Story image

How IoT and hybrid cloud will change in 2019

19 Nov 2018

Recently IT brief hat the opportunity to get DH2i CEO Don Boxley’s thoughts on IoT and Hybrid Cloud as well as his predictions for 2019.

Boxley says, "In 2019, every hybrid cloud security strategy should be updated to replace VPNs with micro-perimeters."

Boxley shared his thoughts on what’s coming in 2019: 

Enterprises will replace VPNs with micro-perimeters - to secure IoT gateway communications

Making smart products, IoT devices is the new product differentiator - even ovens have IP addresses now. 

Companies that have been investing in IoT initiatives understand that the IoT gateway layer is the key that unlocks a high return on those IoT investments. 

IoT gateways manage device connectivity, protocol translation, updating, management, predictive and streaming data analytics, and data flow between devices and the cloud. 

Improving the security of that high data flow with a Zero Trust security model will drive enterprises to replace VPNs with micro-perimeters. 

Micro-perimeters remove an IoT device's network presence eliminating any potential attack surfaces created by using a VPN.

Boxly continues, "In 2019, every VPN used for a PCI application should/will be replaced with a micro-perimeter." 

Organisations will replace VPNs with micro-perimeters - for Zero Trust hybrid cloud security

Many organisations are pursuing a hybrid strategy involving integrated on-premises systems and off-premises cloud/hosted resources. 

But traditional VPN software solutions are obsolete for the new IT reality of hybrid and multi-cloud. 

They weren't designed for them. They're complex to configure, and they give users get a "slice of the network," creating a lateral network attack surface.

 A new class of purpose-built security software will emerge to eliminate these issues and disrupt the cloud VPN market. 

This new security software will enable organisations to build lightweight dynamic micro-perimeters to secure application- and workload-centric connections between on-premises and cloud/hosted environments, with virtually no attack surface.

Who's watching you? 
With privacy an increasing concern amongst the public, users should be more aware than ever of what personal data companies hold.
Fake apps on Google Play scamming users out of cryptocurrency
Fake cryptocurrency apps on Google Play have been discovered to be phishing and scamming users out of cryptocurrency, according to a new report from ESET.
Managing data to comply with privacy regulations - Micro Focus
It’s crucial for organisations to be able to access, understand, and accurately classify the data they have so they know how to treat it.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.
SEGA turns to Palo Alto Networks for cybersecurity protection
When one of the world’s largest video game pioneers wanted to strengthen its IT defences against cyber threats, it started with firewalls and real-time threat intelligence from Palo Alto Networks.
Forrester names Trend Micro Leader in email security
TrendMicro earned the highest score for technology leadership, deployment options and cloud integration.
LogRhythm releases cloud-based SIEM solution
LogRhythm Cloud provides the same feature set and user experience as its on-prem experience.
The impact of bringing biometrics to the door
"Despite the benefits of biometrics, there have been impediments to its broader enterprise adoption."