Cloud protection, remote browser can minimise cyber breach

At a time when the level of cyber security threat to enterprise IT continues to be alarming, Cloud workload protection platforms (CWPP) and remote browser technologies can protect or thwart such breaches, market research firm Gartner said on Wednesday.

>>IANS/bdnews24.com
Published : 15 June 2017, 06:49 AM
Updated : 15 June 2017, 06:49 AM

According to Gartner, hybrid CWPP provide information security leaders with an integrated way to protect workloads using a single management console and a single way to express security policy.

"As attackers improve their capabilities, enterprises must also improve their ability to protect access and protect from attacks," said Gartner Vice President Neil MacDonald in a statement.

"Security and risk leaders must evaluate and engage with the latest technologies to protect against advanced attacks, better enable digital business transformation and embrace new computing styles such as Cloud, mobile and DevOps," MacDonald added.

Almost all successful attacks originate from the public internet and browser-based attacks are the leading source of attacks on users. By isolating the browsing function, malware is kept off of the end-user's system.

The market research firm also identified 'deception' technologies to thwart cyber attacks.

Deception is defined by the use of deceits, decoys or tricks designed to throw off an attacker's cognitive processes or disrupt an attacker's automation tools.

"By using deception technology behind the enterprise firewall, enterprises can better detect attackers that have penetrated their defences with a high level of confidence in the events detected," Gartner noted.

According to Gartner, by 2020, 80 per cent of large enterprises, 25 per cent of mid-size organisations and 10 per cent of small organisations will have invested in endpoint detection and response (EDR) capabilities.

EDR solutions monitor endpoints for indications of unusual behaviour and activities indicative of malicious intent.

Among other technologies that thwart, delay or identify the potential breaches or cyber attacks are network traffic analysis (NTA) managed detection and response (MDR) and microsegmentation.