Welcome!

@CloudExpo Authors: Liz McMillan, Jason Bloomberg, Pat Romanski, Kevin Benedict, Elizabeth White

Related Topics: @CloudExpo, Microservices Expo, Microsoft Cloud, Open Source Cloud, Containers Expo Blog, Cloud Security

@CloudExpo: Article

How Do You Eat a Network Security Elephant?

A cloud security take on an old riddle: analyze risks, deploy scalable model, and leave room for dessert

One byte at a time.

Now before you roll your eyes at my stupid pun, consider the deeper wisdom to this IT twist on an very old adage.

Security is big. It encompasses a great many definitions, confronts a great many issues and is addressed through a great many solutions using a great many formats. For many organizations, it can be an overwhelming proposition. Beyond the issues of data defense, regulatory compliance, traffic management, identity regulation, archiving, reporting, access control, intrusion detection, encryption, app administration, help desk assistance, there is the job the IT pro was hired to do…ensure the smooth technical operation of their organization. Securing the disappearing network perimeter and beyond has become more than a full-time job in itself.

This is a Gordian Knot conundrum for smaller enterprises and SMBs. In many cases, they are under the same threat, responsible to the same agencies for compliance and simply don’t have the bandwidth, or budget. But security is too big to ignore, yet too big to eat the whole elephant. Often it comes down to a decision between limited scope and performance. At the risk of seriously mixing my metaphors, it is like being asked to make a choice between wearing a suit of armor or holding a shield.

Most companies will invest barely enough to stave off penalties but not enough to honestly protect their assets or regularly avoid further audit scrutiny.  This usually means a base level of protection of firewalls, email scanners, malware detection and sys-log archiving. They chose the shield even though they know the suit of armor is a better course of action.

Now I don’t advocate buying a suit of armor because I am an armorer. There is responsible defense and then there’s overkill. But, remember, there’s still an elephant in the room. And that elephant is that inside salesman who  leaves under less than ideal circumstances; he’s the brute force and denial of service attack feints; he’s every at risk password, spoof, phish, hack, breach; every suspicious IP address from China and repeated failed login; and in this case what you don’t know will eventually hurt you.

And so, the elephant still remains uneaten. But it doesn’t mean you have to break the bank. It doesn’t mean you have to hire an army of experts. Eating a security elephant starts by eating it one byte at a time…and that means creating a coherent strategy of priorities that match the need of your size, your hierarchy, your industry, your growth arc while understanding your risk exposure. The fact that your SMB is modestly sized, does not mean you’re less likely to be infiltrated or that your data is more secure because you operate under the proverbial radar. It’s simply faulty logic. As I’ve emphasized  in earlier blogs (here, here, and here), its not even a matter of if, but when. But in all honesty, it’s probably already happening on some level (studies and stats noted here).

So going back to our palatable pachyderm…the over arching issue is not just how to eat the elephant, but knowing which are the edible parts and which bites provide the most nutrition. For many it comes down to how much is in the wallet and how many diners there are at the table. So if we are going to eat this elephant one byte at a time…where does the first fork plunge in (sorry to my vegetarian friends for this extended metaphor!)?

It’s a different answer for most companies, but there are certain common denominators: asset protection and regulatory compliance integrity. The answer is more than firewalls and latent sys-log collection and review.  For many companies that first bite is a variation of intrusion detection (boundary defense), application monitoring, network device monitoring, developing and reviewing audit logs, data loss prevention processes and alert procedures. Based on the requirements developed by most regulatory agencies (PCI, FFIEC, FISMA,  HIPAA…), this is a hybrid of several solutions, but SIEM (security information and security event management) and log management play the central role.

In a survey sponsored by a Microsoft funded think tank, the results showed that security frugality makes one a soft target for data theft. But we’ve always known security is a “get what you pay for proposition.” If you pay for a shield, your entire back flank is exposed. However, you just can’t support the cost for a full set of armor. Yes, frugality can be precarious, but if funding and resources are spent wisely, even a modest company expands the effectiveness of its security capabilities.

Cloud security is that equalizer that removes the emphasis on capital expenditures and intensive man hours and places them on end results. The concept of SIEM (intrusion detection, real-time alerting, stack correlation) is sound, but the application is often beyond the operation and budget scope of small companies. SIEM from the cloud removes those cost obstacles; no servers to buy, no suites to install. But let’s make this first bite even more delicious…what if it could also incorporate the features and functions of an enterprise log management deployment for the same cost?

As a single bite, it makes great sense.  It has great “nutrition;” it’s a cost-effective “meal;” and leaves room to add another bite when you’re “hungry” later on.  As an important priority, it addresses key concerns such as knowing who is accessing your network perimeter, enforcing actionable plans to deal with suspicious activity, streamlining tedious compliance reporting,  maintaining vital privacy directives, and creating 24/7/365 real time visibility on your assets. The survey referenced above noted 62 percent of cloud-adopters said their levels of privacy protection increased. Nearly all, or 91 percent, of the SMBs using the cloud said their cloud provider made it easier for them to satisfy compliance requirements. This is in stark contrast to the 39% of on-premise users who said compliance requirements barred them from using cloud applications.

Another benefit is the scalability of your first bite. To some, SIEM and Log could be this full-size elephant with large tusks: analyzing upwards of 2000 events per second, monitoring hundreds or thousands of devices. But if your company is a tenth of that size, you don’t need all that power. You need an elephant that fits on your right-sized plate. Again security from the cloud allows for the same enterprise-class power, but at a significantly scaled back deployment. And the cost is right-sized as well. In many cases there are package bundles and tiered programs that make this bite more than manageable.

So, to recap…how do you eat a security elephant? Analyze your company’s existing risks with what you are currently doing (or not doing!), identify specific needs to improve or expand based on those vulnerability gaps, develop a priority list based on your technical capacity with deference to regulatory requirements and client/brand trust, address the highest priority that has the furthest reaching impact, deploy a scalable model that generates manageable TCO, measure results and….

Leave room for the next bite…and that just might be including a new division or department for monitoring/assessment,  Identity Management (IDaaS), Access control, single sign on, automatic provisioning, password management, SaaS federation or a long line of other important victuals. Which, by the way, can all be deployed, managed and unified in the cloud.

Kevin Nikkhoo

Great things are not done by impulse, but by a series of small things brought together” – Vincent Van Gogh

Cloudaccess.com

More Stories By Kevin Nikkhoo

With more than 32 years of experience in information technology, and an extensive and successful entrepreneurial background, Kevin Nikkhoo is the CEO of the dynamic security-as-a-service startup Cloud Access. CloudAccess is at the forefront of the latest evolution of IT asset protection--the cloud.

Kevin holds a Bachelor of Science in Computer Engineering from McGill University, Master of Computer Engineering at California State University, Los Angeles, and an MBA from the University of Southern California with emphasis in entrepreneurial studies.

@CloudExpo Stories
SYS-CON Events announced today that SkyScale will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. SkyScale is a world-class provider of cloud-based, ultra-fast multi-GPU hardware platforms for lease to customers desiring the fastest performance available as a service anywhere in the world. SkyScale builds, configures, and manages dedicated systems strategically located in maximum-security...
SYS-CON Events announced today that Datera will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Datera offers a radically new approach to data management, where innovative software makes data infrastructure invisible, elastic and able to perform at the highest level. It eliminates hardware lock-in and gives IT organizations the choice to source x86 server nodes, with business model option...
DevOps at Cloud Expo, taking place October 31 - November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 21st Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to w...
21st International Cloud Expo, taking place October 31 - November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Me...
SYS-CON Events announced today that DXWorldExpo has been named “Global Sponsor” of SYS-CON's 21st International Cloud Expo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Digital Transformation is the key issue driving the global enterprise IT business. Digital Transformation is most prominent among Global 2000 enterprises and government institutions.
SYS-CON Events announced today that Massive Networks will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Massive Networks mission is simple. To help your business operate seamlessly with fast, reliable, and secure internet and network solutions. Improve your customer's experience with outstanding connections to your cloud.
When shopping for a new data processing platform for IoT solutions, many development teams want to be able to test-drive options before making a choice. Yet when evaluating an IoT solution, it’s simply not feasible to do so at scale with physical devices. Building a sensor simulator is the next best choice; however, generating a realistic simulation at very high TPS with ease of configurability is a formidable challenge. When dealing with multiple application or transport protocols, you would be...
SYS-CON Events announced today that Akvelon will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Akvelon is a business and technology consulting firm that specializes in applying cutting-edge technology to problems in fields as diverse as mobile technology, sports technology, finance, and healthcare.
Connecting to major cloud service providers is becoming central to doing business. But your cloud provider’s performance is only as good as your connectivity solution. Massive Networks will place you in the driver's seat by exposing how you can extend your LAN from any location to include any cloud platform through an advanced high-performance connection that is secure and dedicated to your business-critical data. In his session at 21st Cloud Expo, Paul Mako, CEO & CIO of Massive Networks, wil...
In his session at 20th Cloud Expo, Scott Davis, CTO of Embotics, discussed how automation can provide the dynamic management required to cost-effectively deliver microservices and container solutions at scale. He also discussed how flexible automation is the key to effectively bridging and seamlessly coordinating both IT and developer needs for component orchestration across disparate clouds – an increasingly important requirement at today’s multi-cloud enterprise.
As more and more companies are making the shift from on-premises to public cloud, the standard approach to DevOps is evolving. From encryption, compliance and regulations like GDPR, security in the cloud has become a hot topic. Many DevOps-focused companies have hired dedicated staff to fulfill these requirements, often creating further siloes, complexity and cost. This session aims to highlight existing DevOps cultural approaches, tooling and how security can be wrapped in every facet of the bu...
For financial firms, the cloud is going to increasingly become a crucial part of dealing with customers over the next five years and beyond, particularly with the growing use and acceptance of virtual currencies. There are new data storage paradigms on the horizon that will deliver secure solutions for storing and moving sensitive financial data around the world without touching terrestrial networks. In his session at 20th Cloud Expo, Cliff Beek, President of Cloud Constellation Corporation, d...
IT organizations are moving to the cloud in hopes to approve efficiency, increase agility and save money. Migrating workloads might seem like a simple task, but what many businesses don’t realize is that application migration criteria differs across organizations, making it difficult for architects to arrive at an accurate TCO number. In his session at 21st Cloud Expo, Joe Kinsella, CTO of CloudHealth Technologies, will offer a systematic approach to understanding the TCO of a cloud application...
"With Digital Experience Monitoring what used to be a simple visit to a web page has exploded into app on phones, data from social media feeds, competitive benchmarking - these are all components that are only available because of some type of digital asset," explained Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Systems, in this SYS-CON.tv interview at DevOps Summit at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
SYS-CON Events announced today that Secure Channels, a cybersecurity firm, will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Secure Channels, Inc. offers several products and solutions to its many clients, helping them protect critical data from being compromised and access to computer networks from the unauthorized. The company develops comprehensive data encryption security strategie...
SYS-CON Events announced today that WineSOFT will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Based in Seoul and Irvine, WineSOFT is an innovative software house focusing on internet infrastructure solutions. The venture started as a bootstrap start-up in 2010 by focusing on making the internet faster and more powerful. WineSOFT’s knowledge is based on the expertise of TCP/IP, VPN, SS...
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
SYS-CON Events announced today that App2Cloud will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct. 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. App2Cloud is an online Platform, specializing in migrating legacy applications to any Cloud Providers (AWS, Azure, Google Cloud).
The goal of Continuous Testing is to shift testing left to find defects earlier and release software faster. This can be achieved by integrating a set of open source functional and performance testing tools in the early stages of your software delivery lifecycle. There is one process that binds all application delivery stages together into one well-orchestrated machine: Continuous Testing. Continuous Testing is the conveyer belt between the Software Factory and production stages. Artifacts are m...
When shopping for a new data processing platform for IoT solutions, many development teams want to be able to test-drive options before making a choice. Yet when evaluating an IoT solution, it’s simply not feasible to do so at scale with physical devices. Building a sensor simulator is the next best choice; however, generating a realistic simulation at very high TPS with ease of configurability is a formidable challenge. When dealing with multiple application or transport protocols, you would be...