Securing your company’s network today involves more than simply creating a perimeter wall around your network. As networks become more decentralized and users connect directly to SaaS applications, security must also shift to the cloud. A new category of products is emerging to address these changes, the Secure Internet Gateway (SIG). A SIG provides safe access to the internet anywhere users go, even when they are off the VPN. Before you connect to any destination, a SIG acts as your secure onramp to the internet and provides the first line of defense and inspection. Once the traffic gets to the SIG cloud platform, there are different types of inspection and policy enforcement that can happen. As more security controls move to the cloud, a SIG provides a platform that future capabilities can be built upon.
Why is Protecting your Perimeter Important?
Before users connect to any destination on the internet, a secure internet gateway provides the first line of defense and inspection. Features include:
- Visibility and enforcement on and off network
- Protection over all ports and protocols
- Open platform for easy integration
- Live threat intelligence
- Proxy and file inspection
- Discovery and control of SaaS
At its core, the DNS system makes it easier for people to find and access websites by typing in the business’ domain name, rather than having to type in a seemingly meaningless IP address. Think of DNS as a phone book or directory that pairs website pages with their underlying address on the internet.
The “domain registrar” is where a business registers their website domain, essentially creating the entry into the internet “phone book” of IP addresses. The authoritative DNS server owns and publishes the directory, and the recursive DNS server looks up the IP address associated with each page’s name. All of this happens behind the scenes to make it easy for users to find pages on the internet.
New Security Challenges
For all of the benefits cloud and SaaS solutions provide, they also create new security challenges for businesses.
In spite of all of your efforts to train personnel about the dangers of clicking on links, employees may click on links in emails or on web pages they think are safe – but aren’t. Traditional network and web security solutions do not protect roaming users or direct-to-internet traffic. There is also the added reality that businesses have limited visibility into, and control over, the sensitive data and apps in the cloud.
3 Key Benefits of a SIG
Easy to Deploy:
A SIG stays one step ahead of traditional security methods by uncovering attacks before they are executed. A SIG accomplishes this by using live threat intelligence derived from global internet activity that’s analyzed in real-time, with updates enforced within minutes. Not only does a SIG enforce protection based on this intelligence, but it should also enable you to access the intelligence though a web-based console or API.
Non Intrusive to Users:
A SIG keeps users protected without affecting how they get work done. Threats are blocked automatically without impacting connection speeds or device performance.
Visibility and enforcement everywhere:
A SIG will provide a complete view into internet activity, anywhere users are located as well as protect users no matter what network they connect to — even when they are off the VPN.
Norwell Technology Group in Partnership with Aqueduct Technologies, Offers the DNS Security Your Business Needs
Without a Secure Internet Gateway (SIG)in place, your business – and your data – are at risk. Norwell Technology Group and Aqueduct Technologies provide SIG solutions designed to provide the protection you need.