Intelligent CIO LATAM Issue 42 | Page 17

LATEST INTELLIGENCE
infiltrate your network from the edge . And once they are in , they can wreak havoc .
Unfortunately , most traditional security tools , like legacy firewalls , were not designed for this sort of challenge . They were designed to be static network checkpoints where workflows and data were highly predictable . But those days are gone . What ’ s needed now is a hybrid mesh firewall ( HMF ) solution to integrate next-generation firewalls across the network and form factors to enable centralized management and coordinated response to threats . This solution needs to protect assets and users located anywhere , converge and consolidate distributed solutions to reduce overhead , simplify management , and enable automation , and dynamically scale services and bandwidth to meet your constantly evolving business requirements .
New problems
The data center , though essential , is no longer the primary location for corporate applications . Instead , applications can be deployed anywhere . Because a transaction or workflow may span multiple environments and applications , the source , destination , and data path can sometimes change several times , making it impossible to track and secure a transaction end to end .
5G adoption has also left traditional firewalls struggling to keep up – especially when 95 % of all traffic is now encrypted . 1 Encrypted traffic , especially secure sockets layer / transport layer security ( SSL / TLS ) tunnels , is widely used to secure remote access and transactions . However , cybercriminals also use encryption to hide malicious activities , such as stealing company data and secrets and to launch ransomware attacks . Most firewalls cannot decrypt and inspect encrypted traffic without seriously impacting performance and user experience . So , most encrypted traffic – especially data traveling at very high speeds – goes uninspected . are under enormous pressure to provide complete visibility across a moving and distributed network environment to secure and track every user and device accessing data , applications , and workloads . This presents cybercriminals with a great opportunity to
Multi-cloud environments and a hybrid workforce are also rewriting security requirements . The cloud enables agile application development and scale-out / scaleup functionality to accommodate growing application access by remote workers . However , numerous business-critical applications still need to be housed in the on-premises data center for reasons such as compliance , privacy , the need to protect intellectual property , or to secure sensitive records . However , most traditional firewalls cannot support hybrid data center use cases , including user-to-data center , data center-to-cloud , user-to-cloud , and data center-todata center interconnect models . p
PRESENTED BY
www . intelligentcio . com INTELLIGENTCIO LATAM 17