By: Moshe Ben-Simon, CEO of TrapX Security
Over the last year, I don’t think I’ve met a company that didn’t move some of their network infrastructure to a cloud platform like AWS, AZURE, OpenStack, Google or something similar. Today, organizations that I never even considered as ones that will make this change, have moved quickly and aggressively to a cloud environment.
There could be many reasons for organizations to make this change, but the bottom line is that their security teams need to apply visibility & detection to the cloud environment as well. This challenge gets even bigger when their infrastructure is hosted on a third-party platform. This results in them needing more resources and tools to protect their data.
It isn’t a surprise that most of the major data breaches that were published lately showed that cyber-attackers focused primarily on cloud infrastructures. The organizations later found out that either their cloud was directly involved or a sub-contractor that provided them cloud services had left the gate open to their precious data.
From my experience, today’s organizations pay a costly price for data breaches; either by losing revenue, losing customers or dealing with the country’s regulator. Not to mention the fact that CISOs and other security staff members lose their jobs and are publicly humiliated as a result.
The impact of this kind of breach is huge because when an attacker compromises a cloud server, he will keep digging within the network to find more valuable data. When an organization doesn’t have visibility, their chance to detect a breach is almost zero.
Eventually, they will learn about it, but it will probably through the press or through one of their customers.
This problem begins when security teams try to apply their local network tools in the cloud and find out that it’s not as easy as they expected. In addition, most of the tools they have are still focused on the local network. The challenge becomes even more complicated since they need to apply the security protocols with minimum effect (it has to be passive) on the cloud server that serves their customers and/or their business.
What should You look for when seeking a solution?
When you start looking for the right solution to protect your cloud, you’ll understand that you need a solution that can address these key features:
- It needs to provide you with full Visibility,
- It needs to provide you with Detection,
- It needs to be passive,
- It needs to install quickly, and
- It needs to support all of the major cloud service providers / virtualization networks.
Very few cyber security tools on the market today can provide you with this set of capabilities – but if you think about Network Deception, you can find all these feature in one tool.
You also get a bonus – the mega feature: ZERO FALSE POSITIVE ALERTS. (Deception Technology uses a simple algorithm – No one should touch something that’s fake. If someone touches something fake or moves around unauthorized in the cloud, they will get caught instantly.)
Gartner, the world’s leading research and advisory company[i], Identifies the top technologies for security in 2017 and includes Deception Technology in that latest research article. Here is the link: https://www.gartner.com/newsroom/id/3744917
TrapX’s DeceptionGrid is a powerful platform that provides hybrid visibility & detection to local, network and cloud environments. It also supports all of the major cloud service providers / virtualization networks (AWS, AZURE, Google, KVM, Open Stack and more).
In less than 30 minutes, your cloud infrastructure could be fully protected.
No more breaches and no more excuses.
[i] Hall, Eugene A. “About Gartner.” About Gartner, 22 Apr. 2018, www.gartner.com/technology/about.jsp.