECaaS enables central enforcement of policy, which is automatically applied throughout the entire distributed network, strengthening protection and closing loopholes.
  • Simplicity. Whether you’re a managed security service provider or public or private network operator, OPAQ brings automation, easy orchestration and simplicity to your complex distributed network or networks. This IT service agility also makes it easier to meet regional and vertical compliance regulations.

Security-as-a-service can lead to easier, more holistic network security coverage for digitally transforming managed service providers and enterprises alike.

Visit our security-as-a-service (SECaaS) page.

 

Strong Endpoint Security Offers Firewall Alternative for SMBs and Branch Offices

Ahh, the firewall… that invaluable tool which monitors and protects traffic to and from an organization, as employees and servers communicate with the Internet and other networks or devices.

What would we do without them? Firewalls can block unauthorized access and inspect packets and prevent malware from infecting your network. A company might have an enterprise firewall at its headquarters office in Austin, TX, and another at its branch office 1,200 miles away in Charlotte, NC, and use these firewalls to enforce traffic and security policy across its network and access points. It might open a new office location in Chicago, IL, and equip that location with a third firewall and integrate it into the traffic and protection scheme. Or, conversely, the company might turn to a cloud firewall model to eliminate the amount of investment in physical security equipment and maintenance at its various sites. Either way, the company is taking prudent steps by incorporating firewall protection to help keep its electronic databases and other assets safe from infection, corruption, misuse, theft or ransom.

But what about a company that has only one office and 50 employees distributed across the country, most of whom travel extensively and are out of the firewall’s protective range? Do we expect them to log into the VPN when they work from their home offices or while visiting a client or attending a conference? Do we trust that they will log in? Does an enterprise-firewall-with-VPN strategy do much good here? And what if this small company doesn’t have the servers, routers and other equipment in its HQ office and instead leverages infrastructure in the cloud? Is a firewall appliance or cloud firewall really the most appropriate security solution for this type of organization?

Consider this: Firewall appliances at each office are there to protect the resident users, equipment (physical and virtual), and data. If your organization becomes so distributed as to have only a few people in the office and your server and database equipment in the cloud, the whole premise of the enterprise firewall loses its purpose. With intellectual property no longer on the premises to protect, it’s smart to consider a strategy in which network and security policy follow your employees wherever they are and wherever they go as they access private enterprise data from the cloud, and share data with one another.

Security at the Endpoint

Endpoint security is a strategy in which organizations or individuals attempt to stave off cyberattacks by fortifying remote equipment with on-device cybersecurity protection. Typically, this protection consists of antivirus software and scanning and complements a firewall. But when the firewall and VPN are eliminated from the equation, endpoint security must be stronger.

Cyber-attacks target individual users and their workstations via ransomware, Web browsers, document viewers, and multimedia players that download and execute content from the Internet in the hope of gaining a beachhead into the corporate environment. One wrong click or download by the end-user and the infection can spread laterally (east-west)… within the firewall… and across the internal network. No longer limited to big organizations and brands, SMBs are in the crosshairs of cyberattacks, with 43% of cyberattacks worldwide targeting small businesses.

Strong endpoint protection doesn’t replace all rationale for firewall use, but it can supplant traditional firewall and VPN strategies in certain scenarios.

  • In organizations in which many IT applications (e.g., Office 365 and Salesforce) and/or sensitive digital assets are no longer hosted in internal network datacenters. Often, traffic from remote workers is backhauled over the VPN to an enterprise control center, from which it is then routed back over another VPN connection to IT services in the cloud. This method of backhauling traffic is expensive, unreliable, and slow.
  • In organizations in which there are few or no company offices, and employees operate outside any firewall protection… Here, the workforce is largely distributed and transient, connecting to enterprise apps hosted in the cloud. In this scenario, endpoint protection needs to be more advanced and adaptive than static antivirus and firewall protection, and the flexing protection must be always-on.
  • In small organizations consisting of an owner and one or more 1099 employees, where workstations are limited to computers located in remote offices. Firewall and VPN protection for these companies may seem heavy-handed, while host-based antivirus and scanning may not be enough to enforce security concerns and Zero Trust best practices.

In these scenarios an organization wants to be able to protect its remote workers from cyberattacks, protect these users’ connections to Internet and cloud access points, and prevent the spread of malicious code or file-less malware. The firewall becomes obsolete in some environments, and the VPN impractical. Strong endpoint protection and network segmentation become a smart, effective defense.

OPAQ Endpoint Coverage

OPAQ Endpoint Protect provides easy-to-deploy advanced security-as-a-service for your distributed endpoint users. Organizations can employ it as a complement to the firewall or when firewall or VPN protection doesn’t make sense – for example, small offices of 25 to 50 users.

OPAQ secures remote workers and the private network from the latest threats. Security follows users wherever they go – whether they are in a coffee shop, inside an airport or on a plane or train. The protection goes beyond host-based antivirus signatures and scans and includes:

  • Network intrusion prevention and detection (IPS/IDS)
  • Network anti-virus/malware/spyware
  • External IP inspection and filtering
  • Network URL inspection and filtering
  • Zero-Day protection
  • Internet exposure minimization
  • Protection from both DNS- and Web-based assaults.

Meanwhile, OPAQ Endpoint Control governs your lateral traffic, providing secure access control and network segmentation. Using OPAQ Endpoint Control, organizations can place sensitive IT applications on the open Internet or in the cloud, while ensuring that only authorized users can access those applications. It can also be used to lock down internal networks, closing off unnecessary avenues for lateral movement by attackers who have compromised devices behind the corporate firewall.

Benefits:

Firewall displacement: Is a physical firewall at every office a waste? Are your remote users not logging into the VPN? OPAQ offers always-on advanced protection that doesn’t require your staff to invest and maintain the equipment.

Tightened endpoint security. Endpoint Protect ensures that every Internet connection initiated by the endpoint goes through OPAQ’s security cloud. This model provides affordable cloud-delivered enterprise-grade security for organizations that previously couldn’t afford or manage advanced security.

Stopping stowaways. The best approach to distributed security is to segment internal networks using software to contain the spread of attacks. OPAQ Endpoint Control is a network segmentation solution that gives you the visibility to see suspicious activity, quickly search for malicious network processes across your user base, and stop all network communication from infected endpoints.

Backhaul offload. Many organizations today are stuck backhauling full tunnel VPN traffic from remote workers to their enterprise. IT applications are increasingly hosted in private clouds, which are reached over endless VPN connections. Using OPAQ Control, organizations can break free from this inefficiency, moving to a model where trust is anchored in the user and the device, rather than the network they are on.

Security cannot be a static defense. To protect remote workers harnessing the cloud, leave the firewall behind and leverage strong, smart endpoint protection that is always on and evolving ahead of the latest threat.

Learn more about OPAQ EndPoint Protect

Read about Securing Remote Workers

The Virtual Private Network Is Dead Again? Not so fast…

Regardless of what you call it, the VPN concept remains crux in your defensive blueprint for secure Internet access.

The virtual private network (VPN), which must have more lives than a cat, has reportedly died again, and according to some industry prognosticators and influencers, VPN is now a bad word. It’s a term to be avoided by unblinking believers of the marketing-driven sleight-of-digit and word-wizardry mesmerism claiming the VPN is no longer an important concept for security. Don’t say VPN, they tell you. Be cool and use alternatives such as software-defined perimeter and secure Internet access instead.

Okay, I’ll try to remember that, I tell myself.

Then I see the new Spider-Man movie, “Spider-Man: Far From Home,” and the VPN term comes up in dialogue between the two main characters. Mary Jane advises Peter Parker (aka Spider-Man) to download a VPN on his phone so he can’t be digitally spied on. So, the hottest new movies are treating VPNs as still relevant, and even Spider-Man is consuming a cool VPN app that he can use to protect himself when ‘far from home.’

VPN. There, I said it. It’s just a word, right? A word we should be able to continue to use to describe a discipline and extended-zone principle that means more than Vendor A and B’s product marketing du jour. From a sound security standpoint, VPN is not just some product you have to buy and manage. It is still an important scheme in your WAN without boundaries defensive strategy.

The technical definition of VPN is a secure, often encrypted connection between trusted device and private network or server. With the network expanding and your mobile employees going wider into unsafe waters, do you want to stop focusing strategically on virtual private networks? All a VPN is an extended zone of protection. You can’t just magically wave a wand and say you’re protected without extending network security policy out to endpoint devices.

Industry projections support the VPN’s immediate survival, dispelling some of this zeitgeist semantical doomsday talk which can be misleading from an overall security perspective. As organizations expand their networks, or outsource some or all of their IP backbone, applications or services in the cloud, the VPN doesn’t disappear; it just gets more virtual like the cloud itself.

The cloud VPN market is estimated to grow at a CAGR of over 21% by 2024, led by increasing shift toward virtual applications and the surge in demand for cloud services, according to Global Market Insights. Another report from Market Research Future puts the VPN market CAGR at 18% through the end of 2022.

So what is all this hog-splash about VPN being a dirty word, a nonexistent thing, a strategy component that some vendors would have you strike from your lexicon, something to be hidden from your transformative security strategy?

Authentication: A Pain in the Protective VPN Ring

Maybe this sustained campaign to bury the VPN – or call it something else – is because the VPN carries associations in which remote user traffic is backhauled to data centers hundreds of miles away, resulting in latency and the use of expensive private lines.

Maybe it’s because traditional VPNs often hassle end-users for constant sign-ins and additional passwords, and users don’t bother using the VPN when they work on company devices, leaving the organization exposed. Although organizations strongly encourage employees to use the VPN when remote or using public networks, the majority of the time employees don’t bother. Requiring additional authentication by end-users can mean more pain, and this has emboldened some vendors to get into semantics hype, or maybe they’re attempting to skirt privacy issues. There’s no more VPN, but you’re safe, they say. Voila. Never mind the man behind the curtain.

What product marketers are actually getting at is they are replacing the traditional prompt-based authentication and authorization with less-jarring solutions under the veil of buzzwords like software-defined networking and software-defined perimeters (SDPs). We’re doing SDN and SDP, too, but for those looking to protect all traffic from the IP layer (Layer 3) and up, VPN is still a requirement.

Engaged employees want access to data and tools that empower them to get the information they need, without being pulled aside for additional verification.

Whether it’s a VPN that is always on, or the same principle through SDP, when your employees use the Internet, protection should follow them wherever they go.

Virtual private network (VPN) is a concept, a best practice, not a now-obsolete product term as some would play you a fool for in telling you to strike from your vocabulary. Virtual private networks still provide us with structure, an easy-to-grasp overall term meaning extended private network security and protection across a constantly flexing network perimeter.

Our world feels less physical… Even venerable virtual private networks are getting more virtual, more seamless and less overtly intrusive for end users. VPNs help to defend us, and in instances where they require interaction with us for additional verification, we tolerate the balance between our productivity, privacy, and enterprise security.

Cyber Risk Management: Avoiding Business Disruption as You Digitally Transform

What is cyber risk management? For too many budget-restricted small-to-midsize enterprises, cyber risk management means trying to protect the network and datacenter by establishing antivirus and firewall security safeguards against known attack vectors and across known parts of the network. But cyberattacks are getting more technologically advanced, and malware and social engineering ploys regularly slip past these basic perimeter defenses, regardless of an organization’s size or brand.

Industry surveys estimate that between 43% and 58% of cyber-attacks worldwide target small businesses. Cisco found that 53% of SMBs have reported a breach, while, according to the Better Business Bureau, about 36% of small businesses that reported being a target of a cyberattack ended up losing money.

The attacks often start by popping an end user – a digital mobile warrior or someone in a remote office – taking advantage of human error, under-inspected email links and attachments, or the Internet access points these employees use to consume or share data. These vulnerable network endpoints and access points can represent dark holes in your network visibility, i.e., blind spots outside your private network. Your network can then get infected without you even knowing about it, with industry breach detection medians and averages ranging between 70 and 200 days. The existing level of defense is just not enough anymore.

Are you able to protect computing devices that are communicating in public places where airwaves are shared, where login redirects are easy for hackers to host, and where open ports back into your network can jeopardize the sanctity of your network and data? Are you able to detect and stop the intrusion once it breaches your perimeter and attempts to spread laterally?

The use of digital computing, social networking and ‘app sharing’ for business agility brings a new and widening set of challenges and evolving types of cyber-attacks… attack vectors that are different than the ones we may have heard about last week. It’s difficult to keep up.

The malicious code itself is being recompiled and is getting better at penetrating networks and fooling static defenses and human judgment. Digital and wireless points of transaction left unattended or poorly protected against compromise allow your user’s credentials to be stolen and then used in attacks on your network, data, partners, finances, and the future of your enterprise. Don’t be the low-hanging fruit due to a static level of defense.

Continuously evolving advanced security is needed to protect you, your users, and data. However, keeping security strong traditionally involves costly rollouts and updates at the physical equipment level. Exacerbating the challenge is that there are other parts of the business that need the investment more and you just can’t afford additional cyber risk management practices. Or you’re uncertain what to do about the risk, business disruption, or potential (or yet-to-be-detected) damage to your organization. For example, as your business grows, you may not be sure what to do about regional privacy law violations if you discover that the data of your employees or customers has been hacked…

Advanced Cybersecurity and Risk Management

Cyber risk management is a discipline practiced by organizations to protect themselves from cybercrime and digital threats that can disrupt business. Cyber risk management typically consists of threat assessment, cyber protection tools, and security controls and guidance, with advanced security and cyber insurance often being the missing components. Only between 15% and 38% of small to midsize businesses have cyber insurance coverage. Seek out cyber insurance partners with programs designed to suit the needs of small-to-midsize businesses (SMBs). Policies should be transparent about the details of coverage and be flexible and affordably priced to help SMBs to incorporate cyber insurance into their risk management programs.

Modern, holistic cyber risk management is hard. It can be difficult to manage and afford by yourself, which is why too many SMBs fall back on the most rudimentary cyber defenses. It doesn’t have to be that difficult or costly anymore.

Digital business transformation is about adopting new technological competitive advantages and efficiencies, and adapting process for opportunities and risks. This can be harnessed from the cloud, giving small and midsize enterprises a more level playing field on which to compete.

Make sure a hack doesn’t disrupt your business. Check out this turnkey cyber risk management solution that’s purpose-built for SMBs.

More information:

Why Firewall-as-a-Service Makes Sense for Your Growing, Distributed Network

It’s true that cloud adoption won’t eliminate all your IT infrastructure equipment at every office. But this doesn’t mean you have to stock up on big-ticket items such as servers, single-purpose routers, switches, security appliances, datacenter square footage, power and cooling, plus manpower, at every new site your organization operates.

Enterprises have traditionally established IT infrastructure within each branch office for the purpose of connecting remote workers with the headquarters, branch offices, and the Internet. This approach typically requires the procurement of an assortment of network, server and security equipment, which is expensive to acquire, manage, maintain and store.

Your branch offices don’t have to be so equipment-intensive and space-eating anymore. Cloud infrastructure is a viable way to grow and secure your network rapidly and efficiently, without having to build out and maintain the infrastructure yourself. You see, cloud infrastructure can flex to the needs of organizations large and small, thanks to a dozen or more years of investment, innovation and proven value. The cloud has led to shared efficiencies, where even the smallest of businesses can tap into and harness the pre-built infrastructure for networking, software, web presence, billing, and more, via providers such as Amazon, Microsoft, Salesforce, Shopify, and countless others.

Similarly, security services can be hosted in the cloud, where smart traffic orchestration and advanced protection capabilities can be deployed instantly across your distributed network, without complex and costly onsite maintenance.

Firewall in the Cloud: Why Firewall-as-a-Service?

Bolting security into your existing network infrastructure can be a massive, complex and costly task that never ends, including for organizations already doing business in the cloud or those grappling with multicloud environments where the juxtaposing concepts of a tight perimeter and accessibility can foil one another. A firewall can solve some of these tradeoffs through packet filtering, TCP/IP monitoring, and advanced traffic inspection, but the traditional equipment-centric approach hinders the ability and agility of companies to keep ahead of fast-evolving security threats that can cross Internet gateways and gain access to the private network.

Firewall-as-a-service (FWaaS) is a digitally transformative alternative that dispenses the need for physical firewalls at every remote site and enables an organization or managed service provider to simplify security operations in the cloud, where cost and efficiency advantages such as shared economy of scale (multitenancy) and rapid service delivery reside.

Additional advantages of FWaaS include centralized control, easy and consistent distribution of the latest generation of security capabilities, scalability beyond on-site hardware limits, and more-predictable cost and budgeting.

Reduction of security hardware management and maintenance – By supporting multiple branch offices and remote workers through a flexible cloud-based firewall approach, IT management teams are likely to see hardware acquisition and recurring maintenance costs go down. OPAQ Firewall-as-a-Service empowers organizations to reduce the amount of network edge devices they procure, support and replace, and instead realize a predictable security investment that is right-sized for them. OPAQ clients have reduced costs by as much as 40%, and are better able to leverage their limited security personnel for essential security priorities.

Central management and consistency – Through a single cloud console, FWaaS offers consistent security policy management across multiple offices/locations and remote users. Network and IT security managers can route traffic through policy enforcement checkpoints in the cloud to ensure protection and performance of communications and attachments between your offices, ISPs, the public Internet and more.

Faster deployment and ongoing updates of advanced security – OPAQ Firewall-as-a-Service is next-generation protection powered by Palo Alto Networks, a leader in Gartner’s Magic Quadrant for Enterprise Firewalls for seven consecutive years. The OPAQ Firewall-as-a-Service model enables organizations and managed service providers to deploy advanced security capabilities across the network without the need for time-consuming onsite device reconfiguration. Initial deployment, timely security updates and customized subscriptions become less time-consuming and less costly. Once deployed, the addition of new features — such as moving from antivirus inspection to file sandboxing or decrypting SSL —no longer relies on the size and capacity of the firewall appliance at a specific site.

Firewall-as-a-service represents a smart, fast and efficient way to fluidly administer the latest, most comprehensive protection across your network and vulnerable points of ingress and egress.

To find out more, read the Firewall-as-a-Service solution brief in our resources section.

 

Why Wireless Security Protocols Won’t Protect Your Roaming Remote Workers

Whether it’s in a coffee shop, airport or crowded mall, wireless networks present a range of security risks not inherent in wired networks. Wireless access points (WAPs) and wireless routers broadcast data over the air in every direction. In hotspot environments where this traffic is unencrypted, any eavesdropping device within a limited range can easily pick off the signals and steal information.

The threat, while diminished, isn’t eliminated when WEP, WPA or WPA2 wireless encryption standards are employed to protect the data. WEP encryption can be cracked in minutes, and hackers have also compromised modern routers utilizing WPA and WPA2. Organizations can patch the vulnerabilities in their WPA and WPA2 protection, but the threat doesn’t end there.

Using readily available wireless sniffing devices such as the popular WiFi Pineapple, determined hackers can spoof the WiFi network as part of a man-in-the-middle attack to steal user credentials, insert malware, and compromise machines, whether the user is still in the café or has returned home or to a nearby office.

Outside the enterprise firewall, VPNs help with these mobile worker scenarios, but remote endpoint security relies heavily on the human element: What people do, what they don’t do. Even the best employee will temporarily disconnect from the corporate VPN to access the Internet directly, exacerbating the risk of infection from spyware, malicious sites or embedded files. Users go into coffee shops and airports and board trains and then bang away on their keyboards and do work. They make sustenance purchases. With the right level of caffeination, they can be rather productive in their contributions of digital and perhaps even audio- or video-delivered work. They’re focused on the job at hand, and they don’t want to be hassled by too many security steps in order to maintain a productive pace. You know the drill: Log into the VPN, complete two-factor authentication, and then, due to any extended human pause such as deep thought or bathroom break, you have to do it all over again just to resume your work.

In addition, wireless data encryption and VPNs, even when used, can’t stop shoulder surfing, and unattended machines are a big no-no since thumb-drive malware insertions can successfully be executed in seconds.

According to IDC research, more than 70% of breaches start at the endpoint. From there, a hacked employee, or a hacker or malware piloting the compromised device, might then use a “secure” tunnel to access your organization’s active directory, or a customer communication tool. Here, the compromised endpoint can lead to widescale network infection including the loss of data, network control, reputation and business.

Distributed Network Security Requires Endpoint Visibility

Do you know all the assets connecting to your network? The pathways they’re taking, the payload or suspicious behavioral tics or storms they’re carrying? Can you recognize immediately who is trying to connect to your network, using which app, on which device, and quickly authenticate identity, monitor and control for appropriate network usage?

Traditionally, on-device endpoint protection is managed sporadically and inconsistently, which is not an effective way to maintain a shrewd Zero Trust approach across your network. Ransomware, bots and malware have a way of morphing to get past static, outdated antivirus protection at the endpoints. In the majority of cases, especially when involving BYOD, the hardware drive isn’t encrypted and the VPN isn’t used. Exposure to ransomware threats increase outside the private network – for example, a largely unprotected mobile employee opening email or entering data into your network from a crowded restaurant or a public hotel. Intrusions such as spyware, password theft, and open-port assaults can all result from a malicious presence lurking, listening and entering from a nearby or remote location.

Do you really want an employee plugging his laptop into a public charging station at an airport and then reconnecting directly to your live conference, private network or datacenter without first orchestrating detection and authentication? Do you want to leave network pathways open so new worms, viruses, malware and other hacker schemes can spread? Firewall and VPN defenses are vulnerable to this lateral exploitation. Workers, whether mobile or in the office, as well as certain types of computing architectures, can inadvertently leave open windows for malware and file-less malware schemes such as social engineering ploys to spread deeper into the network. As if that’s not enough, denial-of-service (DoS) attacks are increasingly targeting prone remote users for an easy entry point (sometimes via another protocol known as Remote Desktop Protocol, or RDP) and they can then flood your network.

Advanced Always-On Endpoint Protection

You can’t rely on wireless security protocols, disciplined VPN use, and static antivirus protection to secure your remote workers as they run the gauntlet of cybersecurity threats outside your firewall. Your endpoint protection must be always-on, even when your people aren’t.

Through efficiencies in the cloud, OPAQ enables organizations of all sizes to bolster and continuously refresh remote security with:

  • Always-on end-user protection and advanced malware detection and prevention.
  • Strong authentication, including multi-factor and/or directory-based.
  • Encrypted communication over SSL or VPN, as well as on-device hard-drive encryption.
  • Suspicious activity alerts about what a company device has connected to.
  • Smart processes and safeguards before the device connects to your organization’s private networks, including a sensible screensaver timeout policy.
  • Microsegmentation, which provides additional layers of security against the spread of malware or unauthorized network control. Microsegmentation works by isolating workloads from one another and creating secure network zones that prevent infected hosts from connecting to each other or to the core network. It produces separate secure tunnels for users who are roaming and those who have been authenticated for more private network and data access. In the past, the cost and effort of network segmentation versus the risk of lateral infection was too much for many organizations to bear, but the cloud has enabled organizations to implement such advanced security controls more efficiently and cost-effectively.

Reinforce your security at the endpoints and reduce your attack surface with just a push. Apply smart, on-device security-as-a-service at the endpoint without compromising user experience or performance.

Learn more
Read the OPAQ Securing Remote Workers report.

Why Endpoint Security Is Crucial in Our ‘WAN Without Boundaries’ World

Networking: It’s not just about the physical communication structure you have to maintain. Networking is a way to grow your business, your brand, your market potential.

Leveraging the open Internet and social apps in the cloud can be more cost-effective than travel, face to face, and complete reliance on communication and collaboration over expensive private networks. However, employees are not always within the secure enterprise firewall/private WAN as they perform the functions of their jobs. Think electronic payment systems, for example, or public hot spots where the employee doesn’t first connect to your VPN. This venturing outside the perimeter leaves them – and potentially your entire company – exposed to hostile elements. Bad actors, someone or something that tries to deceive, steal or destroy, are lurking out there and trying to break in through the same Internet we’re using.

Your customers’ privacy, data, and finances are at risk, too. Data hosters and managed service providers are targeted regularly. When cracked, they lose their customers’ information and trust. The pilfered private information can be sold on the Dark Web, which is an anonymous realm where more than half of the web domains practice illicit activities.

A stateful firewall, one that inspects network traffic and packets, is not enough. Hackers, cybercriminals and AIs can successfully attack through deeply embedded, well concealed, or file-less schemes. In addition, firewalls are not good at stopping infections once a breach has occurred. You have to also be able to inspect credentials and network behavior so intruders are not able to cover their tracks, control your systems, and ruin your business and reputation.

Unfortunate Security Scenarios for Your Distributed Network and Workforce

So, realizing the threat, do you send teams out to all your branch offices for equipment reconfiguration? Maybe … But what do you do the next time, when the hackers start to exploit vulnerabilities in your soon-to-be legacy protection system? A lot can go wrong during this catch-up period.

  • Hackers, targeting easy prey, get in due to delays in applying a patch for remote access protocol. They borrow administrator privileges and create new phony accounts. It’s a deep hack. Your data, your customers’ data, has become theirs.
  • An employee in a small remote office, prone to email-driven social engineering ploys, gets infected. Any peer to peer communications from the employee’s machine can spread malware or misleading information to other users and systems.
  • Joe plugs his phone into a public charging station … or maybe he’s using a wireless network at a subway coffee shop where a sneaky neighboring device is monitoring traffic on the shared network. Oops. He forgot to log into the encrypted VPN before enjoying his espresso drink and clicking a digital link. Joe’s phone (the endpoint) thereafter starts acting suspiciously inside your own network, whether you can see this happening or not.
  • Poor Joe. In another scenario, he’s at an all-week conference and in the habit of leaving his laptop open and “on” in the hotel room when he’s not there. His system’s apps are still on, and the room’s visitor doesn’t even have to know Joe’s screensaver password. Just a little plug-in and the unauthorized person can fool your network into believing phony instructions from the endpoint are authentic.

Do you want to wait for the next truck roll to bolt on security against these very possible scenarios?

Why Remote Security Is Vital for Your Growth Strategy

Endpoint security is not just about token antivirus protection on mobile devices and a reliance on the user to log into your VPN. It’s about always-on protection wherever your employees go to do business, hence helping your organization to win in the aforementioned scenarios. You have to be able to inventory and secure all corporate-issued mobile computers and bring your own devices (BYODs) to ensure network performance and security. Doing this only at the network equipment level makes for a porous net in fighting crime at a wider network level. Instead, counterattack at the device level (phones, laptops, tablets), for these are the touchpoints roaming into the sometimes-hostile outside world.

Read the OPAQ report that stresses the criticality to:

  • Centralize team security by automatically inventorying remote and mobile endpoints inside a security-conscious dashboard.
  • Apply next-generation endpoint protection including strong authentication, encrypted communication, anti-virus management, anti-spyware, advanced malware filtering and protection, and microsegmentation.
  • Protect users with an always-on VPN that secures them while on the public Internet as well as while accessing private enterprise data, with separate clean corridors for each.

Read the Securing Remote Workers report.