For this week’s “In the News”, research a new technology solution, or new method to utilize a previous technology, to address Communications and Network Security. How does this solution or application revolutionize networks? If this is particular to certain industries, please also include that detail.
Reader Interactions
Comments
Leave a Reply
You must be logged in to post a comment.
Kelly Sharadin says
The cloud continues to provide new opportunities and challenges for IT and IS professionals. This article from Dark Reading, outlines the importance of adopting a robust multicloud strategy that incorporates network object management. Network object management helps to provide visibility into potential security and connectivity gaps that may occur due to object sprawl that comes from multicloud environments. For example, large organizations may use both AWS and Azure to manage resources. Each cloud platform comes with its own network security policies and features that may present cross-platform challenges. To that end, network security engineers must standardize network object management by applying consistent network security policies regardless of the environment. Network object management can be achieved by periodically auditing cloud environments for duplicate objects, expired or unused objects, and by establish a standardized naming conventions across platforms.
https://www.darkreading.com/cloud/why-network-object-management-is-critical-for-managing-multicloud-network-security
https://www.darkreading.com/dr-tech/new-open-source-project-brings-consistent-identity-access-to-multicloud
Anthony Wong says
One of a network trends is moving from traditional multiprotocol layer switch (MPLS) to software-defined wide-area network (SD-WAN). MPLS is protocol to move data from across a network. MPLS switches need to be installed in the corporate data centers and work locations to establish network connectivity. SD-WAN offers similar capabilities as MPLS, however, it leverages software to control the configuration and management of the network. It is an evolution of MPLS that enables organizations to set network bandwidth and priority to key business processes. Because of the rise of remote work, organization’s are beginning to adopt SD-WAN to provide a more secure and reliable network connection to corporate resources.
https://www.cisco.com/c/en/us/products/routers/what-is-the-difference-between-sd-wan-and-mpls.html#~q-a
Kelly Sharadin says
Hi Anthony,
Interesting post, I would agree that the remote workforce and our ever increasing digital appetitites has placed signficiant pressure on network availability requiremennts. The language in the article is also interesting. There is an assumption that businesses will adopt a cloud strategy. While I do prefer to work with orgs that have a cloud environment – many are still lagging behind in adoption. I believe we see a darwinain approach to business in terms of who can keep up with technology demands. However, it does make me nervous that we will rely so heavily an external providers.
Kely
Kyuande Johnson says
The use of Artifical Intelligence has revolutionalized network security. Artificial Intelligence (AI) Artificial intelligence is the simulation of human intelligence processes by machines, especially computer systems. In network security Artifical Intelligence has the ability to detect zero-day malware, prioritize threats, and take automated remediation actions.Attacker are becoming extremely effective at creating new malware that evades signature based detection methods such as Anti Virus. AI systems can analyze malware based on inherent characteristics, rather than signatures. An AI-based tool can look at these characteristics, and many others, in order to calculate the risk of a new, previously-unseen piece of software. Having an anomaly based detection systems drastlly improves the security posture of an organization because it will be protected from Zero Day attacks.
https://www.datacenterknowledge.com/security/top-three-use-cases-ai-cybersecurity
Mohammed Syed says
https://www.networkworld.com/article/3657610/how-sase-uses-ai.html
In today’s Businesses needed to establish a foundation for continuous transformation and adopting a new way of working, digital transformation has become imperative for all businesses with the enterprise IT market significantly changed in the last 2-3 years and switch self on cloud technology, just not about connecting cloud but about connecting multiple clouds efficiently. Businesses already know the benefits of having a private cloud and direct cloud connections. With increasing, productivity and efficiency organizations will continue to use remote working models.
Hybrid cloud models will push enterprises to use Software-Defined Wide Area Networks (SD-WAN) to manage access for remote workers, different offices, multiple branches, clouds, and data centers. As per future requirements, businesses understand the benefits of Network as a service (NaaS) which all deployment of network services is automated, replacing manual processes for repetitive tasks. Today required a smart networking concept that allows combinations of hardware, software, sensors, data storage microprocessors, cloud connectivity, and automation in each and every step of managing the network.
Software-defined networking model uses the programmable network configuration to improve performance, reduce network implementation costs and simplify network monitoring.
To manage complexity in networking environments SD-WAN and SASE provide a complete solution set if think about WAN, security, application optimization, multi-cloud connectivity, auto troubleshooting, continuity solutions, etc benefits. Before SD-WAN organizations relay on MPLS networks in physical locations, and VPN connections to use end-users, but with the growth of digitization and cloud computing, centralized data center, remote working models IT organization adopting the SD-WAN more modern solutions for managing enhanced network challenges cause of cloud-first model, automation network controls with strong security and improve the economic model. SD-WAN gives solutions for improving processes and speeding up manual tasks, it offers flexibility, security, and economical solutions that did not exist before.
Shubham Patil says
Zero Trust Network Access (ZTNA) is an IT security solution that provides secure remote access to an organization’s applications, data, and services based on clearly defined access control policies.
ZTNA separates application access from network access. This means that users must be authenticated to use each application individually as opposed to the network as a whole. ZTNA separates application access from network access. This means that users must be authenticated to use each application individually as opposed to the network as a whole. Once the user is authenticated, the ZTNA tool establishes a secure, encrypted tunnel to grant access to a resource. Like software defined perimeters (SDPs), ZTNA tools use “dark cloud” principals to shield the user’s IP address and limit the user’s visibility into other applications and services that they do not have access to. By authenticating each user and isolating access in this way, the organization can reduce the risk of infection from a compromised device as well as prevent lateral movement in the event of a breach.
AppGate: SDP 6.0
SDP 6.0 is the latest version of AppGate’s Zero Trust Network Access (ZTNA) solution. This version features a new risk model capability designed to let users extend the value and reach of their existing enterprise security tools to simplify and accelerate their zero trust deployments. Appgate SDP 6.0’s new risk model capability enables customers to assign high/medium/low sensitivity levels to specific workloads and resources. It is meant to provide companies with a simple, flexible way to measure user/device risk at sign-on, via security tools they already have in place, against the sensitivity of the resource they are trying to access. The risk model then dynamically adjusts access rights based on the risk score.
https://www.csoonline.com/article/3663128/hottest-new-cybersecurity-products-at-rsa-conference-2022.html#jump
Vraj Patel says
To safeguard the network, a variety of tools are employed. According to this article, the following are the top eight cyber security tools that organizations has utilized in 2022: Kali Linux, Cain and Abel, Metasploit, John the Ripper, Wireshark, Nikto, Tcpdump, and KisMac. This are the tools that can be used to find network vulnerabilities and/or monitor network activity. There are also certain tools included, such as John the Ripper and Cain and Abel, that may be used to determine the network’s weak password.
Reference:
https://www.analyticsinsight.net/top-8-cybersecurity-tools-in-2022/
Mitchell Dulaney says
“Network Service Mesh: Linking multicloud workloads”
Per Network World, a new multi-cloud networking technology is being developed by the Cloud Native Computing Foundation, called Network Service Mesh. The Network Service Mesh is an open-source project that would allow Kubernetes workloads in different clouds to communicate with each other directly. The article author points out that modern mid- to large-sized enterprises utilize on average 1o public cloud service providers and 20-100 Software as a Service providers. Network Service Mesh would simplify workflows for enterprises by allowing workloads to connect to each other without the use of gateways or setting up cumbersome layer 3 domains that include each workload. The technology is designed to to offer routing and network service discovery to create “virtual wires” connecting the various workloads in the mesh. Organizations can then connect any workloads they need directly to the mesh, which runs on top of a standard level 3 network. Ultimately, Network Service Mesh networking will facilitate the direct connectivity of multiple clusters across different public and private clouds, drastically simplifying the cloud computing overhead of companies that utilize it.
https://www.networkworld.com/article/3662750/network-service-mesh-linking-multicloud-workloads.html
Antonio Cozza says
One relatively new and constantly improving network security theme is blockchain security. Blockchain focuses on decentralized peer to peer (P2P) network constructs, and is heavily impacted by faulty codebases which blockchain security professionals audit regularly to identify flaws in logic which can impact the integrity of public ledgers and create security concerns for those using blockchain technology, and unsafe memory access is another concern in blockchain which can be exploited by BOFs. Some companies are now implementing artificial intelligence to improve blockchain network security and “establish a robust verification system to keep potential cyber threats at bay.”
https://ifflab.org/the-5-latest-cyber-security-technologies-for-your-business/