sb-eu logo
Story image

How IoT and hybrid cloud will change in 2019

19 Nov 2018

Recently IT brief hat the opportunity to get DH2i CEO Don Boxley’s thoughts on IoT and Hybrid Cloud as well as his predictions for 2019.

Boxley says, "In 2019, every hybrid cloud security strategy should be updated to replace VPNs with micro-perimeters."

Boxley shared his thoughts on what’s coming in 2019: 

Enterprises will replace VPNs with micro-perimeters - to secure IoT gateway communications

Making smart products, IoT devices is the new product differentiator - even ovens have IP addresses now. 

Companies that have been investing in IoT initiatives understand that the IoT gateway layer is the key that unlocks a high return on those IoT investments. 

IoT gateways manage device connectivity, protocol translation, updating, management, predictive and streaming data analytics, and data flow between devices and the cloud. 

Improving the security of that high data flow with a Zero Trust security model will drive enterprises to replace VPNs with micro-perimeters. 

Micro-perimeters remove an IoT device's network presence eliminating any potential attack surfaces created by using a VPN.

Boxly continues, "In 2019, every VPN used for a PCI application should/will be replaced with a micro-perimeter." 

Organisations will replace VPNs with micro-perimeters - for Zero Trust hybrid cloud security

Many organisations are pursuing a hybrid strategy involving integrated on-premises systems and off-premises cloud/hosted resources. 

But traditional VPN software solutions are obsolete for the new IT reality of hybrid and multi-cloud. 

They weren't designed for them. They're complex to configure, and they give users get a "slice of the network," creating a lateral network attack surface.

 A new class of purpose-built security software will emerge to eliminate these issues and disrupt the cloud VPN market. 

This new security software will enable organisations to build lightweight dynamic micro-perimeters to secure application- and workload-centric connections between on-premises and cloud/hosted environments, with virtually no attack surface.

Story image
Check Point acquires Odo Security to bolster remote security offering
The deal will integrate Odo’s remote access software with Check Point’s Inifinity architecture, bolstering the latter company’s remote security capabilities in a time where working and learning from home has become the norm, and looks to largely remain that way in the near future.More
Story image
Misinformation on the rise, organisations consider how best to respond
The increase in misinformation and fake domains have left organisations perceiving the threat level to be ‘very significant’, with a third planning greater emphasis on their ability to respond in coming months.More
Story image
Report: 151% increase in DDoS attacks compared to 2019
It comes as the security risk profile for organisations around the world increased in large part thanks to the COVID-19 pandemic, forcing greater reliance on cloud technology and thrusting digital laggards into quick and unsecured migrations.More
Story image
APAC organisations struggle to find balance between digital adoption and cybersecurity
Organisations in the Asia Pacific (APAC) region are significantly concerned about security threats, but nevertheless are looking to advance operations through digital adoption.More
Story image
COVID-19 related email threats pose huge risk in 2020
According to the company’s annual mid-year roundup report, Trend Micro blocked 8.8 million COVID-19 related threats, nearly 92% of which were email-based.More
Story image
Is cyber deception the latest SOC 'game changer'?
Cyber deception reduces data breach costs by more than 51% and Security Operations Centre (SOC) inefficiencies by 32%, according to a new research report by Attivo Networks and Kevin Fiscus of Deceptive Defense.More