SUBSCRIBE TO TMCnet
TMCnet - World's Largest Communications and Technology Community

CHANNEL BY TOPICS


QUICK LINKS




Defense Against Cloud Communications Network Vulnerabilities is Not What We May Think
Cloud Communications Featured Article

Defense Against Cloud Communications Network Vulnerabilities is Not What We May Think

August 06, 2012

Share
Tweet
By Allison Boccamazzo,
Content Producer

Fighting against network vulnerabilities has been a persistent and raging battle, and sometimes it feels like it is simply going nowhere. With companies experiencing security incidents every day, one thing is surely brought to light – companies need to take the proper precautions against protecting themselves and their networks. While many think it’s as easy as one, two, three, it’s not; however, this isn’t a bad thing.


A GFI blog detailing a CSI (News - Alert) Computer Crime and Security Survey shows that the two most common practices upon experiencing a security incident are patching up vulnerable software (62.3 percent), and looking into the patching or remediation of vulnerable hardware or infrastructure (49.3 percent). Despite this, the number of vulnerabilities which go both unknown and discovered continues to grow, “and the risk of not applying a patch in time grows correspondingly,” the blog says.

While on-demand network scans were once a relatively simple and easy process, technology continues to evolve, grow, and demand more of us. Network protection is no exception to these changes. As scanning became more complex, it was soon found to be too long of a process to accommodate today’s rapid, modernized environment. Even when run overnight, there was no longer enough time to complete the entire network scan. This called attention to the vitality of offloading the scanning load onto target computers via installing a small agent, which then works to communicate with the central console.

While this transformed the process and led to “dramatic performance improvements in getting the entire network scan completed,” there was more to be seen and done to ensure the complete protection of one’s network.

So what else is necessary to complete this process?

1.)    Deploying a reliable and strong patch management: Not only does patch management provide easy and reliable security, but it also brings about many benefits, such as being able to run when target computers are not on the network (such is the case with laptops) and communicate results back to the console when the laptop returns to the network.

2.)    Vulnerability Assessment: Vulnerability assessment – or remediation – is not only necessary but critical to keeping a safe and securely running network. “Remediation is essential, especially through patch management and deployment to the machines, where the vulnerabilities have been detected,” explains GFI in its blog. Needless to say, it’s important to keep your eyes open for a software solution which includes agent technology for scanning and relay agent technology for remediation. Furthermore, keep in mind that it should include support for both security and non-security patches from reliable systems and applications.

3.)    Network Auditing: Last, you must be sure that your network protection service scans for vulnerabilities in servers, workstations, and laptops (i.e. PCs, Macs and Linux computers, as well as printers, switches, and routers).

If you’re looking for something with all three of these essential qualities, you don’t need to look any further. The newly launched GFI LanGuard 2012 combines all of the above into one extremely powerful virtual security consultant by incorporating all three of these vital security tools. Don’t become a statistic of network breaching and click here to learn more about GFI LanGuard 2012 and how you can begin your 30-day trial today.

Finally – you can have your cake and eat it too!

Want to learn more about cloud communications? Then be sure to attend the Cloud Communications Expo, collocated with ITEXPO West 2012 taking place Oct 2-5, in Austin, TX. The Cloud Communications Expo will address the growing need of businesses to integrate and leverage cloud based communications applications, process enhancement techniques, and network based communications interfaces and architectures. For more information on registering for the Cloud Communications Expo click here.

Stay in touch with everything happening at Cloud Communications Expo. Follow us on Twitter.




Edited by Amanda Ciccatelli
Cloud Communications Homepage ›





Technology Marketing Corporation

2 Trap Falls Road Suite 106, Shelton, CT 06484 USA
Ph: +1-203-852-6800, 800-243-6002

General comments: [email protected].
Comments about this site: [email protected].

STAY CURRENT YOUR WAY

© 2024 Technology Marketing Corporation. All rights reserved | Privacy Policy