Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Three ways to use the cloud to regain control over network endpoints

Dave Cole, Chief Product Officer, CrowdStrike | Jan. 4, 2016
Promising new cloud-based endpoint security solutions can change how we protect against cyber intrusions.

3. Security as a business enabler. In today's BYOD, mobile-first workforce, users are frequently working from home, on the road or simply in a cafe down the street. Few people are behind the VPN 24/7 anymore, benefitting from layers of network defenses. Endpoint security delivered through the cloud makes it possible to manage remote assets as easily as those on the network. Further, it relieves the enterprise from having to invest resources to protect the on-premise management console or worry about operational details such as database maintenance.

The same is applicable to the upgrade process. With the on-premise endpoint security model, update cycles are slow to come from the vendor and painful for the enterprise. Today, major antivirus vendors are subject to a laborious process for creating product updates, which can last from six to 12 months as they develop and test new protection. Once this arduous process is completed, there are typically additional delays as the client upgrades to the new release.

As the months tick by, the attackers are refining their techniques daily. The result is that updates can be months out-of-date when they arrive. Conversely, a cloud security provider can update protection in the cloud itself, even applying new detections to existing customer data without touching endpoints. The most updated version of protection is always available on-the-fly and algorithms can be adjusted as needed without consuming network bandwidth or even touching the customer network or endpoints. Even better, enterprises can get off the upgrade treadmill and eliminate the time-consuming update process entirely.

Business and IT leaders now accept that breaches are highly likely, if not inevitable, risks of doing business today. Our responsibilities as security leaders are to be on a continuous hunt for solutions that fill the voids in the evolving threat landscape. At the same time, security cannot hamper critical end-user empowerment trends like BYOD. The cloud truly opens up organizations’ ability to defend against spiking attack volumes with no loss of workforce productivity.

CrowdStrike is a cybersecurity technology firm delivering next-generation endpoint protection, threat intelligence and pre- and post-incident response services.

 

Previous Page  1  2 

Sign up for CIO Asia eNewsletters.