Story image

How IoT and hybrid cloud will change in 2019

19 Nov 2018

Recently IT brief hat the opportunity to get DH2i CEO Don Boxley’s thoughts on IoT and Hybrid Cloud as well as his predictions for 2019.

Boxley says, "In 2019, every hybrid cloud security strategy should be updated to replace VPNs with micro-perimeters."

Boxley shared his thoughts on what’s coming in 2019: 

Enterprises will replace VPNs with micro-perimeters - to secure IoT gateway communications

Making smart products, IoT devices is the new product differentiator - even ovens have IP addresses now. 

Companies that have been investing in IoT initiatives understand that the IoT gateway layer is the key that unlocks a high return on those IoT investments. 

IoT gateways manage device connectivity, protocol translation, updating, management, predictive and streaming data analytics, and data flow between devices and the cloud. 

Improving the security of that high data flow with a Zero Trust security model will drive enterprises to replace VPNs with micro-perimeters. 

Micro-perimeters remove an IoT device's network presence eliminating any potential attack surfaces created by using a VPN.

Boxly continues, "In 2019, every VPN used for a PCI application should/will be replaced with a micro-perimeter." 

Organisations will replace VPNs with micro-perimeters - for Zero Trust hybrid cloud security

Many organisations are pursuing a hybrid strategy involving integrated on-premises systems and off-premises cloud/hosted resources. 

But traditional VPN software solutions are obsolete for the new IT reality of hybrid and multi-cloud. 

They weren't designed for them. They're complex to configure, and they give users get a "slice of the network," creating a lateral network attack surface.

 A new class of purpose-built security software will emerge to eliminate these issues and disrupt the cloud VPN market. 

This new security software will enable organisations to build lightweight dynamic micro-perimeters to secure application- and workload-centric connections between on-premises and cloud/hosted environments, with virtually no attack surface.

Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.
How blockchain could help stop video piracy in its tracks
An Australian video tech firm has successfully tested a blockchain trial that could end up being a welcome relief for video creators and the fight against video piracy.
IBM X-Force Red & Qualys introduce automated patching
IBM X-Force Red and Qualys are declaring a war on unpatched systems, and they believe automation is the answer.
Micro Focus acquires Interset to improve predictive analytics
Interset utilises user and entity behavioural analytics (UEBA) and machine learning to give security professionals what they need to execute threat detection analysis.