Secure web gateways ensure businesses have global protection

Cloud-based solution keeps data secure no matter where employees are working

 
Share on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInEmail this to someonePrint this page

More employ­ees are work­ing remote­ly than ever before. Accord­ing to a Gallup sur­vey, 43 per­cent of the 15,000 sur­veyed Amer­i­cans said they spent at least some time work­ing remote­ly. That’s up 4 per­cent since 2012. In a sur­vey of busi­ness lead­ers at the Glob­al Lead­er­ship Sum­mit, 34 per­cent said over half their work force would be work­ing remote­ly by 2020.

It’s imper­a­tive that com­pa­nies can pro­tect their employ­ees wher­ev­er they are. Whether they are in an air­port, cof­fee shop, client office or at home, they need the same lev­el of pro­tec­tion offered at their busi­ness offices. If an employee’s device is infect­ed while using an inse­cure con­nec­tion and then they bring their device back inside the cor­po­rate net­work, they are act­ing as a deliv­ery method themselves.

Relat­ed arti­cle: The impor­tance of employ­ee aware­ness training

Pre­vi­ous­ly, solu­tions achieved this by rout­ing all remote traf­fic back through cor­po­rate servers. But as band­width require­ments con­tin­ue to sky­rock­et, the cost of back­haul­ing this data to head­quar­ters is unsustainable.

Cloud-based web gate­ways offer a more flex­i­ble solu­tion for the future. Rather than rout­ing remote traf­fic through cor­po­rate servers, the data is rout­ed through the cloud to be scanned and then trans­ferred straight back to the device.

Paul Mar­ti­ni, iBoss CEO

I recent­ly sat down with twin broth­ers Paul and Peter Mar­ti­ni at Black Hat 2017 in Las Vegas. Paul and Peter are CEO and Pres­i­dent, respec­tive­ly, of iBoss, a cloud-based web gate­way ser­vice that aims to pro­vide the glob­al pro­tec­tion busi­ness­es need. Togeth­er, we dis­cussed the nuts and bolts of web gate­ways, how com­pa­nies cur­rent­ly use gate­ways and the need for a cloud-based solu­tion. You can find the key take­aways below.

Defin­ing web gate­ways. Web gate­ways are a form of cyber­se­cu­ri­ty ser­vice that scan data going into and out of the net­work in order to pre­vent mal­ware infec­tion and data loss. They are used by vir­tu­al­ly every For­tune 500 com­pa­ny to ensure that employ­ees are meet­ing the company’s inter­net use policy.

Cloud-based uptake is slow. Some 85 per­cent of the mar­ket today uses web gate­way appli­ances that sit at the main office. This means that, regard­less of where employ­ees are locat­ed in the world, their VPN will route traf­fic back to the main office first. This cre­ates a clunky, expen­sive and inse­cure experience.

Peter Mar­ti­ni, iBoss President

Why go cloud? By choos­ing a cloud solu­tion, you elim­i­nate the need for heavy pieces of web gate­way appli­ances to be host­ed in-house. There’s no need to wor­ry about adding addi­tion­al infra­struc­ture or han­dling upgrades, either. Instead every­thing is han­dled in the cloud, through a ser­vice that can be expand­ed on demand. Using a cloud solu­tion also elim­i­nates the need for VPNs and the data back­log that cur­rent­ly exists. All the data is scanned in the cloud and matched to the rel­e­vant inter­net use policy.

Poli­cies that can be con­trolled using web gate­ways. Use poli­cies tend to fall into one of three buck­ets. The first is core gate­way func­tion­al­i­ty, which typ­i­cal­ly revolves around com­pli­ance. Cloud Access Secu­ri­ty Bro­ker­ing (CASB) func­tion­al­i­ty event logs pre­vent employ­ees from upload­ing sen­si­tive infor­ma­tion to their per­son­al cloud stor­age space. It also cov­ers the use of social media and oth­er often-pro­hib­it­ed web­sites. The sec­ond con­cerns the pre­ven­tion of mal­ware. Scan­ning helps to ensure that files and down­loads are free from infec­tion. The third is data loss. Is data leav­ing the net­work that shouldn’t be? A web gate­way can scan for per­son­al­ly iden­ti­fi­able infor­ma­tion and oth­er iden­ti­fiers to ensure sen­si­tive infor­ma­tion stays secure on the network.

More sto­ries relat­ed to in-house cyber­se­cu­ri­ty for businesses:
Sophis­ti­cat­ed email mon­i­tor­ing can help com­pa­nies detect insid­er threats
SMBs need to for­ti­fy their ‘human fire­wall’ with cyber­se­cu­ri­ty training
Neu­tral­iz­ing insid­er threats is vital to good data security