IS looks to solve cloud security anxiety
SECURITY| Aug. 30, 2012, 2:33 p.m.
Internet Solutions (IS), in response to industry's growing demand for secure, ubiquitous cloud solutions, has launched IS Cloud Web Security (CWS).
The solution, says IS, not only addresses the full gamut of cloud security concerns, but being a cloud-based solution itself, offers clients the benefit of reduced administration, and zero capex spend on hardware and software.
“Many organisations are hesitant to embark on the journey to cloud, as securing the cloud computing environment adequately has not, until now, been possible to guarantee,” says Graeme O'Driscoll, innovation and technology manager for cloud at IS. “As a result, organisations are losing the undisputed business benefits of cloud solutions. IS can now offer its clients holistic cloud security using Zscaler's secure cloud gateway to deliver the solution. Additionally, a 100% uptime service level agreement guarantees IS CWS is always available.”
The IS CWS proxy has the lowest throughput latency on the market, guaranteed; and is billed per user, per month, regardless of the number of end-devices associated with that user, or that user's bandwidth consumption.
By adopting IS CWS, organisations not only future-proof security needs, but will save about 60% of web security spend. Organisations can avoid inevitable appliance fatigue and refresh cycles.
Says O'Driscoll: For a traditional multiprotocol label switching (MPLS) client to get similar benefits to IS CWS, it would need to invest in numerous machines, including a proxy server, reporting server, a Web 2.0 gateway, and a URL filtering gateway. Costs accumulate – hardware, administration, and software – which need to be doubled if organisations are concerned with redundancy.
“IS CWS reduces all these costs, from rackspace, to carbon footprint, to salaries and capex spend on hardware and software.”
CWS offers organisations comprehensive end-device and mobile device protection – including data-leak prevention, anti -virus, -malware, and -spyware, and auditing of browsing, uploads, and downloads, all in real time. Policies are granular, and can be applied to application, user, location, time, and volume. Additionally, policies integrate with Active Directory, allowing for rules to be defined based on users and/or groups. “IS CWS offers decentralised internet access, with centralised control. Conservatively, CWS can free-up bandwidth usage by up to 10 times through these rules and policies – allowing for a far more productive, beneficial cloud experience.
“Through CWS clients now have access to a multi-tenant solution, meaning a user is not tied to a specific datacentre, which negatively impacts response times. Rather, related policies will be enforced from the closest of one of 47 nodes world-wide.” The result, says O'Driscoll, is ultra-low latency, and high reliability. In Africa, these nodes are in South Africa. Other African countries will connect via Seacom (Kenya, Uganda, Tanzania, Mozambique) to Johannesburg; and WACS (Nigeria and Ghana) to Cape Town. O’Driscoll says nodes will be built in Kenya and Nigeria if there is enough uptake and growth in the solution to warrant dedicated nodes in these regions.
“Gartner has recognised the solution,” says O'Driscoll, as an “innovator” in its Magic Quadrant. “It is rare that a single solution is so comprehensive. With CWS, we have addressed cost in terms of time and money savings, offer the best policies and security available, real-time reporting and forensic auditing, ease of deployment for data loss prevention, and near-zero latency.”
MORE SECURITY NEWS
Safe Deposit: Defeating cyber-attacks against banksWith online heists once again hitting the headlines, how should banks and their customers protect themselves against similar attacks? Read More
Large organisations gear up to address aggressive cyber-security business disruption attacksAlthough the frequency of a cyber-security attack on a large scale is low, by 2018, 40 per cent of large organisations will have formal plans to address aggressive cyber-security business disruption attacks, up from none this year, says Gartner. Read More
Identity and access management trends for 2015CA Technologies has identified five key trends for security and identity and access management (IAM) that will impact organisations and security professionals in 2015 as they compete in the application economy. Read More
Leading newspaper site hackedBotswana is seeing unprecedented cases of internet hacking with one of the latest attacks targeting one of the country’s leading private newspapers, Mmegi. Read More
Senegal hit by wave of cyber attacksSenegal has been hit by a wave of hackings in the past two weeks, two of which hit the popular news website Seneweb.com and ADIE. Read More
Cyber attacks may get more virulent, Cisco, Kaspersky warnCyber attackers are using more subtle methods to infiltrate corporate networks with the aim of stealing vital information or simply causing mayhem. This is according Kaspersky Lab and Cisco, who say IT security experts should up their game in educating users how to ward off potential attackers. Read More
SIM box task team steps up successes with help from ICT firmGhana’s efforts to crack down on SIM boxing fraud have been given a boost by the efforts of Subah Infosolutions Ghana Limited, which now partners with the authorities in the fight against this crime. Read More
Software vulnerability led to Ghana govt site hackA software vulnerability and failure to update software led to the hacking of some websites on the government of Ghana’s official portal. Read More
CBN issues directive on two factor authentication for internal banking processesThe Central Bank of Nigeria has issued a directive requiring all deposit money banks (DMBs) to implement two factor authentication for internal processes this year. Read More
SA: 57% could not recover money stolen in online fraudA recent survey conducted by Kaspersky Lab and B2B International found that more than half of those respondents in South Africa who lost money in fraudulent online transactions did not get all – or sometimes any – of their funds back. Read More
FEATURED STORYMalawi Govt denies clinging to ‘Cashgate’ software
The Malawi Government will not exclude the software brand that has been in use for the country’s Integrated Financial Management System (IFMIS), but it has rejected reports implying that it is ‘clinging’ to the old system.
BEST READ NEWS
IN DEPTHKenya’s digital TV battle hots up
Kenya’s journey to Digital TV broadcasting took a new turn this week, when the Communication Authority of Kenya (CAK) accused three local media firms of intent to disrupt the process.
COMPANY NEWSVMware unveils vCloud for NFV with Integrated OpenStack to accelerate service innovation
VMware, the global leader in virtualisation and cloud infrastructure, today debuted VMware vCloud for NFV, an integrated Network Functions Virtualization (NFV) platform that will combine VMware’s production-proven ...