- Advanced information and communication security solutions
- Cisco Umbrella – WEB Access Protection Platform
Cisco Umbrella – WEB Access Protection Platform
The information security challenge in cloud-based applications
In today’s world users have long been unrestricted to work within the organization. All services and applications are provided in the cloud, but standard security solutions are left behind. Cisco Umbrella is changing the rules of the game of information security solutions and introduces a cloud-based information security platform, capable of dealing with cloud-based threats.
The information security challenge in moving the work environment to SaaS
The IT environment in organizations has evolved greatly in the last decade. Critical infrastructure provides services, applications and data moving to the cloud and leveraging the need for a public or private cloud, Salesforce.com, Box, G-Suite, Office 365 and more infrastructure.
SaaS software provided as a service is implemented in organizations whether approved by the IT and information security team or not. Thanks to regulation and not just because of it, many questions arise about how to protect sensitive data that are not necessarily under the control of IT and this also has a significant impact on how employees perform their work.
Users, especially when they are out of the office, no longer need to connect to the corporate network to gain access. They usually connect directly to applications and / or services when it comes to SaaS. In addition, many organizations now use direct internet connections in branches, which means that many surfers do not receive the protection through the security layer in the organization.
Not only do more offices connect directly to the Internet – it is estimated that 70% of office users have direct Internet access today. For potential attackers this is a vulnerability that will be exploited automatically.
Here are some research facts:
- 82% of companies included mobile users who admitted that they sometimes bypassed corporate VPNs to work
- 15% of malicious spyware operating in Command & Control format (C2) calls in entrances other than 80/433 to receive instructions from the attacker’s infrastructure mainly to encrypt data
- In fact, 91% of malware uses DNS to “encrypt” and “ransom” campaigns
To address these new challenges, information security controls must be modified accordingly and support access to cloud applications. Enterprise information security needs to evolve to protect users wherever they have Internet access. Traditional secure gateway solutions cannot cope with the technological gaps that have been created and only a new approach of a different gateway to the Internet can meet the challenge of user security.