wonderfully unique software solutions

Retrofitting mid-market perimeter protection not enough: Censornet

Network security vendor Censornet says that mid-market organisations going cloud-first should be looking at cloud-first cybersecurity strategies too.

The company points out that perimeter security alone isn’t enough when companies have sensitive data flying around in myriad cloud applications, with some organisations working with 100s of different apps.

“For IT managers in mid-market organisations, that’s the kind of cybersecurity protection they require. Agile, everywhere – going where their assets go,” the company says in part one of a series of blog posts.

“Every email, web application and cloud application is a potential weak point. Walls (and VPNs) just don’t cut it anymore. The perimeter is dead.”

Yet according to Censornet, most cloud security solutions for the mid-market are retrofitted from traditional network-edge protection rather than following the user where they go in the digital world.

“Companies which continue to use outdated solutions to address complex cloud-based threats carry a much higher risk to their data, business, and reputation,” says Censornet.

Rather than treating each user or application as a single, static target to be protected, organisations should integrate attack data from across their IT landscape, pre-empting cross-channel attacks and responding to unexpected threat behaviours.

Email threats are often designed to entice users to click on a link that takes them to a fake login page, or a file containing malicious content but stored in a legitimate cloud application, the company points out.

Organisations should have email security integrated with web and cloud application security with a view to achieving end-to-end attack visibility, Censornet says, revealing some of the thinking behind its own cloud-focused network cybersecurity products.

( Photo by Raúl Nájera on Unsplash )

Recent Articles

How remote connectivity can empower education – with RealVNC

Simplified classroom management, effective communication, and cost-effectiveness are desirable in education institutions from schools to universities, with digital solutions for distributed learning...

ShareGate answers questions on Copilot and M365 sprawl

Microsoft 365 (M365) with Copilot broadens and deepens capabilities that can enhance productivity in multiple ways but can also increase sprawl and...

Steel company deployed CoreView to head off potential delays post-acquisition

When integrating M&A driven expansion, Italian steel processing firm Marcegaglia implemented CoreView to minimise potential account migration problems from confusion to data...

Delinea meets ransomware comeback with acquisitions, further innovation

Cybercriminals appear to have doubled down on ransomware attacks again in the year, with a stealthier approach evident as well as a...

SCORM compliance and why it matters for e-learning

Learning management systems (LMS) and e-training content that comply with the Shareable Content Object Reference Model (SCORM) help ensure consistency across corporate...

Related Stories

Leave A Reply

Please enter your comment!
Please enter your name here

Weirdware monthly - Get the latest news in your inbox