IS looks to solve cloud security anxiety

SECURITY

|
Image: Graeme O'Driscoll. By BiztechAfrica
Graeme O'Driscoll

Internet Solutions (IS), in response to industry's growing demand for secure, ubiquitous cloud solutions, has launched IS Cloud Web Security (CWS).

The solution, says IS, not only addresses the full gamut of cloud security concerns, but being a cloud-based solution itself, offers clients the benefit of reduced administration, and zero capex spend on hardware and software.

“Many organisations are hesitant to embark on the journey to cloud, as securing the cloud computing environment adequately has not, until now, been possible to guarantee,” says Graeme O'Driscoll, innovation and technology manager for cloud at IS. “As a result, organisations are losing the undisputed business benefits of cloud solutions. IS can now offer its clients holistic cloud security using Zscaler's secure cloud gateway to deliver the solution. Additionally, a 100% uptime service level agreement guarantees IS CWS is always available.”

The IS CWS proxy has the lowest throughput latency on the market, guaranteed; and is billed per user, per month, regardless of the number of end-devices associated with that user, or that user's bandwidth consumption.

By adopting IS CWS, organisations not only future-proof security needs, but will save about 60% of web security spend. Organisations can avoid inevitable appliance fatigue and refresh cycles.

Says O'Driscoll: For a traditional multiprotocol label switching (MPLS) client to get similar benefits to IS CWS, it would need to invest in numerous machines, including a proxy server, reporting server, a Web 2.0 gateway, and a URL filtering gateway. Costs accumulate – hardware, administration, and software – which need to be doubled if organisations are concerned with redundancy.

“IS CWS reduces all these costs, from rackspace, to carbon footprint, to salaries and capex spend on hardware and software.”

CWS offers organisations comprehensive end-device and mobile device protection – including data-leak prevention, anti -virus, -malware, and -spyware, and auditing of browsing, uploads, and downloads, all in real time.  Policies are granular, and can be applied to application, user, location, time, and volume. Additionally, policies integrate with Active Directory, allowing for rules to be defined based on users and/or groups. “IS CWS offers decentralised internet access, with centralised control. Conservatively, CWS can free-up bandwidth usage by up to 10 times through these rules and policies – allowing for a far more productive, beneficial cloud experience.

“Through CWS clients now have access to a multi-tenant solution, meaning a user is not tied to a specific datacentre, which negatively impacts response times. Rather, related policies will be enforced from the closest of one of 47 nodes world-wide.” The result, says O'Driscoll, is ultra-low latency, and high reliability. In Africa, these nodes are in South Africa. Other African countries will connect via Seacom (Kenya, Uganda, Tanzania, Mozambique) to Johannesburg; and WACS (Nigeria and Ghana) to Cape Town. O’Driscoll says nodes will be built in Kenya and Nigeria if there is enough uptake and growth in the solution to warrant dedicated nodes in these regions.

“Gartner has recognised the solution,” says O'Driscoll, as an “innovator” in its Magic Quadrant. “It is rare that a single solution is so comprehensive. With CWS, we have addressed cost in terms of time and money savings, offer the best policies and security available, real-time reporting and forensic auditing, ease of deployment for data loss prevention, and near-zero latency.” 



Share the News

Get Daily Newsletter

Search News

comments powered by Disqus

MORE SECURITY NEWS

Keep both critical infrastructure and security top of mind

Anton Jacobsz, MD at Networks Unlimited Hackers involved in terrorism and cyber-warfare are increasingly attacking industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems.  Read More

The great non-divide between cyber security and geopolitics

Geopolitics, in which national security and strategy are often rooted, is just as relevant as ever in the face of threats related to cybersecurity. Read More

RSA announces RSA NetWitness Suite

RSA, The Security Division of EMC, has unveiled the RSA NetWitness Suite, an advanced threat detection and response solution that helps security teams detect and understand the full scope of a compromise like never before.  Read More

Women treasure images on connected devices more than men, yet fail to protect them

Over half (59%) of women in South Africa value the photos and videos they store on their phones more than anything else on the device -  compared to 43% of men, according to a survey by Kaspersky Lab and B2B International.  Read More

Nowhere to hide

Anton Jacobsz, MD at Networks Unlimited How cyber-security needs to move from hopeful attempts at outright prevention, to real-time detection and neutralization. Read More

Beware of the free livestream

Anton Jacobsz, MD at Networks Unlimited Not all livestreaming sites are created equal when it comes to their inherent security measures, warns Networks Unlimited. Read More

Arbor Cloud wins gold at Network Product Guide IT World Awards

Network Products Guide, the industry's leading technology research and advisory guide, has named Arbor Cloud a gold winner in the 2016 IT World Awards for Best Security Services. Read More

Networks Unlimited invests in securing Africa’s Wi-Fi connections

Anton Jacobsz, MD at Networks Unlimited Networks Unlimited is focusing its efforts on securing its customers wireless access, and has started to create awareness through hosting training and roadshows across South Africa. Read More

Cisco report predicts next generation of ransomware

Mike Weston, Vice President, Cisco Middle East Cisco’s 2016 Midyear Cybersecurity Report predicts the next generation of ransomware and new tactics emerging to maximise profit.  Read More

Arbor Networks releases global DDoS attack data for first half of 2016

Arbor Networks Inc., the security division of NETSCOUT, has released global distributed denial-of-service (DDoS) attack data for the first six months of 2016, which shows a continuing escalation in both the size and frequency of attacks.  Read More

PRESS OFFICES

Sage EnterpriseSAP AfricaTrust PayVMWareSamsung ElectronicsMitsumi DistributionPhoenix DistributionMTN BusinessSchneider ElectricMultichoiceMicrosoft 4AfrikaNetworks UnlimitedArbor NetworksEricssonTigo Ghana

FEATURED STORY

Financial services sees AI as both opportunity and threatFinancial services sees AI as both opportunity and threat

Banking is already a key area where technology is having an impact throughout Africa, and a new survey assesses the impact artificial intelligence will have on this sector.

IN DEPTH

Access and Use of ICT stats releasedAccess and Use of ICT stats released

Statistics Botswana has released the first results of the 2014 Information and Communication Technology Household Survey.