Bibhuti Bhusan Kar
Head of Research and Development, Quick Heal
Protection against cybercrime
An organization today thrives to provide “anytime, anywhere, any device” work options to its employees to achieve the highest productivity. The hybrid IT infra and access to services pattern are complex to protect against cyber-attacks. However, the majority of safety can be achieved by adapting basic cyber hygiene and awareness.
A zero-trust access solution for accessing IT workloads/services is “Roaming” first and “BYOD” friendly. Architecturally, it is much simpler to set up, so that human errors in complex VPN settings can be avoided, reducing the risk. Similarly, cloud firewalls can augment or replace the on-prem firewalls to cater to the hybrid multi-cloud workloads, without having to worry about complex configurations and routing setups.
Protecting just the access is not enough though, as the network would continue to have some legacy IoT, and other generic services running at the same time. A great network security is not enough because as much as 55% of the compromises happen by ‘insiders’ – most of them are out of ignorance and some with malicious intent.
Solutions to prevent Distributed DoS attacks (DDoS)
DDoS is the easiest form of attack to bring a business to its knees. Many modern firewalls, on-prem or cloud-based, are now providing DDoS prevention. Even many home routers, and all popular vendors of AV or End Point Security software provide DDoS prevention based on many factors, such as source reputation, source distribution, bot vs. human detection, encrypted traffic entropy, and blocking traffic targeting your applications. It is mandatory to have a WAF or a full-fledged NGFW in front of the applications we need to protect from DDoS attacks. Most of the attack logistics are available to hackers on rent now (such as previously Emotet network) which are used to launch such attacks. Detection, any flooding of requests, analyzing its source, frequency and pattern, and then blocking these sources are the basics of DDoS prevention. Fortunately,it is close to a mature science now that reputed firewalls and endpoint security would be able to handle with great efficiency.
Approach to the current situation
We have state-of-the-art HawkkProtect (Zero Trust User Access)and HawkkScan (Data Privacy and Protection)solutions, which are cloud-managed, easy to set up, BYOD, and Roaming friendly. This provides an unprecedented first level of defense (Network Access Control) to our customers who have a hybrid set of IT assets. Our technology stands out because of its simplicity. Most breaches happen, because of the human errors left in the configuration because of complexity. We have simplified it down to a few clicks, clear auditable logs, visibility and ‘declarative’, ‘English like’ policy language.
See What’s Next in Tech With the Fast Forward Newsletter
Tweets From @varindiamag
Nothing to see here - yet
When they Tweet, their Tweets will show up here.