Many ONUG enterprise consumers have shared the toil that their SecOps/DevSecOps teams face daily. “The room” is often overwhelmed by the sheer volume of attacks as well as the tools and playbooks necessary to sort through all of the relevant alerts. What alerts are ACTUALLY relevant? That’s a constant work in progress. This challenge is at the heart of what CSNF offers to not only the Enterprise consumer but also 3rd party security solutions providers. What is CSNF and why NOW is the perfect time…
Interest in Zero Trust has exploded recently, partly due to its catchy name and seemingly broad usage throughout the cyber security industry (Zero Trust washing?). But, there is also another more compelling reason for the rise in interest in Zero Trust – we really need it. When speaking with customers, many of them tell me they are struggling to get a handle on the risks associated with hybrid work and direct-to-app connectivity. The new reality is that our attack surfaces have expanded dramatically while cyberattacks…
For those who attend technical conferences, it’s hard not to come away with the energy to execute on new ideas. I’m certainly feeling that way after ONUG Spring 2022. Attendees at the conference showed an overwhelming interest in the Cloud Security Notification Framework (CSNF) and how it can reduce toil for the SecOps community. The success of the CSNF demonstration at ONUG Spring, and the proven value that it will provide to the ONUG Community of cloud consumers, provides even more motivation for ONUG’s Automated…
We did it; it was nail biting, but we came together in numbers at the Meadowlands of New Jersey over a few brisk spring days in late April. I was nervous when I sent the first invitations for speakers to present at ONUG Spring back in January. If speakers were not able to attend in-person then community members wouldn’t be able to either. We just didn’t know if the community was ready to meet in-person. Well, we had over 50 speakers present in-person, over 500…
Secure Access Service Edge (SASE) represents the network and security architecture blueprint of the future, consolidating many networking and security point solutions into a single, integrated cloud service. The ability to monitor end user experience across a SASE architecture is critical. Here’s one company’s story of how they used digital experience monitoring to gain visibility across their SASE architecture. Leading Provider of Healthcare Coverage for 80+ Years Leading the way in supporting patient-focused care, this health insurance provider delivers coverage to more than 700,000 customers….
Managing cloud permissions and configurations As organizations evolve in the cloud, you will find the number of cloud services their teams use and identity permissions that need to be managed increase significantly. These services teams used to build and deliver applications are referred to as assets or resources. Configuring cloud assets, roles, and permissions doesn’t take long to become tedious, time-consuming, and error-prone. The leading causes of security incidents are misconfigurations of assets and over-privileged identities, therefore, it essential to diligently manage these. Discovering cloud…
The pandemic ushered in a new era, one where technology has created flexibility for organizations, employees, and customers. These technological advancements provide endless possibilities for all parties – increased productivity, improved customer experience, maximized service, and minimized costs. Ensuring that these experiences exceed expectations, enterprises have become increasingly reliant on their network – a resilient network. Travel restrictions and lockdowns spurred by the pandemic were two of the main catalysts of this new, hybrid, digital age. One where products can be bought anywhere, solutions can…
As hybrid work is here to stay for a vast majority of organizations, there are three secure user access scenarios that most affect an organization: remote employees; branch offices; and accommodating new, contingent, or traveling workers. Remote employees Every remote employee is essentially an internet gateway. With remote access services transitioning to identity-based controls, attackers will be opportunistic by targeting credentials. And why not? Let’s think about digital access the same way we think about physical access to a building. What’s easier for gaining access…
The cloud brought enormous business value to companies in virtually every industry, and cloud-first companies have led the way as pioneers. But as these first-movers have scaled up, they’ve uncovered a problem: the cost of using the cloud has, in many cases, exceeded the cost of sales. To resolve the issue, many cloud-first companies have shifted at least some of their workloads back to on-premises facilities, in what could be an example for businesses looking to scale up on the cloud in an economically-viable way….
SD-WAN is seemingly taking the enterprise world by storm. The market is big and still growing, with room for at least five major vendors doing a healthy business. And it’s easy to see why. SD-WAN eases a lot of headaches in running a large enterprise WAN. The reliability, redundancy, and security benefits are real. I was tempted to say that SD-WAN “solves” a lot of WAN headaches, and SD-WAN vendors would have you believe this is really true – that it’s a set-and-forget kind of…