How to Enable a Secure Cloud VPN

Cloud computing has been around now for about a decade. It offers companies the chance to lease computing resources and services on-demand over the Internet from cloud services providers. In this way, companies gain the freedom to quickly scale IT systems up and down in line with changing business circumstances as well as keep up with the latest technology advances. The cloud services model is also a lot more cost effective than equivalent in-house deployments. Yet, despite all of this, many organizations still hesitate to embrace cloud services citing remote access security concerns, especially when employees are connecting to cloud applications when on the road. To address such concerns, providers can offer their customers remote access out of the cloud or VPN as a service.

IIoT, Mobile and Cloud Security Take Center Stage at RSAC 2017

The RSA Conference (RSAC) is always a major highlight in the IT security professional calendar and this year’s show was no exception. In this blog, NCP engineering reviews some of the standout enterprise machine-to-machine (M2M), mobile client and cloud security trends to emerge from RSAC 2017. The show is also a win-win for NCP. Our strong track record with US technology partners means that NCP is well-known to US-base customers and prospects. At the same time, our experience in fulfilling Industrial Internet of Things (IIoT) or Industry 4.0 projects in Germany means we had a great deal of knowledge and insight to share with prospects in this security segment, one that is in its early stages in the United States.

Protecting virtual worlds of data in motion

In 2017, 69% of all applications will reside in the cloud according to Cisco. As we rely increasingly on benefits made possible by further advances in Industrial Internet of Things (IIoT) and mobile devices, it’s a statistic that will continue to rise. The challenge for enterprises today is how to protect data as it streams constantly between physical mobile/IIoT devices to virtual repositories in the cloud and back again. Until corporate IT departments fully manage and stay on top of security, large breaches will continue to make the headlines. Statistics revealed in the Ponemon Institute 2016 Global Cloud Data Security Study show there is still much to do. The study found that nearly half (49%) of cloud services in the enterprise are outside corporate IT’s domain, while around 47% of corporate data stored in cloud environments are not managed by the IT department.

Control over our data

Anybody who uses the Internet uses, creates and leaves data behind. While in the past site visits were recorded in the depths of server log files rarely to surface again, these and related data are now the currency of the 21st century. Services are exchanged for data, this is the business model shared by Google, Amazon and many others. But people are becoming more aware that the uninhibited acquisition of their personal data may have negative consequences and no longer trust that their data is protected on the Internet.

Cloud Security Pitfalls to Avoid

Cloud computing technology is fast becoming an attractive alternative to maintaining IT systems and applications on premise. In-house management and maintenance of IT is costly and resource-hungry. Small and medium-sized businesses in particular benefit from the way cloud services give them access to greater processing power and IT expertise than they could ever aspire to with the modest budgets and resources of their own. Cloud computing also provides an opportunity for large organizations to enjoy economies of scale for the high data volumes produced by the many and various devices, operating systems and applications they use.

Why Outsourcing Remote Access Management Isn’t the Answer for SMBs

“How do you keep your data secure when you’re a data anchovy in a sea of hacker sharks?” When the Wall Street Journal’s John Bussey posed this question in 2011, the corporate network security landscape was drastically different. Employees weren’t using company-managed smartphones at a rate of 64 percent. Nine out of every 10 employees weren’t keeping sensitive business information on devices they use for both work and personal matters. Yet, even then, SMB network administrators were concerned about their security, and feeling like vulnerable little fish with bigger, more aggressive fish circling. So concerned, in fact, that according to Bussey, many were reluctant to outsource network security services to a managed service provider (MSP), even though these companies would have both the expertise and resources required to keep their networks safe. At the time, many SMBs thought that the “hard disk under the receptionist’s desk” strategy was more effective than handing over control to a third party, even though these MSPs could provide data encryption, threat mitigation and other critical security services. SMBs thought to themselves: “Yes, but what if the host isn’t entirely well-protected? Or what if a peer company within the shared environment was attacked? Or what if hackers prioritized these target-rich environments?” These were real concerns then, and they still are now. So, should network administrators consider tapping into MSPs for network security in our current environment? The core issue is a common one in network security – convenience vs. security. The Debate The convenience vs. security debate comes to how SMBs go about securing communications. On one hand, SMBs could opt for convenience and...