Showing posts with label unified threat management. Show all posts
Showing posts with label unified threat management. Show all posts

Monday, October 01, 2012

Secure To The Core Cloud Hosting

Moving to cloud based solutions is making sense for more and more companies. The cloud offers easy scalability, near-infinite resources, high performance, no maintenance headaches and the opportunity to avoid capital investments and pay only for what you use. The one nagging issue is how secure is the cloud, really?

Move up to highly secure cloud and network services.MegaPath, a major player in private networking and hosted IT services, has taken a big step toward assuring businesses that their data and business process will remain private by introducing a concept it calls “secure to the core.” Just what does secure to the core mean and how can it work for your business?

Nearly every cloud service provider touts its security. This generally centers around the data center itself. Many are SAS 70 Type II and SSAE 16 compliant with physical security that include biometric scanning, a full time security staff, video surveillance and a walled fortress. Inside there are redundant power and cooling systems, fire suppression and multiple WAN connections to the outside world. However, this last group is really more about reliability than security.

With proper personnel screening and all the physical and technical barriers to entry, it’s not that hard to physically keep people out who don’t belong in the data center. It’s more difficult to keep them out when they come in through the Internet.

The Internet is a weak link when it comes to any data security program. The most motivated and talented of wrong-doers operate in this domain. They eagerly stalk potential targets to penetrate and make off with intellectual property, credit card numbers, personal data that can be used for identity theft and anything else of value. It takes talented network security people and an array of firewalls and security appliances to protect high value business, organizational and government assets that face the Internet.

This is where MegaPath has a leg-up on a lot of cloud service providers. They also have the latest in high security data centers that meet stringent industry compliance standards. What MegaPath has that most providers don’t is a large private network completely independent of the Internet.

When you think about it, companies with multiple locations or Intranets that include key suppliers and customers don’t really need the Internet for internal communications. In fact, it is highly desirable to keep internal communications on a private network for both security and performance. MegaPath makes this affordable for all size businesses through their nationwide MPLS (Multi-Protocol Label Switching) fiber optic network. The label switching technology of MPLS makes packet forwarding simple and efficient. It also allows customers to chose from eight levels of QoS (Quality of Service) so that time sensitive packet streams get the priority they need to maintain integrity end to end. This is ideal for enterprise VoIP telephone systems and video conference or telepresence.

MegaPath can offer you MPLS network connections throughout the United States plus Managed SSL VPN, Retail Access SSL and Business Continuity SSL. Their compliance services help companies meet regulatory requirements such as PCI DSS, FFIEC/NCUA, HIPAA/HITECH, GLBA and SOX.

Of course, you probably want Internet connections as well to serve the general public and commercial buyers, and for employee access to the vast information resources available worldwide. MegaPath offers a comprehensive security array called UTM or Unified Threat Management. This includes advanced firewall, intrusion prevention, anti-virus protection, Web filtering, anti-spam, Web application control and data loss protection. These UTM services can be implemented within the cloud, at the customer’s premises or in a hybrid configuration.

Are you looking for cloud services that have rigorous physical and network security protections? Get features and pricing for secure network and cloud services from MegaPath and other high quality providers.

Click to check pricing and features or get support from a Telarus product specialist.



Follow Telexplainer on Twitter

Monday, December 19, 2011

Cyber Security Threat Protection In the Cloud

In days of yore, when castles were in vogue, the nobles found that massive stone fortifications were not enough to secure them from determined invaders. What they did was to ring the castle grounds with a deep water-filled ditch called a moat. This effectively prevented sieges from battering rams and tunneling under the castle walls. The lesson here is that your infrastructure is much easier to defend if you don’t let the bad guys anywhere near the main line of defense.

Get network security as robust as this castle and moat...Now let’s fast-forward to the 21st century and see how these medieval lessons-learned can protect our networks. Our massive stone castle wall is now a firewall. It’s effective in preventing most penetrations into the network. Like real stone fortifications and wooden gates, that firewall can only hold out so long against massive assaults at the network edge. What we need is a modern day moat. This is an electronic moat, of course, and it needs to surround our network but not be in it. Where can we get that layer of protection? How about in the cloud?

The cloud might just be the perfect first line of defense for local networks. It’s an idea that makes so much sense that MegaPath, a major networking service provider, is taking exactly that approach in a solution they call Unified Threat Management (UTM). This suite of managed security services can be implemented completely in the cloud, completely on-site or within a hybrid private/public configuration.

MegaPath’s UTM suite is offered in the form of Security as a Service (SaaS). It’s a multilayer approach that can easily fend off unsophisticated attempted break-ins and stand up to higher threat blended attacks. This suite also coordinates security alerting, logging, reporting, compliance and response.

What’s in the SaaS suite? It starts with an advanced firewall that features deep packet inspection with up to 500 firewall policies. Intrusion prevention features multi-layered and blended attack detection that handles both known and unknown threats. A powerful anomaly detector identifies and stops zero-day threats to all network types, including wireless.

No good network security system would be without anti-virus and anti-malware these days. This one has both signature and rules based blocking. Anti-spam deals with the onslaught of unwanted messages and deletes or simply tags them depending on your policy. There’s nothing like having to work your way through hundreds or thousands of spam messages each day to kill employee productivity.

Speaking of productivity, just what are all those employees browsing on the Internet anyway? Make sure their time is spent on company sanctioned activities with white and black lists and policy-based content filtering. Web application control goes a step further to give you precise control of apps like IM, chat, and voice or video on social media sites.

You’ll have data loss prevention with real time detection and prevention of your sensitive company data being transferred outside the company. That includes credit card, healthcare or financial data that is literally worth its weight in gold. Vulnerability scanning checks internal and external IP addresses to find and fix vulnerabilities in real time. Quarterly scans are implemented for PCI compliance. File integrity monitoring watches for unauthorized access or changes to critical system or configuration files.

Managed logging and security information management round out the MegaPath SaaS suite. These collect data and provide the alerting, reporting and archival you need for proper management. Portal based workflow management and tracking demonstrates due diligence in meeting organizational security policies and compliance reporting.

Are you feeling a bit vulnerable with the limited firewall and virus protection you have now? Sadly, the cost of one major breaking can far exceed the amount you’d spend preventing it with an effective cyber security solution. Now would be an excellent to investigate managed security services from MegaPath and other top tier network service providers.

Click to check pricing and features or get support from a Telarus product specialist.


Note: Photo of medieval castle and moat courtesy of Christophe.Finot on Wikimedia Commons.



Follow Telexplainer on Twitter