Story image

How IoT and hybrid cloud will change in 2019

19 Nov 18

Recently IT brief hat the opportunity to get DH2i CEO Don Boxley’s thoughts on IoT and Hybrid Cloud as well as his predictions for 2019.

Boxley says, "In 2019, every hybrid cloud security strategy should be updated to replace VPNs with micro-perimeters."

Boxley shared his thoughts on what’s coming in 2019: 

Enterprises will replace VPNs with micro-perimeters - to secure IoT gateway communications

Making smart products, IoT devices is the new product differentiator - even ovens have IP addresses now. 

Companies that have been investing in IoT initiatives understand that the IoT gateway layer is the key that unlocks a high return on those IoT investments. 

IoT gateways manage device connectivity, protocol translation, updating, management, predictive and streaming data analytics, and data flow between devices and the cloud. 

Improving the security of that high data flow with a Zero Trust security model will drive enterprises to replace VPNs with micro-perimeters. 

Micro-perimeters remove an IoT device's network presence eliminating any potential attack surfaces created by using a VPN.

Boxly continues, "In 2019, every VPN used for a PCI application should/will be replaced with a micro-perimeter." 

Organisations will replace VPNs with micro-perimeters - for Zero Trust hybrid cloud security

Many organisations are pursuing a hybrid strategy involving integrated on-premises systems and off-premises cloud/hosted resources. 

But traditional VPN software solutions are obsolete for the new IT reality of hybrid and multi-cloud. 

They weren't designed for them. They're complex to configure, and they give users get a "slice of the network," creating a lateral network attack surface.

 A new class of purpose-built security software will emerge to eliminate these issues and disrupt the cloud VPN market. 

This new security software will enable organisations to build lightweight dynamic micro-perimeters to secure application- and workload-centric connections between on-premises and cloud/hosted environments, with virtually no attack surface.

JASK prepares for global rollout of their AI-powered ASOC platform
The JASK ASOC platform automates alert investigations, supposedly freeing the SOC analyst to do what machines can’t. 
Pitfalls to avoid when configuring cloud firewalls
Flexibility and granularity of security controls is good but can still represent a risk for new cloud adopters that don’t recognise some of the configuration pitfalls.
Securing hotel technology to protect customer information
Network security risks increase exponentially as hotels look to incorporate newer technologies to support a range of IoT devices, including smart door locks.
Why total visibility is the key to zero trust
Over time, the basic zero trust model has evolved and matured into what Forrester calls the Zero Trust eXtended (ZTX) Ecosystem.
Gartner names Proofpoint Leader in enterprise information archiving
The report provides a detailed overview of the enterprise information archiving market and evaluates vendors based on completeness of vision and ability to execute.
WatchGuard appoints new channel distributors in A/NZ
The appointments will enable WatchGuard to expand its regional channel reseller footprint.
Tensions on the rise after Huawei CFO arrest
“Recently our corporate CFO, Meng Wanzhou, was provisionally detained by the Canadian authorities on behalf of the United States of America."
Palo Alto Networks integrates RedLock and VM-Series with AWS Security Hub
AWS Security Hub is designed to provide users with a comprehensive view of their high-priority security alerts and compliance status.