Top 4 New Network technologies in 2012

Regional and international experts discuss new network technologies, such as governance, risk and compliance and mobile application management, and what they mean for enterprises

Tags: Dell CorporationEMC CorporationGartner IncorporationSonicWALL IncorporatedSony Corporation
  • E-Mail
Top 4 New Network technologies in 2012 Firewalls are a key defence mechanism in cloud security, according to Dell SonicWALL.
By  Georgina Enzer Published  November 11, 2012

Regional and international experts discuss new network technologies, such as governance, risk and compliance and mobile application management, and what they mean for enterprises.

1. The ins and outs of cloud security

Regional and international cloud security experts discuss what cloud security is and how a company can protect their data.

Cloud security is the technology that protects data, application and infrastructure associated with the cloud. Despite much information to the contrary, cloud security is much the same as traditional IT security and many of the security issues associated with cloud are exactly the same as with traditional forms of IT.

According to Gartner, the service-based nature of cloud means that consumers of a cloud service are dependent upon whatever security controls are available through the service interface.  There is an abstraction layer that is not present in traditional insourced IT delivery.

“The types of enterprise security issues that arise in these circumstances include dependencies on subcontracted third parties, network services, and the availability of authentication and authorisation credentials across multiple services,” says Rob McMillan, research director at global technology research organisation, Gartner.

Cloud also features issues related to data confidentiality and data sovereignty, that don’t often arise in traditional IT network systems.

“Securing cloud depends on working out where and how to apply measures to specifically meet the end users needs. Our traditional stateful packet inspection firewalls focus on blocking network layer threats by evaluating the ports and protocols used by network layer traffic. The latest Next-Generation firewalls utilise deep packet inspection to scan the entire packet payload to provide advanced intrusion prevention, anti-malware, content filtering and gateway anti-virus,” explains Florian Malecki, senior product marketing manager, EMEA, at  intelligent network security and data protection solutions expert Dell SonicWALL.

Threats to adoption

The biggest threats to cloud adoption are the lack of control over and visibility of data hosted in the cloud. According to Gartner, cloud suppliers usually offer no guarantees about where information in a cloud service will be physically stored and/or processed. This can be problematic for information that is regulated, such as Personally Identifiable Information (PII), or is particularly sensitive to the consumer organisation. With cloud services such as SaaS the consumer has little or no visibility and control over the software quality process or release management.

“The consumer effectively trusts the software provider to supply software that is safe and reliable.  This can be problematic in high security pressure environments, or in complex environments with complex applications that typically require a significant volume of regression testing as part of the change management process,” says McMillan.

Add a Comment

Your display name This field is mandatory

Your e-mail address This field is mandatory (Your e-mail address won't be published)

Security code