Have an account?
  •   Personalized content
  •   Your products and support

Need an account?

Create an account
Cisco Umbrella: Simple, effective security for network transformation

Cisco Umbrella: Simple, effective security for network transformation

Enjoy this exclusive excerpt from our eBook “Simple, effective security for network transformation.” Download the full document below.

umbrella-ebook-600x400

Security’s new battlefield: mobility, SaaS, and branch transformation

Data and computers used to be protected by securing the network, as all user activity passed through it. Today, things are different. The explosion of mobile, cloud, BYOD, and IoT present challenges on every front:

1. Mobility. Today’s users work everywhere. And if they’re off-network and don’t use the VPN, their devices are vulnerable to malware.

2. Branch offices. Instead of backhauling traffic to corporate, about 70% of branch offices now connect directly to the internet, leaving devices and data vulnerable due to insufficient on-site security. As companies shift toward software-defined WAN to reduce MPLS costs and boost performance, cloud-delivered security becomes even more critical.

3. Cloud-based apps. When business units tap innovative cloud services for competitive advantage, they place corporate data outside the perimeter. But, you can’t protect what you can’t see.  

4. New threats. Today’s security threats are more complex, more numerous, and more dangerous than ever before, especially for already-strapped IT security teams.

5. BYOD. When visitors and employees use personal devices to connect on-site, your Wi-Fi inadvertently opens the door to malicious files.

6. Internet of Things (IoT). Smart devices and endpoints continue to proliferate, while threats evolve alongside them.

Traditional security is outdated security

If you’re only relying on traditional security, you’re vulnerable in a number of ways. When users leave the network, they’re creating blind spots you need to defend but can’t. Secure web gateways protect only web ports 80/443, but 15% of malware command-and-control (C2) callbacks use ports other than 80/443 to exfiltrate data.

Then there’s the problem of staying ahead. With traditional security, threat intelligence is derived from static reputation scores issued after threats have been detected. Emerging threats and threats that are still in the staging process remain undetected. Plus, if you’re relying solely on hardware, appliance-processing power will limit what you can accomplish.

Traditional solutions limit integration, too. If you’re like most companies, you’re probably using a number of different security products from multiple vendors that typically work in silos. You’re left scrambling to reconcile, synthesize, and prioritize alerts without a coherent overview of your environment.

And finally, the SaaS apps that are so effective from a productivity standpoint provide little visibility into user activity, so sensitive company, employee, or customer data can be uploaded to and shared in the cloud without your IT team knowing about it — or controlling it.

Interested in reading more? Get the rest of this story.

Security's new battlefield is here

It used to be enough to secure your company's network. Not anymore. Today, companies need to secure the entire internet.

Find out what you need to know now.