Menlo Security Cloud Security Platform receives FedRAMP® Authorization
Traditional security approaches are flawed, costly, and overwhelming for security teams. Menlo Security is different. It’s the simplest, most definitive way to secure work—making online threats irrelevant to your users and your business.
Our platform invisibly protects users wherever they go online. So threats are history and the alert storm is over.
Traditional network security wasn’t built to address today’s complex enterprise environments. SASE fixes that problem.
Menlo Labs provides insights, expertise, context and tools to aid customers on their journey to connect, communicate and collaborate securely without compromise. The collective is made up of elite security researchers that put a spotlight on the threats you know and don’t know about.
Menlo Labs provides insights, expertise, context and tools to aid customers on their journey to connect, communicate and collaborate securely without compromise.
Menlo Security | Apr 09, 2020
Share this article
We’ve been talking a lot recently about how changing work habits will disrupt enterprise security in 2020. Workers are becoming increasingly mobile, and enterprises continue to move mission-critical systems to the cloud. The problem is that traditional security strategies are not able to keep up with the changing web traffic patterns and volumes caused by these workplace shifts. The result is a broken security stack and increased costs .
A third side effect of cloud transformation is a lack of visibility into users’ web behavior. Traditional security solutions that protect on-premises infrastructure are based on knowing exactly what web traffic is entering the organization and exactly how users are interacting with web content. Routing all traffic through firewalls and proxies such as a secure web gateway (SWG) allows organizations to monitor web traffic for suspicious content and block anything that is untrustworthy.
You can argue that this approach was never a good way to protect users and their devices from malicious actors, but at least robust policies and safeguards can be attached to traffic flowing into and out of the organization—regardless of their effectiveness and their impact on user productivity. However, this visibility disappears as mobile and remote office users directly access the Internet without going through the corporate firewall.
There is evidence that this shift will be an ongoing problem. According to Blissfully, enterprises with more than 1,000 employees are adopting SaaS platforms at a rapid pace—with each employee using an average of 9.5 SaaS apps as part of their daily routine.
These SaaS platforms require direct and constant connectivity to users’ devices. Every edit to a document and every change to a database needs to be recorded and synced in real time for other users who might be working concurrently from the same file. Rerouting traffic through a central choke point would dramatically slow performance and erase any accessibility and productivity benefits that SaaS platforms promise to provide. And, as we have discussed previously, adding bigger pipes and scaling security appliances to every branch office and remote worker is both architecturally implausible and cost prohibitive .
Another problem occurs when the traditional hub-and-spoke security architecture attempts to decrypt HTTPS websites—a protocol that 90 percent of current websites use. Appliances and traditional security solutions simply cannot handle the increased load because of the advanced encryption techniques that HTTPS uses, preventing organizations from gaining visibility into HTTPS traffic to identify and block malicious content.
So what’s the answer? How can enterprises maintain visibility into users’ web browsing activity without impacting performance, putting the organization at risk, and breaking the budget?
The solution is cloud security transformation—the process of moving security services to the cloud. Rather than trying to cram a square peg through a round hole by continuing to use an appliance-based security strategy, enterprises need to deliver security services through the cloud.
Cloud security ensures that policies (such as isolation) follow users wherever they log in from—whether it’s from corporate headquarters, a remote office, a customer site, or public Wi-Fi. This strategy gives cybersecurity teams the visibility into and control over all users’ web browsing without having to deploy an extensive and expensive network of security appliances. Cloud security works because the Internet is ubiquitous. It’s the medium through which all users access the websites, web apps, and SaaS platforms they need to do their jobs.
Enterprises are moving critical business systems to SaaS platforms, but they’ve found that moving to the cloud eliminates visibility into users’ web behavior. You can’t have cloud transformation without cloud security transformation. Contact Menlo Security today to learn more about cloud security transformation and the Menlo Security Secure Internet with an Isolation Core™
Posted by Menlo Security on Apr 09, 2020
Tagged with Remote Working
Protecting the Remote Workforce
To talk to a Menlo Security expert, complete the form, or call us at (650) 695-0695.