Page 12 - Cloudsecurity Magazine - Digitaltech Media
P. 12

assets, vulnerabilities,    unified visibility into     that organizations have    integrates with the SaaS
         and exposures, and not      vulnerabilities and cyber   security controls in place  applications that have
         siloed visibility caused by  risk across all assets and   to prevent accidental    been sanctioned using
         using different tools for   computing platforms -       misuse and data            native APIs, providing
         different assets.           from IT to cloud to IoT     sharing,” he reiterated.   CASB functionalities such
            “As the first list of    and OT.                       Hence, it is important   as visibility, advanced
         defense against cyber          According to             to protect different       threat protection, data
         threats, organizations      Mukherjee of Sonicwall,     layers in the cloud, such   loss prevention, and
         should adopt a risk-        companies often             as Saas that obe can       compliance.
         based vulnerability         ignore a lot of factors     access without a VPN.
         management program          when migrating to           Furthermore, there are     To Sum Up
         to continuously monitor     the cloud. For most of      significant problems,         With more and
         their network in real-      them, their priority is     with limitless devices,    more people working
         time while identifying      the flexibility it offers   from laptops, iPad’s,      from home during
         and prioritizing            when the entire world       tablets that open up       the pandemic, the
         vulnerabilities that could   is working from home.      risks of contamination.    abrupt shift to remote
         be exploited by bad         “Organizations need           SonicWall, is assisting   working has sparked
         actors,” says Palmer.       to be vigilant in terms     such businesses            an unprecedented
            He further elaborated    of protecting sensitive     transition with ease       increase in cyber
         that teams can focus on     data, making sure that      by providing best-in-      threats as opportunistic
         the vulnerabilities and     whatever stored on the      class API-based security   hackers take advantage
         assets that matter most     cloud is compliant and      with low TCO, minimal      of the boundary-less
         by taking a risk-based      can be protected,” he       deployment overhead,       ecosystem. Given the
         approach to vulnerability  mentioned.                   and seamless user          present situation,
         management. It will            Mukherjee further        experience. This enables   enterprises and cloud
         help them in addressing     clarified that knowledge    companies to focus on      administrators need to
         the business risk of an     and understanding are       their business operations   develop an in-depth
         organization, instead of    crucial aspects.  “We       while allowing cloud       understanding of how
         wasting their valuable      assume that employees       vendors to focus on        their organizations use
         time on vulnerabilities     know what data\             keeping their functions    the cloud, as that will
         that have a low             information\files is        up and running.            further help them to
         likelihood of being         appropriate to store in       With features such       implement appropriate
         exploited.                  the cloud, as opposed       as Visibility, Next-Gen    security solutions,
            As far as Tenable is     to an internal server.      Email Security, Advanced   policies as well as
         concerned, the leading      The insider threat is real,   Threat Protection,       standards, alongside
         cloud computing             and it is not always a      Data Security, and         enforceable roles as well
         company is the first in     disgruntled employee,       Compliance, SonicWall      as accountabilities.
         the industry to launch a    as the statistics confirm.   Cloud App Security           When done right,
         cloud-based vulnerability  People are trying to get     solution delivers out-     it will help them to
         management platform         their jobs done faster      of-band scanning of        prevent data breaches,
         to secure the full range    and efficiently. Security   traffic to sanctioned as   unauthorized network
         of assets in the modern     isn’t their space, and      well as unsanctioned       access, spot threats, and
         elastic IT environment,     hence they never think      SaaS applications. It      vulnerabilities, encrypt
         including containers and  about it for 12-16 hours      further does this with     communications, and
         web applications. The       a day.  Cybersecurity is    the help of APIs and       more importantly
         company also provides       our space, where we         traffic log analysis. The   ensure uptime for their
         security teams with         live 24x7 and ensure        solution seamlessly        organizations.

       27
      12             SEPTEMBER 2020
                     SEPTEMBER 2020
   7   8   9   10   11   12   13   14   15   16