Cloud protection, remote browser can minimise cyber breaches

June 15, 2017

Cloud-protection,-remote-browser-can-minimise-cyber-breach

With increasing cybersecurity threats to enterprise IT, cloud workload protection platforms (CWPP) and remote browser technologies can protect or thwart cyber breaches, market research firm Gartner said on Wednesday.

According to Gartner, hybrid CWPPs provide information security leaders with an integrated way to protect workloads using a single management console and a single way to express security policy.

“As attackers improve their capabilities, enterprises must also improve their ability to protect access and protect from attacks,” said Gartner vice president Neil MacDonald in a statement.

“Security and risk leaders must evaluate and engage with the latest technologies to protect against advanced attacks, better enable digital business transformation and embrace new computing styles such as Cloud, mobile and DevOps,” MacDonald added.

Almost all successful attacks originate from the public internet and browser-based attacks are the leading source of attacks on users. By isolating the browsing function, malware is kept off of the end user’s system.

The market research firm also identified ‘deception’ technologies to thwart cyber attacks.

Deception is defined by the use of deceits, decoys or tricks designed to throw off an attacker’s cognitive processes or disrupt an attacker’s automation tools.

“By using deception technology behind the enterprise firewall, enterprises can better detect attackers that have penetrated their defences with a high level of confidence in the events detected,” Gartner noted.

According to Gartner, by 2020, 80% of large enterprises, 25% of mid-sized organisations and 10% of small organisations will have invested in endpoint detection and response (EDR) capabilities.

EDR solutions monitor endpoints for indications of unusual behaviour and activities indicative of malicious intent.

Among other technologies that thwart, delay or identify the potential breaches or cyber attacks are network traffic analysis (NTA) managed detection and response (MDR) and microsegmentation.