Test Level famous of their latest 2022 Cloud Safety Report that 27% of organizations have skilled a safety incident of their public cloud infrastructure inside the final 12 months.
With the rising variety of cloud IT-related threats, organizations are going to need to up their safety recreation with a purpose to fight superior threats. And this turns into a stable use case for a Subsequent-Gen Safe Net Gateway (SWG).
A Subsequent-Technology SWG can present your group with the superior safety capabilities wanted to guard in opposition to at the moment’s subtle assaults and superior persistent threats (APTs). Let’s take a better have a look at how a Subsequent-Gen SWG differs from conventional Safe Net Gateways.
What’s a Subsequent-Technology SWG?
A Subsequent-Technology Safe Net Gateway is a cloud-based safety resolution that gives superior safety in opposition to information dangers. Subsequent-Gen SWGs use quite a lot of safety strategies, together with however not restricted to: utility management, consumer and entity habits analytics (UEBA), and machine studying to guard in opposition to threats.
A next-generation SWG may even give you visibility into all the visitors passing via your community, together with encrypted visitors. That is essential as a result of it lets you see what purposes and websites are being accessed, in addition to potential threats which may be lurking in your community.
What Are the Advantages of a Subsequent-Technology SWG?
There are a lot of advantages to utilizing a Subsequent-Technology SWG, together with:
Superior Safety Safety
Subsequent-Gen SWGs transcend the bodily limitations of appliance-based options. An SWG might help block malware, subtle phishing assaults, and different sorts of threats earlier than they attain your community. Different security measures embrace SSL/TLS visitors encryption between purchasers and servers and Net Filtering to dam out dangerous content material and web sites.
Improved Visibility and Management
One other advantage of utilizing a Subsequent-Technology SWG is the improved visibility and management that it may well present. With an SWG in place, you may see all the visitors passing via your community, together with encrypted visitors. This is a vital function as a result of it lets you see what purposes and websites are being accessed, in addition to potential threats which may be lurking in your community.
Elevated Productiveness
A Subsequent-Technology SWG also can assist improve productiveness by permitting you to manage which purposes and websites might be accessed by your workers. By blocking entry to non-work-related purposes and websites corresponding to playing websites or social media, you may assist to make sure that your workers are targeted on their work duties.
Improved Efficiency
A Subsequent-Technology SWG also can assist enhance the efficiency of your community by lowering the quantity of visitors that’s passing via it. By blocking entry to non-essential purposes and websites, there are fewer distractions, which finally interprets into extra deal with the duties at hand.
Defend In opposition to Unknown Threats
Consultants predict six billion phishing assaults to happen simply in 2022 alone, with 83% of organizations reporting no less than one assault. Couple that with new and unknown threats but to be found, and you may see how severe the risk floor turns into for any enterprise. Imposing safety insurance policies is an integral function of a Subsequent-Gen SWG. A chosen admin can both “permit” or “deny” entry to a sure useful resource with the press of a button. These granular insurance policies depend on the Zero Belief precept of least privileged entry.
Why Do You Want a Subsequent-Technology SWG?
Cloud-related threats proceed to plague organizations. One thing so simple as a misconfiguration of an S3 bucket in an AWS setting can lead to an enormous safety breach. Misconfiguration points are generally present in legacy VPN and firewall home equipment, but another excuse to advance your safety technique with a Subsequent-Gen SWG.
Superior persistent threats proceed to rise and one of many extra widespread threats includes stolen credentials. Credential stuffing accounted for 61% of all information breaches. Different examples of APTs embrace malicious insiders that intentionally use their credentials to promote Private Identifiable Data (PII) for monetary achieve. Different widespread assaults embrace account hijacking, usually within the type of a phishing assault, and API vulnerabilities – which price organizations as a lot as $75 billion yearly.
Having a Subsequent-Technology SWG in place also can assist forestall all these threats. Entry to cloud purposes needs to be given on a “must know” foundation. This added safety measure, also called Zero Belief Community Entry, can drastically assist scale back the assault floor. When mixed with a Subsequent-Gen SWG, your safety posture turns into much more elevated. Sponsored by Perimeter 81