<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.cloud9advisers.com/News/tag/cybersecurity/feed" rel="self" type="application/rss+xml"/><title>Cloud 9 Advisers - News #cybersecurity</title><description>Cloud 9 Advisers - News #cybersecurity</description><link>https://www.cloud9advisers.com/News/tag/cybersecurity</link><lastBuildDate>Sat, 28 Feb 2026 01:55:13 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Redefining Connectivity in the Digital Age]]></title><link>https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age</link><description><![CDATA[The B2B landscape is defined by the age of AI, cloud, and ubiquitous mobility. We explore how SDWAN and SASE are transforming the network from a cost center into the core strategic asset that drives advanced digital initiatives and fuels the AI gold rush.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_XA3OhJvvT1aZzVTrdhkPvQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_agzUTmSTQT-QxVGsMF3BAw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_5e4krQ7FR46xJ9t8_i2rmw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_YBx_lEe_SEu1iNDKjj3CVA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h1
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span style="color:inherit;"><span>How SDWAN and SASE Fuel the Age of AI and Digital Strategy</span></span></h1></div>
<div data-element-id="elm_XYcZkgPcD2dDwzRMfWrKlQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span style="font-weight:bold;">Advanced Networking: The Foundational Requirement for the AI Era</span></p><p><span><span><span><span>The convergence of network optimization and cloud security transforms connectivity from a simple utility into the core strategic asset that enables mobility, IoT, and AI-driven growth.</span></span><br/></span></span></p><p><span><span><span><span><br/></span></span></span></span></p><p style="text-align:center;"><span><span><span><span><span><span style="font-style:italic;">Updated!&nbsp;</span></span><br/></span></span></span></span></p></div>
</div><div data-element-id="elm_vJ5mW9dYeQgXO9wbRdHiSw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_vJ5mW9dYeQgXO9wbRdHiSw"] .zpimage-container figure img { width: 1110px ; height: 369.42px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/artificial-intelligence-3706562_1280.jpg" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_osL2YtKZiEz20jz4t8Tfow" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span>The modern network acts as an intelligent traffic control layer, prioritizing real-time AI data while securing every access point.</span></span></p></div>
</div><div data-element-id="elm_25RamFwwTPLd9yAdqGubMw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_25RamFwwTPLd9yAdqGubMw"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_25RamFwwTPLd9yAdqGubMw"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_aemv--3tH0aCZMkIizO-Bw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_9YoBLdTWISYfJc6Z5AkZDg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_sUYmup9gNv3NurUxkrujhg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span style="font-size:12pt;"></span></p><div><h1><span>Advanced Networking: The Foundational Requirement for the AI Era</span></h1><p><span>The modern B2B technology landscape is defined by two relentless forces: the shift of critical applications to the cloud, and the universal need for advanced, real-time data analysis. As customer needs evolve, driven by demands for instant communication, ubiquitous mobility, and sophisticated analytics, network architecture is no longer a back-office utility—it is the ultimate strategic enabler.</span></p><p><span><br/></span></p><p><span>Advanced solutions like cloud infrastructure, sophisticated cybersecurity defense, and transformative Customer Experience (CX) platforms are reshaping how network management operates. Without a high-performing, flexible, and secure network foundation, these initiatives cannot deliver their promised value. In fact, a brittle, legacy network architecture quickly becomes the single biggest bottleneck that cripples digital transformation.</span></p><p><span><br/></span></p><p><span>This realization is driving the rapid adoption and evolution of </span><strong>Software-Defined Wide Area Networking (SDWAN)</strong><span> and the mandatory shift to </span><strong>Secure Access Service Edge (SASE)</strong><span>. These are the twin pillars of advanced connectivity, transforming the network from a cost center into a true competitive asset.</span></p><h3><span><br/></span></h3><h3><span>The AI Gold Rush and the Network Bottleneck</span></h3><p><span>The excitement surrounding Artificial Intelligence (AI) and Machine Learning (ML) is palpable. From large language models (LLMs) used for generative tasks to predictive analytics driving operational efficiencies, every business is exploring how to harness this power. This technological pursuit can be described as the </span><strong>AI Gold Rush</strong><span>, and the fuel for this rush is </span><strong>data</strong><span>.</span></p><p><span><br/></span></p><p><span>However, the reality of deploying and scaling AI is harsh: AI models are voracious consumers and producers of data.</span></p><ul><li><p><strong>Training Data Load:</strong><span> Training new models requires moving massive, multi-petabyte datasets, often between enterprise locations, cloud storage, and specialized compute clusters. These sustained, heavy data streams place an immense strain on conventional wide area networks.</span></p></li><li><p><strong>Real-Time Inference:</strong><span> When models are deployed for real-time use (e.g., fraud detection, robotic process automation, or instant translation), the network must handle constant, bidirectional streams of </span><em>inference</em><span> data. This traffic demands extremely low latency, as milliseconds of delay can render the AI's result useless or too late for the human decision-maker.</span></p></li><li><p><strong>Edge AI and IoT:</strong><span> The proliferation of IoT devices and edge computing—essential for modern industrial operations or retail analytics—means AI is often deployed outside the data center. The network must aggregate data from thousands of endpoints, securely transport it for analysis, and then deliver inference back to the edge with near-zero delay.</span></p></li></ul><p><span>Legacy networks, designed primarily for static user-to-data-center traffic, are simply not equipped to handle the sheer volume, velocity, and priority requirements of these diverse AI data loads.</span></p><h3><span><br/></span></h3><h3><span>SDWAN’s AI Role: From Bandwidth to Intelligent Transport</span></h3><p><span>This is where the evolution of </span><strong>SDWAN</strong><span> becomes critical. SDWAN is moving beyond simply pooling bandwidth; it is now integrating </span><strong>AI and Machine Learning</strong><span> to enable a level of control that manual configuration could never achieve.</span></p><p><span><br/></span></p><p><span>The network must become self-aware and adaptive:</span></p><ol><li><p><strong>Adaptive Routing:</strong><span> Integrated ML capabilities allow the SDWAN solution to constantly monitor the quality of every available link (fiber, broadband, 5G, satellite) in real-time. If it detects a spike in jitter or packet loss on one link, it doesn't just failover; it instantly and preemptively steers critical traffic—like that associated with a remote AI inference operation or a vital cloud application—to a healthier path, often without any human intervention or network interruption.</span></p></li><li><p><strong>Application-Tailored Performance:</strong><span> Clients are prioritizing </span><strong>application-tailored performance</strong><span> over generalized capacity. A network built for the AI era must be intelligent enough to identify a large, non-urgent data backup (which can handle some latency) versus a sensitive UCaaS voice packet or a critical AI data stream. It uses its </span><strong>prioritization, optimization, and acceleration</strong><span> capabilities to allocate resources based on the business criticality of the application, ensuring that the most valuable traffic always wins.</span></p></li><li><p><strong>Convergence of Network, Mobility, and IoT:</strong><span> SDWAN facilitates the convergence of these three domains into a cohesive transport solution. By providing flexible, policy-driven connectivity, it ensures that real-time data transmission from mobile devices, manufacturing sensors, and cloud services flows efficiently. This integration is essential for providing the seamless, user-friendly experience modern businesses demand.</span></p></li></ol><p><span>SDWAN is no longer about getting more data through the pipe; it’s about making the pipe smarter, turning it into a dynamic data delivery system that is a prerequisite for successful AI adoption.</span></p><h3><span><br/></span></h3><h3><span>SASE and Security: Unifying the New Perimeter</span></h3><p><span>A conversation about advanced networking, especially one related to enabling AI and mobility, is fundamentally incomplete without addressing cybersecurity. As the network shifts to the cloud, the perimeter dissolves, and the risk surface expands exponentially. This is the driving force behind the mandatory shift to </span><strong>SASE (Secure Access Service Edge)</strong><span>.</span></p><p><span><br/></span></p><p><span>SASE and </span><strong>CASB (Cloud Access Security Broker)</strong><span> frameworks are transforming organizational security approaches by replacing fragmented, appliance-based security with a unified, cloud-native platform. This is the only way to manage the complexity and scale of modern threats.</span></p><p><span><br/></span></p><p><span>The integration of network optimization (SDWAN) and security convergence (SASE) delivers profound advantages:</span></p><ul><li><p><strong>Zero Trust Enforcement:</strong><span> A true SASE architecture embeds </span><strong>Zero Trust Network Access (ZTNA)</strong><span>. Instead of relying on the physical IP address of a location—which is obsolete in the mobile world—access policy is tied to the </span><strong>user's identity</strong><span> and the real-time posture of their device. This is crucial for protecting the sensitive data fueling AI, ensuring that only verified identities can access the massive data lakes required for model training and deployment.</span></p></li><li><p><strong>The Single Pane of Glass:</strong><span> SASE integrates multiple security functions (Firewall-as-a-Service, Secure Web Gateway, CASB) into a single software stack delivered from the cloud. This unified management platform greatly reduces the complexity, operational overhead, and security gaps inherent in multi-vendor, disparate solutions. Monitoring and managing security risks through a single interface provides unparalleled visibility and consistency across all endpoints and cloud resources.</span></p></li><li><p><strong>Pervasive, Low-Latency Security:</strong><span> Because SASE is delivered via a global network of PoPs (Points of Presence), security inspection happens close to the user, eliminating the need to &quot;backhaul&quot; traffic. This ensures that the security layer does not introduce performance-crippling latency, preserving the speed and efficiency required by AI and real-time cloud applications.</span></p></li></ul><p><span>In the advanced network, security is not an afterthought; it is an inseparable, integrated function of connectivity.</span></p><h3><span><br/></span></h3><h3><span>Understanding the Client Imperative</span></h3><p><span>The reality is that these advanced solutions are not a plug-and-play, one-size-fits-all commodity. They require a rigorous, third-party assessment to ensure they align with the unique needs and growth objectives of each business.</span></p><p><span><br/></span></p><p><span>Designing effective networking solutions in the age of AI and SASE requires:</span></p><ol><li><p><strong>Thorough Needs Assessment:</strong><span> Moving past simple link capacity metrics to understanding application requirements, data flow patterns (where the AI and IoT data is being generated and consumed), and specific security mandates (compliance, PII, etc.).</span></p></li><li><p><strong>Strategic Alignment:</strong><span> Ensuring that networking capabilities are not just meeting technical requirements but are directly enabling broader business objectives, such as a major cloud migration, the implementation of a new AI strategy, or the expansion of a mobile sales force.</span></p></li><li><p><strong>Vendor Neutrality:</strong><span> The market is saturated with vendors, each claiming a unique flavor of SDWAN or SASE. A trusted adviser is required to cut through the marketing noise, evaluate the true integration of the underlying technology, and shortlist providers that offer a genuinely unified, high-performing solution.</span></p></li></ol><p><span><br/></span></p><p><span>The digital age demands constant vigilance and architectural foresight. The successful organizations are those that view their network not as an expenditure, but as the core platform for innovation.</span></p><p><span><br/></span></p><p>At Cloud 9 Advisers<span>, we have a deep understanding of the challenges and opportunities at the intersection of AI, security, and connectivity. We are committed to providing our clients with the vendor-neutral insights and strategic solutions they need to navigate this complexity, achieve their business goals, and stay competitive in a rapidly evolving digital environment.</span></p><p><strong>KITS: Keep IT Simple.</strong></p></div><div><span style="font-size:12pt;"><br/></span></div></div>
</div></div><div data-element-id="elm_Edv7AMMBMLmbT7rwjmCOWw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style></div>
</div><div data-element-id="elm_Z_qMGMmzSOu_Ql2SHXbiBw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-left zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/sdwan"><span class="zpbutton-content">SD-WAN</span></a></div>
</div><div data-element-id="elm_yWHw1INNI6zc517E9iPpRg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>See our other articles about SDWAN and SASE:&nbsp;</p><p><a href="https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age" rel=""></a></p><p><a href="https://www.cloud9advisers.com/News/post/ai-engine" title="The Engine that Drives AI" rel="">The Engine that Drives AI</a><a href="https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age" rel=""><br/></a></p><p><a href="https://www.cloud9advisers.com/News/post/sdwan-call-survivability" rel="">The 'Real' SDWAN Test:</a><a href="https://www.cloud9advisers.com/News/post/sd-wan-and-sase" rel=""></a><br/></p><p><a href="https://www.cloud9advisers.com/News/post/never-trust-and-always-verify" rel="">Never Trust and Always Verify</a></p></div><p></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 07 Feb 2025 13:17:45 -0500</pubDate></item><item><title><![CDATA[Google: an alternative]]></title><link>https://www.cloud9advisers.com/News/post/Google-an-alternative</link><description><![CDATA[Microsoft faces scrutiny after scathing report from DHS. Google says they have the answer.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_u-QY0OelTWGp4Es5KyYmFw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ovuYVeo1TOuWDC5fcZ48Ng" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_c2y0JAAyTLerfOTvl5YgPQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_ryOOEMMxSB2YnE4kexSKHw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_ryOOEMMxSB2YnE4kexSKHw"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true">Google Raises Concern's about Microsoft Security: New Whitepaper shows</h1></div>
<div data-element-id="elm_V-wCJ9jDRYSCN4dMviZWzg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_V-wCJ9jDRYSCN4dMviZWzg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><div>The Department of Homeland Security’s Cyber Safety Review Board (CSRB) found that repeated security breaches against the federal government were due to a cascade of security failures at Microsoft, as well as a corporate culture that deprioritized cybersecurity.&nbsp;<br>Google proposes a safer alternative.</div></div></div>
</div><div data-element-id="elm_WfwYsgawqMb5b6LsvZ_ukA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_WfwYsgawqMb5b6LsvZ_ukA"] .zpimage-container figure img { width: 500px ; height: 644.19px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_WfwYsgawqMb5b6LsvZ_ukA"] .zpimage-container figure img { width:500px ; height:644.19px ; } } @media (max-width: 767px) { [data-element-id="elm_WfwYsgawqMb5b6LsvZ_ukA"] .zpimage-container figure img { width:500px ; height:644.19px ; } } [data-element-id="elm_WfwYsgawqMb5b6LsvZ_ukA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="/Google-alternative.png" target="" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Google-alternative.png" width="500" height="644.19" loading="lazy" size="medium"/></picture></a></figure></div>
</div><div data-element-id="elm_h357TC0quc1SuRJpz_me8w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_h357TC0quc1SuRJpz_me8w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="font-style:italic;"><a href="/Google-alternative.png" target="_blank" rel="" download="">View and download Google's whitepaper</a></span></p></div>
</div><div data-element-id="elm_nhzYNJzuKlF1vKoJ0VHZYg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_nhzYNJzuKlF1vKoJ0VHZYg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_dxQDNJLGlOeIqRovLpSFNQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_dxQDNJLGlOeIqRovLpSFNQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_jz4YBHWbEewE_pgmvw-RIw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_jz4YBHWbEewE_pgmvw-RIw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><span style="color:inherit;">Following several high-profile cybersecurity incidents, Microsoft faces scrutiny. Google's new white paper, &quot;A More Secure Alternative,&quot; highlights its own security practices while referencing a Department of Homeland Security's Cyber Safety Review Board (CSRB) report that identified security failures and poor cybersecurity culture and focus within Microsoft. This report may influence customer decisions: Google or Microsoft?</span><br></div></div>
</div><div data-element-id="elm_56cGU861fzF3e56LbX-Khw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_56cGU861fzF3e56LbX-Khw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Scathing report from DHS</span></h2></div>
<div data-element-id="elm_nYxwLwsw_aAcuVYWxZcozQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_nYxwLwsw_aAcuVYWxZcozQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Microsoft's security vulnerabilities reached a critical point recently, exposing U.S. and U.K. government customers in a series of high-profile attacks. Notably, a 2023 incident by Storm-0558 compromised sensitive government accounts across 22 organizations, impacting over 500 individuals and tens of thousands of emails. This breach triggered a scathing report from the Department of Homeland Security's Cyber Safety Review Board (CSRB). The report exposed a chain reaction of security failures and a corporate culture that downplayed both enterprise security investments and rigorous risk management.</span><br></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">Further amplifying concerns, a separate high-profile incident involved state-backed cyber actors known as Midnight Blizzard. This group successfully compromised Microsoft corporate email accounts, enabling them to steal email exchanges between Federal Civilian Executive Branch (FCEB) agencies and Microsoft. This critical breach prompted the Cybersecurity and Infrastructure Security Agency (CISA) to issue Emergency Directive ED 24-02.</span><span style="color:inherit;"><br></span></p></div>
</div><div data-element-id="elm_9hIyhKf8S6fnAw4VdXdc1Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_9hIyhKf8S6fnAw4VdXdc1Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">What is the real target?</h2></div>
<div data-element-id="elm_cMJALKBXRETg9ykTfXr-fw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_cMJALKBXRETg9ykTfXr-fw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">It's pretty obvious now that government agencies are a prime target for cyberattacks due to their sensitive data and many other factors. Most agencies heavily rely on Microsoft products.&nbsp;</span><span style="color:inherit;">In a 2022 Google survey, 84% of all Washington, D.C. metro area employees use Microsoft products. Furthermore a broader survey from Omdia found 85% of all federal government employees use Microsoft.</span></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">Google Workspace has sizable market share in the business, education, and healthcare sectors -&nbsp;</span><span style="color:inherit;">largely due to its ease of use, simple and intuitive interface, comprehensive billing, and most importantly advanced cybersecurity protections built-in.&nbsp;</span></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">Does that mean bad actors are targeting customers of Microsoft or going after specific targets of interest? That remains to be seen but likely a little of both. If the target is interesting enough it doesn't matter what platform or systems are used.&nbsp;</span></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">Another important question might be: if the tables were turned, Google happened to have higher market share in government, would the &quot;scathing report&quot; be about them? Of course Google doesn't think so.&nbsp;</span></p></div>
</div><div data-element-id="elm_ZTp96G2cbgRnWPlG7qivJA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_ZTp96G2cbgRnWPlG7qivJA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Things to consider</h2></div>
<div data-element-id="elm__a2f0a4B0V5jsys1HlL8RQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm__a2f0a4B0V5jsys1HlL8RQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>No one is suggesting you haul off and switch you entire business or government agency from Microsoft to Google (oh, wait... no, that is exactly what Google is hoping for!) but, it might be a good opportunity for a deeper inspection and even a thorough evaluation/comparison of the two. At the least to see what the other has to offer. At least the whitepaper is compelling enough for customers to probe for more.&nbsp;</p><p><br></p><p>Considering such a decision is so big and impactful for everyone involved, consider outside help. A technology adviser or IT consultant can guide you through the process and introduce you to the right experts and partners.&nbsp;</p></div>
</div><div data-element-id="elm_tNFWR6qzz0OTikR0n4fhuw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_tNFWR6qzz0OTikR0n4fhuw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Not all is lost</h2></div>
<div data-element-id="elm_1zxIA4_HucmU0pK1ImCFJQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_1zxIA4_HucmU0pK1ImCFJQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Google is certainly an option, and a pretty good one at that. Microsoft has made announcements addressing some of the concerns outlined in the report. They are making efforts to change the behavior and culture within Microsoft ranks. A recent Dark Reading article reports that a</span><span style="color:inherit;">t least a portion of executive compensation will be tied to meeting security goals.&nbsp;</span><br></p></div>
</div></div><div data-element-id="elm_2dEVl9wZlOfk2CYGetsclQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_2dEVl9wZlOfk2CYGetsclQ"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_S9nU6SDRSiSZJfD2HD_3Sg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_S9nU6SDRSiSZJfD2HD_3Sg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div><div data-element-id="elm_G6Xcpe5SPdt-N-uFxYciiQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_G6Xcpe5SPdt-N-uFxYciiQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">About Cloud 9</h2></div>
<div data-element-id="elm_S-XtmrxKEr2JyNb1whXBJQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_S-XtmrxKEr2JyNb1whXBJQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Our advice always has been and remains: get the right partner in place. Having the right Microsoft&nbsp;<span style="font-style:italic;font-weight:bold;">or</span>&nbsp;Google partner will have profound impact on your experience with either platform. Consider Cloud 9 your partner finder! That's all we do - connect our clients with the right partners, vendors, suppliers and service providers for Cybersecurity, Communications, Connectivity, and Cloud.&nbsp;</p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 17 Jun 2024 16:13:10 -0500</pubDate></item><item><title><![CDATA[Key security Concepts, 1]]></title><link>https://www.cloud9advisers.com/News/post/key-security-concepts-1</link><description><![CDATA[A cybersecurity framework is a set of practices, policies, and procedures that help an organization to create an effective security program.&nbsp; Key ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_jbJe4SA1Q_qeeBdh4gJftQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_kn84HiEaSvuEvI3Jf0Lq_Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_LTQQzcB5R-izLAEoD7QYew" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_xZ4RVIY-SiOuLhBNJi3zYg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_xZ4RVIY-SiOuLhBNJi3zYg"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Confidentiality. Integrity. Availability.</span><br></h1></div>
<div data-element-id="elm_SFTsRTD1gvcObz1xf2likA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_SFTsRTD1gvcObz1xf2likA"] .zpimage-container figure img { width: 596.35px !important ; height: 519px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_SFTsRTD1gvcObz1xf2likA"] .zpimage-container figure img { width:596.35px ; height:519px ; } } @media (max-width: 767px) { [data-element-id="elm_SFTsRTD1gvcObz1xf2likA"] .zpimage-container figure img { width:596.35px ; height:519px ; } } [data-element-id="elm_SFTsRTD1gvcObz1xf2likA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/Security%20-%20Three%20of%20Three%20-1-.svg" width="596.35" height="519" loading="lazy" size="custom" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_vq6o0PLjT8iiytTJaLwNEA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_vq6o0PLjT8iiytTJaLwNEA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="color:inherit;">A cybersecurity framework is a set of practices, policies, and procedures that help an organization to create an effective security program.&nbsp; </span><span style="color:inherit;">Key&nbsp;</span><span style="color:inherit;">concepts for Cybersecurity is starting with a framework. There are plenty of pre-built frameworks available to guide you based on your industry, like NIST, PCI, HIPAA, ISO and more. But before you go there, and maybe before you even pick one, you should start with the Three Rules or Three. The first set starts with Confidentiality, Availability, and Integrity. This is the fine balancing act for Cybersecurity, also known as the “bedrock principle for Cybersecurity.” There’s no such thing as perfect security, you can’t spend all resources on all three areas - so focusing on your specific business needs, and identifying which of these are most important to your business and the separate business units helps properly align Cybersecurity solutions with business outcomes.</span></div></div></div>
</div><div data-element-id="elm_bJjyTVv7SSUchbztXC2Mdg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_bJjyTVv7SSUchbztXC2Mdg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>If your an accounting firm integrity of data might be most important to you. If your an e-commerce company, then availability is critical. If you're in healthcare, confidentiality may be paramount. Start with the overall needs of the business as a whole, then drill down to the specific needs of each department or business unit. Striking the balance is also important from department to department.&nbsp;</p></div>
</div><div data-element-id="elm_8Hb7wbUbTVGvKPUdqBStGQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_8Hb7wbUbTVGvKPUdqBStGQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/cybersecurity"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 13 May 2024 05:42:00 -0500</pubDate></item><item><title><![CDATA[How to truly go Passwordless]]></title><link>https://www.cloud9advisers.com/News/post/how-to-go-passwrodless</link><description><![CDATA[Patented AI technology provides the strongest end-to-end identity verification authentication and continuous risk management for human and machine identities]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_1vVp8-DgQeWOMNaA3e6Gzg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_8FBft7QyROeNdLd6eb5TTQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_cE8HA9WfTAOLcGM0bMrTFg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_jjqr4wvERnquS4wEfNtDgA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_jjqr4wvERnquS4wEfNtDgA"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true">Go beyond the Passwordless hype</h1></div>
<div data-element-id="elm_A9qHWdJkoCdnjN9-K8bigQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_A9qHWdJkoCdnjN9-K8bigQ"] .zpimage-container figure img { width: 509px !important ; height: 339px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_A9qHWdJkoCdnjN9-K8bigQ"] .zpimage-container figure img { width:509px ; height:339px ; } } @media (max-width: 767px) { [data-element-id="elm_A9qHWdJkoCdnjN9-K8bigQ"] .zpimage-container figure img { width:509px ; height:339px ; } } [data-element-id="elm_A9qHWdJkoCdnjN9-K8bigQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/time-to-change-strong-password-from-weak-notepad-with-passwords.webp" width="509" height="339" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_YOWvBLpgR1yJZxofWJwJRg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_YOWvBLpgR1yJZxofWJwJRg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><div>Replace dreaded passwords with an intelligent authentication system that learns how people work and keeps them more secure.</div></div></div>
</div><div data-element-id="elm_hya_yFgP14G8U6pDyg21OQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_hya_yFgP14G8U6pDyg21OQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_iQEf6p3WoOGrSTi732FwGg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_iQEf6p3WoOGrSTi732FwGg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_YCl7YNHLCR6O53l9oFxSYg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_YCl7YNHLCR6O53l9oFxSYg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><div>Enterprises need better security.</div></div></h2></div>
<div data-element-id="elm_332vUH6gFM0bwCGFlPCgPQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_332vUH6gFM0bwCGFlPCgPQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="color:inherit;">We all know human error is still the largest security &quot;threat&quot;. Fortunately, awareness and training are starting to chip away at the problem. However, at the root of some 81% of data <span style="font-style:italic;">breaches</span>, compromised identity and credentials are the biggest attack vector in the modern enterprise. $16B was spent on Identity and Access Management (IAM) solutions in 2020 yet the problem is only getting worse. Existing solutions are simply not sufficient. Enterprises need better security.</span><br></div></div></div>
</div><div data-element-id="elm_p-6oOnBtVa8sCeXbBrmFXg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_p-6oOnBtVa8sCeXbBrmFXg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><div>Are you and your users tired of being bombed with MFA requests?&nbsp;</div></div></h2></div>
<div data-element-id="elm_roJiE9FgXnktIjb09qmcfg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_roJiE9FgXnktIjb09qmcfg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Reach out to your Cloud 9 solutions specialist for an introduction to one of our newest, exclusive cybersecurity providers. They combine the strongest identity proofing, presence, biometrics, and behavioral markers in one continuous engine to deliver the most comprehensive passwordless solution on the planet (a little poetic license, but we’re pretty sure that is Tru).</span><br></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Patented AI technology provides the strongest end-to-end identity verification authentication and continuous risk management for human and machine identities. In combination with your current or a new Security Awareness Training program it will help companies eliminate the most significant causes of data breaches - social engineering attacks, human errors, and misuse.</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">Passwordless </span><span style="font-size:12pt;">- eliminate passwords as a means of authentication and enable clever and usable biometrics for authentication instead–without new hardware and systems</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Continuous Adaptive Trust / Continuous Authentication (</span><span style="font-size:12pt;font-weight:700;">CAT</span><span style="font-size:12pt;">) - Extend passwordless access beyond just point-in-time authentication, provide identity device and environmental risk assessment at multiple points in time during user sessions. Using patented ML and AI based learning systems that fuse biometrics, behavioral, device, and environmental signals to determine true identity </span><span style="font-size:12pt;font-style:italic;">continuously</span><span style="font-size:12pt;">, in a globally compliant manner.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">Converged </span><span style="font-size:12pt;">- merge the digital and physical world by enabling trusted physical access to buildings, server rooms, restricted physical areas, and all integrated with Passwordless and CAT solutions.&nbsp;</span></p></div>
</div><div data-element-id="elm_f6mVQE2akrizEl3caEj6ew" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_f6mVQE2akrizEl3caEj6ew"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">COMPLETE</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Cover all work scenarios with support for Windows, Mac, Linux, and servers; web and native mobile apps; and passwordless VDI and network access (VPN, wireless)</span></p><p><span style="color:inherit;"><span><br></span></span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">CONTINUOUS</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Go beyond point-in-time initial authentication and extend security within the working session, continuously learning and assessing behavioral risk</span></p><p><span style="color:inherit;"><span><br></span></span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">CONNECTED</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Easy to deploy into any environment with rich, standards-based, pre-built integrations</span></p><p><span style="color:inherit;"><span><br></span></span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">COORDINATED</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Enjoy workflow and policy-driven self-service identity proofing, onboarding, and account recovery</span></p><p><span style="color:inherit;"><span><br></span></span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">CONVERGED</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Unify physical and digital security into the same solution, allowing for greater flexibility in workplace design and management</span></p><p><span style="color:inherit;"></span></p><div><span style="font-size:12pt;"><br></span></div></div>
</div></div><div data-element-id="elm_vfwcVpEXiljVBG8nlTtxgw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_vfwcVpEXiljVBG8nlTtxgw"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_etFWwvUfSBe7Gp7SWB42lw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_etFWwvUfSBe7Gp7SWB42lw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us"><span class="zpbutton-content">Get Started Now</span></a></div>
</div><div data-element-id="elm_qXBMZ2llVHUL6vml-zNM8A" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_qXBMZ2llVHUL6vml-zNM8A"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Cloud 9</h2></div>
<div data-element-id="elm_G9bSP9GAd49YZ5yVjoYMPA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_G9bSP9GAd49YZ5yVjoYMPA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>Cloud 9 Advisers exists to help organizations make smart IT decisions quickly and confidently. We work with leadership and understaffed IT teams who are embarking on projects outside their wheelhouse and help to rationalize IT spend. We are objective, impartial, and unbiased technology sourcing experts with vendor-neutral engineering teams that focus on four critical segments: Cybersecurity, Communications, Connectivity, and Cloud. We do not sell solutions, we work with you to identify and research solutions. We are not another vendor, we are your partner helping you evaluate and compare vendors; so you can solve problems and achieve business outcomes, fast.</div><br><div><br></div></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 26 Apr 2024 17:08:43 -0500</pubDate></item><item><title><![CDATA[Gone Phishin']]></title><link>https://www.cloud9advisers.com/News/post/gone-phishin</link><description><![CDATA[How do you make sure they get it? Any Security Awareness Training (SAT) program worth it's salt should have phishing simulation built it. This article breaks down the benefits, from measuring your employees' security awareness to creating a robust culture of security within your organization]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_yh9E0qS8QRCLVOhOZBtECQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_cmTvcBk5R6qCrTN0a_-mMA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_FYfILkFASHilE4nIBFxXLQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_pGAEwMj4Qw-X2BsHWSsGbw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true">SATs plus Phishing Simulation,&nbsp; A No-Brainer</h2></div>
<div data-element-id="elm_ZC_GRSvORHOj8Q0u6ZAvUQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ZC_GRSvORHOj8Q0u6ZAvUQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;">Arm yourself with knowledge and enhance your organization's cyber resilience.&nbsp;</span>Any Security Awareness Training (SAT) program worth it's salt should have phishing simulation built in.&nbsp;<span style="color:inherit;">Uncover the power of testing your team's resilience against the ever-evolving threat of phishing attacks.</span></p></div>
</div><div data-element-id="elm_UQ9x91VDD1o8DYtyROzxbw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_UQ9x91VDD1o8DYtyROzxbw"] .zpimage-container figure img { width: 1110px ; height: 740.23px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_UQ9x91VDD1o8DYtyROzxbw"] .zpimage-container figure img { width:723px ; height:482.15px ; } } @media (max-width: 767px) { [data-element-id="elm_UQ9x91VDD1o8DYtyROzxbw"] .zpimage-container figure img { width:415px ; height:276.75px ; } } [data-element-id="elm_UQ9x91VDD1o8DYtyROzxbw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/Fichinggear.jpg" width="415" height="276.75" loading="lazy" size="fit" alt="phishing: get the right gear " data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_Ut-IXSwHsErvU-q96vfiJA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_Ut-IXSwHsErvU-q96vfiJA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_ErohqKevIZpCbCpNfYy8yg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_ErohqKevIZpCbCpNfYy8yg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_rdkX4Y-1dSyg7QqF7NvHjg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_rdkX4Y-1dSyg7QqF7NvHjg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Strengthening Cyber Defenses</span></h2></div>
<div data-element-id="elm_nK3v7DYVyKxyhK40QmXdnA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_nK3v7DYVyKxyhK40QmXdnA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>In the ever-evolving landscape of cybersecurity, where human error remains the leading cause of incidents, the significance of robust Security Awareness Training (SAT) cannot be overstated. A recent study by IBM revealed that a staggering 95% of cybersecurity breaches stem from human error, emphasizing the critical need for proactive measures. In our previous exploration of SAT, we delved into the pivotal role it plays in mitigating these errors. Now, let's journey further into the realm of cyber resilience and focus on a key augmentation to SAT – the indispensable Phishing Simulation.</div></div>
</div></div><div data-element-id="elm_1bLPKzhlrFEGJNIHmFAMiA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_1bLPKzhlrFEGJNIHmFAMiA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="font-weight:bold;">The Power of Security Awareness Training:</span></div><div>Security Awareness Training (SAT) acts as a shield against the inadvertent actions and decisions that can lead to security breaches. It equips your staff with the knowledge to navigate the intricate web of scams, tactics, and evolving security threats. This empowerment, in turn, aids in fostering a security-conscious culture within the organization, reducing the exposure to potential risks.</div></div></div>
</div><div data-element-id="elm_Q1Egef7ApYLavdkL8b6LVA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Q1Egef7ApYLavdkL8b6LVA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="font-weight:bold;">Enter Phishing Simulation:</span></div><div>While SAT lays the groundwork for understanding security principles, the integration of phishing simulation takes your cybersecurity strategy to the next level. It serves as the litmus test for your employees' comprehension of security threats, specifically their ability to identify and thwart phishing attempts.</div></div></div>
</div><div data-element-id="elm_6vqCB8i9oG56Alja-1nHig" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6vqCB8i9oG56Alja-1nHig"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="font-weight:bold;">Putting Knowledge to the Test:</span></div><div>Phishing simulation operates on the premise of realism. By deploying lifelike phishing scenarios, organizations can gauge the reactions of their employees in real-time. Do they recognize the subtle signs of a phishing email, or do they inadvertently open the door to potential threats? The simulation provides invaluable insights into the efficacy of your SAT program and identifies areas that may require additional attention.</div><div><br></div><div><span style="font-weight:bold;">Creating a Cyber-Resilient Workforce:</span></div><div>The true value of phishing simulation lies in its ability to fortify your workforce against the ever-persistent threat of phishing attacks. It goes beyond theoretical knowledge, allowing employees to apply their learning in a practical setting. As they face simulated phishing attempts, the training becomes a dynamic experience, honing their instincts and enhancing their ability to make informed decisions.</div></div></div>
</div><div data-element-id="elm_s-tZ3ZYGSTPbe5DG7EwIIQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_s-tZ3ZYGSTPbe5DG7EwIIQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="font-weight:bold;">Strategic Benefits of Phishing Simulation:</span></div><div><ol><li><span style="font-weight:bold;">Measuring Security Awareness:</span>&nbsp;Phishing simulation becomes a litmus test for your employees' security awareness. Identify those who may be more susceptible to falling victim to a phishing attack, enabling a targeted and effective SAT program.</li><li><span style="font-weight:bold;">Enhancing Phishing Identification Skills:</span> Practical exposure to realistic phishing emails sharpens your team's ability to discern the telltale signs of a scam. This, in turn, empowers them to avoid clicking on malicious links or opening potentially harmful attachments.</li><li><span style="color:inherit;"><span style="font-weight:bold;">Fostering a Culture of Security:</span> Beyond individual training, phishing simulation contributes to creating a broader culture of security within your organization. When employees witness the organization's commitment to rigorous testing, they are more likely to embrace and adhere to security precautions.</span><br></li><li><span style="font-weight:bold;">Reducing the Risk of Data Breaches&nbsp;</span>By reducing the number of employees susceptible to phishing attacks, organizations can significantly lower the risk of data breaches. This proactive approach safeguards against financial losses, reputational damage, and potential regulatory fines.</li></ol></div></div></div>
</div><div data-element-id="elm_Czr4XaK8rSVoZWTVt1LPeA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Czr4XaK8rSVoZWTVt1LPeA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">In the intricate dance between cybersecurity and human behavior, the synergy between SAT and phishing simulation emerges as a formidable defense. Together, they empower your workforce to navigate the digital landscape with confidence and resilience. As we continue to unravel the layers of cyber resilience, the integration of these two components stands as a testament to the proactive measures organizations can take to secure their digital future.</span><br></p></div>
</div><div data-element-id="elm_D3JY2olThnNIJPyTecDpMg" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_D3JY2olThnNIJPyTecDpMg"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div></div><div data-element-id="elm_asEEiIWQCazHW3X3kMnKxw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_asEEiIWQCazHW3X3kMnKxw"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_wIxa3v2SMdOUWFlYbpa1jQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_wIxa3v2SMdOUWFlYbpa1jQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Cloud 9 Advisers</h2></div>
<div data-element-id="elm_X8m4xCwJtbkfaBfFpez5Qg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_X8m4xCwJtbkfaBfFpez5Qg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Let us help you find the right SAT and Phishing simulation solutions and providers. Our only job in this world is to help organizations buy &quot;cool&quot; and important stuff: i.e. cybersecurity.&nbsp;</p></div>
</div><div data-element-id="elm_G4p6T1TmsxQw_TRfzwakAQ" data-element-type="buttonicon" class="zpelement zpelem-buttonicon "><style> [data-element-id="elm_G4p6T1TmsxQw_TRfzwakAQ"].zpelem-buttonicon{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none zpbutton-icon-align-left " href="/contact-us"><span class="zpbutton-icon "><svg viewBox="0 0 512 512" height="512" width="512" xmlns="http://www.w3.org/2000/svg"><path d="M500 224h-30.364C455.724 130.325 381.675 56.276 288 42.364V12c0-6.627-5.373-12-12-12h-40c-6.627 0-12 5.373-12 12v30.364C130.325 56.276 56.276 130.325 42.364 224H12c-6.627 0-12 5.373-12 12v40c0 6.627 5.373 12 12 12h30.364C56.276 381.675 130.325 455.724 224 469.636V500c0 6.627 5.373 12 12 12h40c6.627 0 12-5.373 12-12v-30.364C381.675 455.724 455.724 381.675 469.636 288H500c6.627 0 12-5.373 12-12v-40c0-6.627-5.373-12-12-12zM288 404.634V364c0-6.627-5.373-12-12-12h-40c-6.627 0-12 5.373-12 12v40.634C165.826 392.232 119.783 346.243 107.366 288H148c6.627 0 12-5.373 12-12v-40c0-6.627-5.373-12-12-12h-40.634C119.768 165.826 165.757 119.783 224 107.366V148c0 6.627 5.373 12 12 12h40c6.627 0 12-5.373 12-12v-40.634C346.174 119.768 392.217 165.757 404.634 224H364c-6.627 0-12 5.373-12 12v40c0 6.627 5.373 12 12 12h40.634C392.232 346.174 346.243 392.217 288 404.634zM288 256c0 17.673-14.327 32-32 32s-32-14.327-32-32c0-17.673 14.327-32 32-32s32 14.327 32 32z"></path></svg></span><span class="zpbutton-content">Contact Us</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 04 Dec 2023 11:53:38 -0500</pubDate></item><item><title><![CDATA[The new SATs]]></title><link>https://www.cloud9advisers.com/News/post/the-new-sats</link><description><![CDATA[A well orchestrated Security Awareness Training (SAT) program for every single person in your company is perhaps the single most important cybersecurity tool, feature, element, solution, or service one could implement.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_7ZlzfaIZQNW8_m_aRiItSw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ZSR83gPWT4aAw7RxeglywA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mKlp0C1bTmWOePWIjJnb2g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_KUdxw2b6SlaFZSFSx4k53Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_KUdxw2b6SlaFZSFSx4k53Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Have you taken your SATs?</h2></div>
<div data-element-id="elm_i_3Pa0_oRaK-_0vQJ_Rlkw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_i_3Pa0_oRaK-_0vQJ_Rlkw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>A well orchestrated Security Awareness Training (SAT) program for every single person in your company is perhaps the single most important cybersecurity tool, feature, element, solution, or service one could implement.&nbsp;&nbsp;</p></div>
</div><div data-element-id="elm_0DmXovpNlKwJQwieDk-t0A" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_0DmXovpNlKwJQwieDk-t0A"] .zpimage-container figure img { width: 1000px !important ; height: 571px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_0DmXovpNlKwJQwieDk-t0A"] .zpimage-container figure img { width:1000px ; height:571px ; } } @media (max-width: 767px) { [data-element-id="elm_0DmXovpNlKwJQwieDk-t0A"] .zpimage-container figure img { width:1000px ; height:571px ; } } [data-element-id="elm_0DmXovpNlKwJQwieDk-t0A"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/SAT.jpg" width="1000" height="571" loading="lazy" size="original" alt="Image By vecstock" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_vm0MRDgsEEYz4IC5s6TXrg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_vm0MRDgsEEYz4IC5s6TXrg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_tJm6KCpFPA7M8RhNAbSyxQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_tJm6KCpFPA7M8RhNAbSyxQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_oZ-jMDILfa2R0DDMa3yWgg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_oZ-jMDILfa2R0DDMa3yWgg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Knowledge is power</span></h2></div>
<div data-element-id="elm_LVpVYmllPlZORmhd_hNWWQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_LVpVYmllPlZORmhd_hNWWQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:rgb(11, 35, 45);"><span style="font-size:12pt;">Human error is the number one reason for cybersecurity incidents. Security Awareness Training (SAT) is critically important for your staff and the integrity of your business - a</span><span style="font-size:16px;">rguably</span><span style="font-size:12pt;">&nbsp;more so than perhaps any other single cybersecurity solution or service. It helps to protect your organization from cyberattacks, breaches, data loss, and &quot;silly&quot; mistakes.&nbsp;</span></span></p><p><span style="color:rgb(11, 35, 45);"><span style="font-size:12pt;"><br></span></span></p><p><span style="color:rgb(11, 35, 45);"><span style="font-size:12pt;">By training your staff on the latest security threats and best practices, you can help them to make more informed decisions about their behavior both online and while using company IT resources, reducing risk and exposure.</span></span><br></p></div>
</div><div data-element-id="elm_s1xnyGQQ6UNpGy5MqrIbXg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_s1xnyGQQ6UNpGy5MqrIbXg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><div><div><span style="color:rgb(11, 37, 45);">6 Reasons why</span></div><ol><li><span style="color:rgb(11, 37, 45);"><span style="font-weight:bold;">Human error is a major security risk</span>: Studies have shown that a significant number of security breaches and data incidents occur due to human error. Employees may unknowingly fall victim to phishing attacks, click on malicious links, use weak passwords, or mishandle sensitive data. SAT helps educate and train staff members to recognize and avoid these common pitfalls, reducing the risk of security incidents caused by human error.<br></span></li><li><span style="color:rgb(11, 37, 45);"><span style="font-weight:bold;">Protection against social engineering attacks</span>: Social engineering attacks, such as phishing or impersonation, rely on manipulating individuals to gain unauthorized access or sensitive information. SAT teaches employees to identify and respond appropriately to these tactics, enhancing their ability to detect and report suspicious activities. By raising awareness of social engineering techniques, SAT helps create a more vigilant and security-conscious workforce.</span></li><li><span style="color:rgb(11, 37, 45);"><span style="font-weight:bold;">Compliance with regulations and standards</span>: Many industries are subject to specific regulations and standards regarding data protection and privacy, such as the General Data Protection Regulation (GDPR) or the Health Insurance Portability and Accountability Act (HIPAA). Security awareness training ensures that employees understand these requirements and their role in maintaining compliance. Failure to comply with these regulations can result in severe penalties and reputational damage.</span></li><li><span style="color:rgb(11, 37, 45);"><span style="font-weight:bold;">Reinforcing security policies and procedures</span>: SAT serves as a platform to communicate and reinforce security policies, procedures, and best practices within an organization. It helps employees understand the importance of adhering to security guidelines and provides them with practical knowledge on how to handle sensitive data, use secure communication channels, and protect their devices. Regular training sessions help keep security at the forefront of employees' minds and foster a culture of security within the organization.</span></li><li><span style="color:rgb(11, 37, 45);"><span style="font-weight:bold;">Mitigating insider threats</span>: While most employees are trustworthy, insider threats can still occur. Security awareness training educates staff about the potential risks associated with insider threats, such as unauthorized data access or data theft. By raising awareness, organizations can encourage employees to report suspicious activities and create a sense of accountability within the workforce.</span></li><li><span style="color:rgb(11, 37, 45);"><span style="font-weight:bold;">Reducing the impact of cyberattacks</span>: In the event of a cyberattack, well-trained employees can significantly reduce the impact and help mitigate the damage. SAT equips staff with the knowledge and skills to respond effectively, report incidents promptly, and follow incident response protocols. Their ability to recognize and respond to security incidents promptly can help contain threats and minimize the potential harm to the organization.</span></li></ol></div></div></div>
</div><div data-element-id="elm_ZsIohYPIAn0QqlgBluN9XQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ZsIohYPIAn0QqlgBluN9XQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-right:18pt;margin-bottom:18pt;"><span style="font-size:12pt;">Overall, Security Awareness Training is an important investment for any organization that wants to protect its data, resources, and IT assets from cyberattacks. By training your staff on the latest security threats and best practices, you can help to reduce the risk of security incidents and protect your organization's reputation and bottom line.</span></p></div>
</div></div><div data-element-id="elm_vDNwfv5PePEvxDlKT6hr2A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_vDNwfv5PePEvxDlKT6hr2A"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_jQN_MKUW5fvMW9Sjrz3xAQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_jQN_MKUW5fvMW9Sjrz3xAQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Cloud 9 Advisers can help</h2></div>
<div data-element-id="elm_SzvNms9I9F3dqrE26tQqVA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_SzvNms9I9F3dqrE26tQqVA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;"><span style="font-size:11pt;">There are many problems faced when buying IT services and solutions. Two big ones are the pace of change and too many choices. Cloud 9 solves decision paralysis with our IT decision-making platform. You get an expert, one-on-one, that will guide you through the entire process. We'll help you identify and research proper solutions then evaluate and compare the multitude of security awareness training solutions available today.</span></span><br></p></div>
</div><div data-element-id="elm_SqFrYOFPS-emVu-bcWHJvQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_SqFrYOFPS-emVu-bcWHJvQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://appts.cloud9advisers.com/#/customer/booknow" target="_blank" title="Book now"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 03 Nov 2023 15:20:08 -0500</pubDate></item><item><title><![CDATA[Remediation vs. Response]]></title><link>https://www.cloud9advisers.com/News/post/remediation-vs.-response</link><description><![CDATA[There is an important and distinct difference between response and remediation. As with many things these days there are plenty of opinions. And like other things along that train of thought, they all stink. Except this one, of course!]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_cheik6V2T6aOfsTEHK0wNQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_jZueJQo7Q1CLC1HaUDRKFA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm__4woVd79SlalIwDRzmrpDw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_qLYvG2NLRaqSHApkLqw7rw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_qLYvG2NLRaqSHApkLqw7rw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">What about the &quot;big R&quot;, Remediation?&nbsp;</span></h2></div>
<div data-element-id="elm_znLwfAtw-OissOaq-e921g" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_znLwfAtw-OissOaq-e921g"] .zpimage-container figure img { width: 1110px ; height: 622.22px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_znLwfAtw-OissOaq-e921g"] .zpimage-container figure img { width:723px ; height:405.28px ; } } @media (max-width: 767px) { [data-element-id="elm_znLwfAtw-OissOaq-e921g"] .zpimage-container figure img { width:415px ; height:232.63px ; } } [data-element-id="elm_znLwfAtw-OissOaq-e921g"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/remediation.jpg" width="415" height="232.63" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_PGFQaF13ojZaKwBgJqohnQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_PGFQaF13ojZaKwBgJqohnQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_4sHUvkt_PY84Uo60UWDN1w" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_4sHUvkt_PY84Uo60UWDN1w"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_w3MqvZAc0jahS4CtGs7nNg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_w3MqvZAc0jahS4CtGs7nNg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">There's a pretty big difference</h2></div>
<div data-element-id="elm_UIlLtG2tX-VnKGM4TUIUzg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_UIlLtG2tX-VnKGM4TUIUzg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:12pt;">We wanted to expand a little more on a previous article about EDR, XDR, and MDR. As many of you already know, the “r” is for response: Endpoint Detection and </span><span style="font-size:12pt;font-style:italic;">Response</span><span style="font-size:12pt;">. Extended Detection and </span><span style="font-size:12pt;font-style:italic;">Response</span><span style="font-size:12pt;">. Managed Detection and </span><span style="font-size:12pt;font-style:italic;">Response</span><span style="font-size:12pt;">. But, for some reason there seems to be little confusion on what response actually means and what it does.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">As with many things these days there are plenty of opinions. And like other things along that train of thought, they all stink. Except this one, of course!&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">There is an important and distinct difference between response and remediation:</span></p></div>
</div><div data-element-id="elm_wYfTUKQehoA6ZgS5MZQe5w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_wYfTUKQehoA6ZgS5MZQe5w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">Response </span><span style="font-size:12pt;">is “a reaction to something”. Response in cybersecurity is focused on containing and mitigating the immediate threat. While we’re thumbing through the dictionary, mitigation is “the action of reducing the severity, seriousness, or painfulness of something”</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">Remediation</span><span style="font-size:12pt;">, or </span><span style="font-size:12pt;font-style:italic;">to remedy</span><span style="font-size:12pt;"> on the other hand is, simply put, “to set right”. So to remediate a security incident is to </span><span style="font-size:12pt;font-style:italic;">fix it.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Pretty big difference.</span></p></div>
</div><div data-element-id="elm_CPD3m9HXGVM5nORWNzdWOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_CPD3m9HXGVM5nORWNzdWOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Response and remediation are both important parts of any cybersecurity strategy and incident response (IR) plan. However, as shown, there is a key difference between the two.&nbsp; It is important to be able to quickly detect and then respond to an incident. But we would like to highlught that not all _DRs&nbsp; are created equal, and you should never assume that the solution or service you have in place automatically includes remediation. Having a plan in place for remediating security incidents quickly and effectively is also critical and in most cases, not necessarily included.</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">In the context of EDR, XDR, and MDR, both response and remediation are important capabilities. EDR, XDR, and MDR solutions can all help organizations to respond to security incidents quickly and effectively. However, remediation is typically more of a manual process that involves fixing the underlying vulnerability and other problems that caused the incident in the first place.</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Some EDR, XDR, and MDR solutions may provide automated remediation capabilities for certain types of threats. For example, an EDR solution might be able to automatically remove malware from an infected endpoint. However, for more complex vulnerabilities, remediation may need to be performed manually.</span></p></div>
</div><div data-element-id="elm_FL-NlIVRUCjAo8NsAW4q-Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_FL-NlIVRUCjAo8NsAW4q-Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Remediation can be performed by either the organization itself or by the security solution provider. It often depends not only on the solution/software, but also on the service selected and service provider you get it from.</span></p><p><span style="color:inherit;"></span></p><ul><li style="font-size:12pt;"><p><span style="font-size:12pt;">EDR solutions typically provide tools to help organizations remediate threats </span><span style="font-size:12pt;font-style:italic;">on their own</span><span style="font-size:12pt;">. Most out-of-the-box solutions won’t </span><span style="font-size:12pt;font-style:italic;">remedy </span><span style="font-size:12pt;">a security threat.&nbsp;</span></p></li><li style="font-size:12pt;"><p><span style="font-size:12pt;">XDR solutions can automate </span><span style="font-size:12pt;font-style:italic;">some </span><span style="font-size:12pt;">remediation tasks, such as quarantining infected endpoints or blocking malicious traffic.</span></p></li><li style="font-size:12pt;"><p style="margin-bottom:10pt;"><span style="font-size:12pt;">MDR providers typically provide full remediation services, including removing malware, patching vulnerabilities, and restoring data from backups.</span></p></li></ul></div>
</div><div data-element-id="elm_kp8auAOOcgDvmlJrBaGddg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_kp8auAOOcgDvmlJrBaGddg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:12pt;">It is important to note that the specific capabilities of EDR, XDR, and MDR solutions vary widely. When choosing a solution, it is important to consider the specific needs of your organization and to ensure that the solution you choose provides the necessary response and/or remediation capabilities.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Which organization is responsible for remediation (either you or the service provider( will depend on the specific solution, or rather </span><span style="font-size:12pt;font-style:italic;">service</span><span style="font-size:12pt;">, in place. For example, some EDR solutions provide the option to have the security solution provider perform remediation on behalf of the organization.</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Here are some examples of how remediation might be used in each of the three solutions:</span></p><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">EDR:</span><span style="font-size:12pt;"> An EDR solution might be used to remediate a malware infection by removing the malware from the infected endpoint.</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">XDR:</span><span style="font-size:12pt;"> An XDR solution might be used to remediate a ransomware attack by automating the process of restoring data from backups and isolating the infected endpoints from the network.</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">MDR:</span><span style="font-size:12pt;"> An MDR provider might be used to remediate a data breach by investigating the incident, identifying the affected systems, and taking steps to prevent the breach from happening again.</span></p></blockquote><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Overall, remediation is an important part of any cybersecurity strategy, and it is important to have a plan in place for remediating security incidents quickly and effectively. EDR, XDR, and MDR can all help organizations to detect and respond and get organizations on the right path to remediate threats and incidents effectively. But understand that most solutions are not a complete remediation plan or strategy.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Again, response is to react, mitigate is to reduce, remediate is to fix.</span></p></div>
</div></div><div data-element-id="elm_OMWRRp9XVgEjLCUcV70tPQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_OMWRRp9XVgEjLCUcV70tPQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_0yYDaVyKvYqst7bOvpVMTA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_0yYDaVyKvYqst7bOvpVMTA"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_0yYDaVyKvYqst7bOvpVMTA"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_pY_3c7Em2RMS5OEgBcFR5w" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_pY_3c7Em2RMS5OEgBcFR5w"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Security Readiness</h2></div>
<div data-element-id="elm_Ulm0phTgcDpgVpXBRMArBQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Ulm0phTgcDpgVpXBRMArBQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>You've done a great job so far, put all the right pieces in place, and now you need to be able to prove it. Or, you think your nicely buttoned up, but wouldn't mind a second pair of eyes.</p><p><br></p><p>Our comprehensive, customized Cybersecurity Readiness Report will give you 50 to 150 pages of dos, don'ts, best practices, and the latest strategies and innovations on your security preparedness. You'll get confirmation on some things, plenty of food for thought, and maybe even uncover some gaps you weren't aware of.&nbsp;</p></div>
</div><div data-element-id="elm_9XhL8-kTQOMplOEC5rDe4g" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_9XhL8-kTQOMplOEC5rDe4g"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://appts.cloud9advisers.com/#/customer/3844308000002924034" target="_blank" title="Cyber Readiness Survey"><span class="zpbutton-content">Schedule your Report</span></a></div>
</div></div></div><div data-element-id="elm_pJxxZm0ilVGoO02qjlCbQw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_pJxxZm0ilVGoO02qjlCbQw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Cloud 9 Advisers</h2></div>
<div data-element-id="elm_q4VDg-QRTV-6nQzeI1RUeg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_q4VDg-QRTV-6nQzeI1RUeg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>As a leading technology advisory firm with a security-first focus, Cloud 9 stands ready to help you unravel the complex web of noise and &quot;FUD&quot; you'll hear out in the cybersecurity marketplace. Cybersecurity should never be only about the latest products and solutions or the fear uncertainty, and doubt (FUB) often found in the marketplace. Cybersecurity isn't an IT problem, it is a business problem</p></div>
</div><div data-element-id="elm_piqTGcrcTUOWqN9lhBW3SA" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 26 Oct 2023 08:50:16 -0500</pubDate></item><item><title><![CDATA[EDR, XDR, and MDR]]></title><link>https://www.cloud9advisers.com/News/post/edr-xdr-and-mdr</link><description><![CDATA[Back in the old days the name of the cybersecurity game was prevention - if you had a strong perimeter, then you're good! That thought process has shifted rather dramatically, because we know they'll get it regardless.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_xi8EiLn9TIW0uATsv_GPPg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_s-rvUTpkR62m2FRCBDHQTg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_tDT5eudNTdWvm6byINTgDA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_tDT5eudNTdWvm6byINTgDA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_jWrAiBL2Seuoz3VziRLVsQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_jWrAiBL2Seuoz3VziRLVsQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div>EDR, XDR, and MDR: What are they and why are they important?</div></div></div></h2></div>
<div data-element-id="elm_13Kq9Tyg8H0jV4QIZucjwg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_13Kq9Tyg8H0jV4QIZucjwg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_DjM1Njwb2lljQkqTcgryuw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_DjM1Njwb2lljQkqTcgryuw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_kOSll6w1qazWgnXNw_s9Xw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_kOSll6w1qazWgnXNw_s9Xw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="margin-bottom:24px;font-size:16px;">As one piece to a larger cybersecurity puzzle (strategy, plan, and ultimately, framework), EDR, XDR, and MDR are all cybersecurity <span style="font-style:italic;">solutions</span> that help organizations detect and respond to threats. However, they have different features and capabilities.</p><div style="color:inherit;"><p style="margin-bottom:24px;font-size:16px;"><span style="font-weight:bold;">Importance of EDR, XDR, and MDR</span></p><p style="margin-bottom:24px;font-size:16px;">EDR, XDR, and MDR are all important cybersecurity solutions, but the best solution for an organization will depend on its specific needs and budget.</p><p style="margin-bottom:24px;font-size:16px;">Organizations with limited resources may want to consider EDR. EDR solutions can be effective at detecting and responding to threats, and they are typically more affordable than XDR and MDR solutions.</p><p style="margin-bottom:24px;font-size:16px;">Organizations with more complex needs may want to consider XDR or MDR. XDR solutions can provide a more complete view of threats and can automate threat detection and response. MDR solutions can provide organizations with 24/7 monitoring and threat response, which can be helpful for organizations with limited security resources.</p><div><div><span style="font-weight:bold;">What are they?</span></div>
</div><div><span style="font-weight:bold;"><br></span></div></div><p style="margin-bottom:24px;font-size:16px;"><span style="font-weight:bold;">EDR</span> (Endpoint Detection and Response) is a software solution that collects and analyzes endpoint data to detect and respond to threats. EDR solutions typically collect data from endpoints such as Windows Event Logs, Sysmon logs, and file system changes. They use this data to identify suspicious activity, such as malware infections, unauthorized access, and data exfiltration. EDR solutions can also be used to block threats and remediate incidents.</p><p style="margin-bottom:24px;font-size:16px;"><span style="font-weight:bold;">XDR</span> (Extended Detection and Response) is a more comprehensive approach to EDR that collects data from a wider range of sources, including endpoints, networks, cloud, and user behavior. This allows XDR solutions to provide a more complete view of threats and to respond more effectively. XDR solutions typically integrate with other security tools, such as SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation, and Response), to automate threat detection and response.</p><p style="margin-bottom:24px;font-size:16px;"><span style="font-weight:bold;">MDR</span> (Managed Detection and Response) is a service that provides organizations with 24/7 monitoring and threat response for their endpoints. MDR providers typically use EDR or XDR solutions to collect and analyze endpoint data. They then use this data to identify and respond to threats on behalf of their customers. MDR providers can also provide additional services, such as threat hunting, incident response, and compliance reporting.</p><p style="margin-bottom:24px;font-size:16px;">In summary, the key differences between EDR, XDR, and MDR are:</p><ul><li style="margin-bottom:10px;">Scope:&nbsp;EDR focuses on endpoints, while XDR collects data from a wider range of sources. MDR is a service that provides 24/7 monitoring and threat response for endpoints and other key components of the network.</li><li style="margin-bottom:10px;">Capabilities:&nbsp;EDR can detect and respond to threats, but XDR has more comprehensive capabilities, such as threat hunting and incident response. MDR providers can also provide additional services, such as threat hunting and compliance reporting.</li><li style="margin-bottom:10px;">Pricing:&nbsp;EDR solutions are typically priced per endpoint, while XDR and MDR solutions are typically priced per organization.</li></ul><p style="margin-bottom:24px;font-size:16px;">The best solution for an organization will depend on its specific needs and budget. Organizations with limited resources may want to consider EDR. Organizations with more complex needs may want to consider XDR or MDR.</p><p style="margin-bottom:24px;font-size:16px;">Here is a table that summarizes the key differences between EDR, XDR, and MDR</p></div>
</div></div><div data-element-id="elm_gyRIFGoh65EFx0q6svaIVQ" data-element-type="table" class="zpelement zpelem-table "><style type="text/css"> [data-element-id="elm_gyRIFGoh65EFx0q6svaIVQ"].zpelem-table{ border-radius:1px; } [data-element-id="elm_gyRIFGoh65EFx0q6svaIVQ"] .zptable{ width:100% !important; } </style><div class="zptable zptable-align-left zptable-header- zptable-header-none zptable-cell-outline-on zptable-outline-on zptable-style- " data-width="100" data-editor="true"><table style="width:100%;"><tbody><tr><td style="width:25%;" class="zp-selected-cell"><span style="font-weight:bold;"><span style="color:inherit;"><span style="font-size:14px;">Feature</span></span> </span></td><td style="width:25%;"><span style="font-weight:bold;">EDR</span></td><td style="width:25%;"><span style="font-weight:bold;">XDR</span></td><td style="width:25%;"><span style="font-weight:bold;">MDR</span></td></tr><tr><td style="width:25%;"><span style="color:inherit;"><span style="font-size:14px;">Scope</span></span><br></td><td style="width:25%;"><span style="color:inherit;"><span style="font-size:14px;">Endpoints</span></span><br></td><td style="width:25%;"> Endpoints, networks, cloud, user behavior</td><td style="width:25%;"><span style="color:inherit;"><span style="font-size:14px;">Endpoints</span></span><br></td></tr><tr><td style="width:25%;"><span style="color:inherit;"><span style="font-size:14px;">Capabilities</span></span><br></td><td style="width:25%;"><span style="color:inherit;">Detect and respond to threats</span><br></td><td style="width:25%;"><span style="color:inherit;">Detect, respond, and hunt for threats</span><br></td><td style="width:25%;"><div style="color:inherit;"><div>Detect, respond, hunt for threats, and provide 24/7 monitoring</div><br><div><br></div></div></td></tr><tr><td style="width:25%;"><span style="color:inherit;"><span style="font-size:14px;">Pricing</span></span><br></td><td style="width:25%;"><span style="color:inherit;">Per endpoint</span><br></td><td style="width:25%;"><span style="color:inherit;">Per organization</span><br></td><td style="width:25%;"><span style="color:inherit;">Per organization</span><br></td></tr></tbody></table></div>
</div><div data-element-id="elm_2pLXKWWkKP0xFH9UhNZ6oQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_2pLXKWWkKP0xFH9UhNZ6oQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><div><span style="font-weight:bold;">Why should&nbsp;<span style="font-style:italic;">every</span> company have either one, two, or all three solutions in place?</span></div>
</div><div><br></div><div><div> No matter what size or industry, every company should have well-thought-out cybersecurity solutions in place to protect against threats. Back in &quot;the old days&quot; the name of the cybersecurity game was prevention (only) - if you had a strong perimeter, then you're good! That thought process has shifted rather dramatically, because we know they'll get it&nbsp;regardless. Today, to protect yourself, you must first be able to <span style="font-style:italic;">detect</span>&nbsp;those threats first in order to respond. EDR, XDR, and MDR can all help companies to detect and respond to threats effectively.&nbsp; </div>
</div><div><br></div><div><div> EDR is a great foundation for any cybersecurity strategy. Many will argue that EDR should be the <span style="font-style:italic;">first</span>&nbsp;step. It can help to detect and respond to threats on endpoints, which are often the first target of attackers - especially considering so many remote/hybrid staff with access to company data.&nbsp; </div>
</div><div><br></div><div> XDR can provide a more complete view of threats and can automate threat detection and response. This can be helpful for companies with complex IT environments. </div>
<div><br></div><div> MDR can provide companies with 24/7 monitoring and threat response, which can be helpful for companies with limited security resources. </div>
<div><br></div><div> A typical company should have one, two, or all three of these solutions in place depending on its specific needs and budget. For example, a small company with limited resources may only need EDR. A large company with a complex IT environment may want to have all three solutions in place. </div>
</div></div></div><div data-element-id="elm_zp13fDFmZGlc7cBg8d7IqQ" data-element-type="table" class="zpelement zpelem-table "><style type="text/css"> [data-element-id="elm_zp13fDFmZGlc7cBg8d7IqQ"].zpelem-table{ border-radius:1px; } [data-element-id="elm_zp13fDFmZGlc7cBg8d7IqQ"] .zptable{ width:100% !important; } </style><div class="zptable zptable-align-left zptable-header- zptable-header-none zptable-cell-outline-on zptable-outline-on zptable-style- " data-width="100" data-editor="true"><table style="width:100%;"><tbody><tr><td style="width:50%;"><span style="color:inherit;">Company type</span> </td><td style="width:50%;"><div style="color:inherit;"><div>Best solution</div></div></td></tr><tr><td style="width:50%;"><span style="color:inherit;">Small company with limited resources</span><br></td><td style="width:50%;">EDR</td></tr><tr><td style="width:50%;"><span style="color:inherit;">Medium-sized company with moderate resources</span><br></td><td style="width:50%;">EDR and/or XDR</td></tr><tr><td style="width:50%;"><span style="color:inherit;">Large company with complex IT environment</span><br></td><td style="width:50%;" class="zp-selected-cell">EDR + XDR and/or MDR</td></tr></tbody></table></div>
</div><div data-element-id="elm_2-QsG4go9CYs7RMcMBfA8Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_2-QsG4go9CYs7RMcMBfA8Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>It is important to note that this is just a general guide. The best way to determine which solution is right for your company is to consult with a vendor-neutral, unbiased cybersecurity expert.</div><br><div><span style="font-style:italic;font-weight:bold;">Remember: if your company can only afford one cybersecurity solution, make it EDR</span></div></div><div style="color:inherit;"><div style="width:948px;"><div><div></div></div></div><div style="width:948px;"></div></div></div>
</div></div><div data-element-id="elm_fHtwhbUv4Ei7bJ7CZgJNYg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg zpsticky-enabled"><style type="text/css"> [data-element-id="elm_fHtwhbUv4Ei7bJ7CZgJNYg"].zpelem-col{ border-radius:1px; } @media (min-width:992px) { [data-element-id="elm_fHtwhbUv4Ei7bJ7CZgJNYg"].zpelem-col{ top:0px;z-index:1; } } </style><div data-element-id="elm_HeVyzUP7UgPW-pafKN8J3g" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_HeVyzUP7UgPW-pafKN8J3g"] .zpimage-container figure img { width: 350px ; height: 254.92px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_HeVyzUP7UgPW-pafKN8J3g"] .zpimage-container figure img { width:723px ; height:526.59px ; } } @media (max-width: 767px) { [data-element-id="elm_HeVyzUP7UgPW-pafKN8J3g"] .zpimage-container figure img { width:415px ; height:302.26px ; } } [data-element-id="elm_HeVyzUP7UgPW-pafKN8J3g"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/TPS-Report-Meme.jpg" width="415" height="302.26" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_Uj2bEWxJE05ghFSbibOy1g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Uj2bEWxJE05ghFSbibOy1g"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:rgb(48, 4, 234);">Readiness Report</span></h2></div>
<div data-element-id="elm_azldy0VBAu7gRgLjB6TkDw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_azldy0VBAu7gRgLjB6TkDw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p><span style="color:rgb(48, 4, 234);">Schedule a security interview with one of our experts, then in a few days, we'll generate a custom, 50 to 100 page Cybersecurity Readiness Report you can use&nbsp; as a playbook for your security strategy.&nbsp;<br></span></p><p><span style="color:rgb(48, 4, 234);"><br></span></p><p><span style="color:rgb(48, 4, 234);">You can even use the report as ammunition for your case to get your security budget passed.&nbsp;</span></p></div></div>
</div><div data-element-id="elm_hj4rUfdaxsD5ZteiO_PN9w" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_hj4rUfdaxsD5ZteiO_PN9w"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="/aboutus" target="_blank"><span class="zpbutton-content">Book now</span></a></div>
</div></div></div><div data-element-id="elm_uPz45HKcReKZhhdLR5m6sw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_uPz45HKcReKZhhdLR5m6sw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="/cybersecurity" target="_blank"><span class="zpbutton-content">Security Experts</span></a></div>
</div><div data-element-id="elm_4a5p1d_2uL6Vbm39-egz8Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_4a5p1d_2uL6Vbm39-egz8Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">About Cloud 9</h2></div>
<div data-element-id="elm_jcH2LiwKlaBzMqIn95Yayg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_jcH2LiwKlaBzMqIn95Yayg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Cloud 9 Advisers, LLC was formed as a client-facing, </span>business<span style="color:inherit;">-to-</span>business<span style="color:inherit;">&nbsp;agency/firm in 2017 with the goal of forever changing the way businesses buy AI, cybersecurity, contact center, and other important IT-related services and solutions: faster, better, less formal, and with the high-quality due diligence and integrity that all companies expect.&nbsp;</span><br></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;font-weight:bold;">Technology Sourcing Experts</span></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 17 Oct 2023 17:49:19 -0500</pubDate></item><item><title><![CDATA[SD-WAN and SASE]]></title><link>https://www.cloud9advisers.com/News/post/sd-wan-and-sase</link><description><![CDATA[SDWAN optimizes your network. SASE secures your edge. We demystify the two fastest-growing acronyms in networking, clarify their distinct benefits for single and multi-location companies, and explain the components that create a truly unified SASE platform.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_1jXyK-BxSzyrWaKP8RqrUA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_iT5zEM8tTIydTEbJVk5i1A" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_gS4hskNZS06uKMpuP2R1QQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_5E1mk1d-aq_UX3M_nNC1YA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h1
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>SDWAN &amp; SASE: The Essential Guide to Converging Connectivity and Cloud Security</span></h1></div>
<div data-element-id="elm_EaYOe5_uT1Wkw5nbmuKiqQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_EaYOe5_uT1Wkw5nbmuKiqQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><div style="color:inherit;"><div><span><span>Beyond Buzzwords: What SDWAN and SASE Really Mean for the Modern Enterprise Network</span></span></div><div><span><span><br/></span></span></div><div><span><span><span><span>Cloud-first operations demand a new network model. Understanding the roles of Software-Defined Wide Area Networking (SDWAN) and Secure Access Service Edge (SASE) is the first step toward building a truly resilient and secure edge.</span></span><br/></span></span></div><div><span><span><span><span><br/></span></span></span></span></div><div><span><span><span><span><span><span>SASE and SDWAN represent the necessary convergence of security (the perimeter) and networking (the pathway) in the age of cloud and hybrid work.</span></span><br/></span></span></span></span></div></div></div>
</div><div data-element-id="elm_jkUNxYuneitwIK_sewBFAg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_jkUNxYuneitwIK_sewBFAg"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_jkUNxYuneitwIK_sewBFAg"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_BbiI0m9bI29ZdapwOsEbpw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"> [data-element-id="elm_BbiI0m9bI29ZdapwOsEbpw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_dcjweYy9nV-YMoK-K7qnZA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_dcjweYy9nV-YMoK-K7qnZA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_WblXvipEFTmJ2j7HnywXfw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_WblXvipEFTmJ2j7HnywXfw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:12pt;"></span></p><div><h2><span>Beyond Buzzwords: What SDWAN and SASE Really Mean for the Modern Enterprise Network</span></h2><p><span>For many IT leaders, the networking and security landscape over the past few years has felt like an endless alphabet soup. Two acronyms, in particular, have dominated strategic conversations: </span><strong>SDWAN</strong><span> and </span><strong>SASE</strong><span>.</span></p><p><span><br/></span></p><p><span>Both are frequently discussed in the context of modernization, cloud migration, and supporting the hybrid workforce. This has led to widespread confusion, with many vendors incorrectly presenting them as competing solutions, or worse, claiming that one automatically includes the other without proper implementation.</span></p><p><span><br/></span></p><p><span>At Cloud 9 Advisers, we act as pragmatic, expert advisers to help you cut through this noise. Simply put: </span><strong>SDWAN optimizes the network; SASE secures the edge.</strong><span> They are not competing technologies, but essential components that, when unified correctly, form the foundation of a modern, secure, and resilient network.</span></p><p><span>Understanding their individual roles is the first step to making the right strategic investment.</span></p><h3><span><br/></span></h3><h3><span>Part 1: Demystifying SDWAN (Software-Defined Wide Area Network)</span></h3><p><span>SDWAN is fundamentally a revolutionary approach to Wide Area Networking (WAN). Traditionally, WANs relied on complex hardware—specific routers, expensive leased lines (like MPLS), and manual configurations—to connect separate locations.</span></p><p><span><br/></span></p><p><span>SDWAN separates the control plane (the intelligence of the network) from the data plane (the physical connections). By shifting control to software, it gains two critical advantages: </span><strong>intelligence</strong><span> and </span><strong>flexibility</strong><span>.</span></p><p><span><br/></span></p><p><span>The SDWAN appliance at each location becomes application-aware, meaning it knows the difference between a voice packet, an email, or a large file download. This intelligence is then used to optimize traffic flow in real time across any combination of underlying links (fiber, broadband, 4G/5G, etc.).</span></p><h4><span><br/></span></h4><h4><span>The Pragmatic Benefits of SDWAN</span></h4><p><span>While SDWAN was originally designed to connect </span><strong>multiple locations</strong><span> effectively, it offers distinct and significant benefits even for </span><strong>companies with a single location</strong><span>:<br/><br/></span></p><table><tbody><tr><th style="width:13.516%;"><p><span style="font-weight:bold;">Audience</span></p></th><th style="width:25.137%;"><p><span>Primary Problem Solved</span></p></th><th style="width:59.5205%;"><p><span>Core SDWAN Benefit</span></p></th></tr><tr><td style="width:13.516%;"><p><strong>Single Location</strong></p></td><td style="width:25.137%;" class="zp-selected-cell"><p><span>Internet instability, QoS issues for real-time apps, reliance on expensive single circuits.</span></p></td><td style="width:59.5205%;"><p><strong>Reliability &amp; Efficiency:</strong><span> It aggregates multiple, low-cost internet links into a unified connection. It uses that power to ensure mission-critical applications (like UCaaS or a cloud ERP system) always have the bandwidth they need, while less critical traffic is given lower priority. It provides a more robust, stable connection than any single circuit ever could.</span></p></td></tr><tr><td style="width:13.516%;"><p><strong>Multiple Locations</strong></p></td><td style="width:25.137%;"><p><span>High cost of traditional WAN (MPLS), complex management, and traffic backhauling for security.</span></p></td><td style="width:59.5205%;"><p><strong>Virtual Network &amp; Cost Reduction:</strong><span> This is the original design intent. It creates a seamless, virtual network that spans multiple physical locations, making management centralized and simple. Critically, it allows companies to swap expensive MPLS with low-cost broadband, reducing ongoing network costs while improving agility and allowing for dynamic, automated routing around outages or congestion.</span></p></td></tr></tbody></table><p><span><br/></span></p><p><span>SDWAN’s value is in </span><strong>resilience</strong><span> and </span><strong>performance</strong><span>. It is the key to providing the high-quality, low-latency connectivity required for the sensitive, real-time applications we discussed in our last article on Call Survivability.</span></p><h3><span><br/></span></h3><h3><span>Part 2: Demystifying SASE (Secure Access Service Edge)</span></h3><p><span>If SDWAN is the intelligent highway, then </span><strong>SASE (Secure Access Service Edge)</strong><span> is the integrated, cloud-native security perimeter applied to that highway's entrance and exit ramps.</span></p><p><span><br/></span></p><p><span>SASE is an architectural framework, not a single product. It was introduced to address the reality that the traditional network perimeter—the firewall in your server room—is obsolete. Users now access corporate data from home, coffee shops, and client sites using personal devices, reaching applications hosted in multiple clouds.</span></p><p><span><br/></span></p><p><span>The goal of SASE is simple: </span><strong>Secure and reliable access to corporate resources from any location, without sacrificing user experience or performance.</strong></p><p><span><br/></span></p><p><span>A comprehensive, robust SASE solution is built upon the convergence of several key security and networking components, all delivered via a single, cloud-based platform. If a vendor is missing even one of these components, they are selling a partial, non-SASE solution.</span></p><h4><span><br/></span></h4><h4><span>The Five Essential Components of a True SASE Platform</span></h4><p><span>A good SASE solution brings together the following technologies into a unified stack:</span></p><ol><li><p><strong>Secure Web Gateway (SWG):</strong><span> Provides secure, cloud-based internet access. It acts as the first line of defense, blocking malicious websites, filtering URLs, and applying advanced malware detection before traffic even reaches the user’s device or the corporate network.</span></p></li><li><p><strong>Cloud Access Security Broker (CASB):</strong><span> The CASB provides critical visibility and control over cloud applications (SaaS). It monitors user activity within apps like Microsoft 365, Salesforce, and Dropbox, enforces security policies, and prevents data leakage by encrypting sensitive data both in transit and at rest.</span></p></li><li><p><strong>Firewall-as-a-Service (FWaaS):</strong><span> This replaces the traditional physical, on-premise firewall. FWaaS is a cloud-native security layer that controls access to corporate resources and blocks unauthorized traffic, applying consistent security policies to users regardless of their location.</span></p></li><li><p><strong>Zero Trust Network Access (ZTNA):</strong><span> This is the modern replacement for traditional VPNs. ZTNA is critical because it never grants blanket access to the entire network. Instead, it operates on a principle of &quot;never trust, always verify,&quot; granting users access only to the specific applications they need, only after identity verification, and only from a compliant device. This hides corporate resources from the public internet entirely.</span></p></li><li><p><strong>Identity and Access Management (IAM):</strong><span> An integral part of the Zero Trust model. IAM provides the centralized control over user identities, authentication (often multi-factor, or MFA), and authorization. It is the engine that validates who a user is and what they are allowed to access, enforcing policy consistently across the entire SASE stack.</span></p></li></ol><p><span><br/></span></p><p><span>And finally, the often-misunderstood component:</span></p><ul><li><p><strong>Software-Defined Wide Area Networking (SDWAN):</strong><span> A true SASE architecture </span><strong>includes</strong><span> SDWAN functionality. The networking side of SASE is responsible for optimizing the transport layer—selecting the best path for traffic based on business requirements and dynamically routing it across various links (broadband, 5G, private connections). It ensures the high-performance delivery of traffic to and from the secure SASE cloud edge.</span></p></li></ul><h3><span><br/></span></h3><h3><span>SDWAN + SASE: The Convergence Strategy</span></h3><p><span>The modern B2B enterprise is defined by dispersed data, dispersed users, and dispersed applications. The only way to manage this complexity effectively is through convergence.</span></p><p><span><br/></span></p><p><span>The strategic relationship can be summarized simply:</span></p><ul><li><p><strong>SDWAN is the foundation of high-performance connectivity.</strong><span> It delivers the path optimization, quality of service (QoS), and resilience (call survivability) that your business demands.</span></p></li><li><p><strong>SASE is the strategic security framework.</strong><span> It delivers the identity-centric access control (ZTNA), threat prevention (SWG, FWaaS), and data protection (CASB) that your business requires, regardless of where the user is located.</span></p></li></ul><p><span><br/></span></p><p><span>By consolidating these functions into a unified, cloud-based platform—the core tenet of SASE—businesses gain:</span></p><ol><li><p><strong>Simplified Management:</strong><span> Moving from managing six different boxes (router, firewall, VPN concentrator, web filter, etc.) to managing one policy stack in the cloud.</span></p></li><li><p><strong>Consistent Security:</strong><span> Every user, no matter where they are or how they connect, gets the exact same security inspection and policy enforcement.</span></p></li><li><p><strong>Cost Efficiency:</strong><span> Reducing hardware footprints and maintenance costs, leveraging lower-cost internet links, and consolidating vendor contracts.</span></p></li><li><p><strong>Agility:</strong><span> The network scales instantly to accommodate mergers, acquisitions, or sudden shifts to remote work, without needing to deploy physical hardware.</span></p></li></ol><h3><span><br/></span></h3><h3><span>Simplifying the Strategic Choice</span></h3><p><span>The choice between SDWAN and SASE is a false one; the correct answer is a converged solution.</span></p><p><span><br/></span></p><p><span>However, the vendor landscape is complex, with providers offering partial solutions that may excel at the &quot;SDWAN&quot; part but provide poor, bolt-on security, or vice versa. The strategic challenge is identifying the partner that can deliver a </span><strong>truly unified SASE platform</strong><span>—one where the networking and security components are built to work together seamlessly, eliminating gaps and preserving performance.</span></p><p><span><br/></span></p><p><span>Don’t get stuck in the alphabet soup of acronyms. Focus on the required outcomes: </span><strong>resilient performance and secure access from anywhere.</strong></p><p><span><br/></span></p><p><span>At Cloud 9 Advisers, we help technology leaders sift through the noise, evaluate the true integration level of SASE vendors, and select the platform that meets the specific demands of their single or multi-location business model.</span></p><p><strong>KITS: Keep IT Simple.</strong></p></div><div><span style="font-size:12pt;"><br/></span></div>
</div></div><div data-element-id="elm_CV5VuMRYDmcEvhmfgMYM2w" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_CV5VuMRYDmcEvhmfgMYM2w"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/sase" target="_blank"><span class="zpbutton-content">Learn more about SASE</span></a></div>
</div><div data-element-id="elm_FxB8pAckLtzq7zPAwodPLg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_FxB8pAckLtzq7zPAwodPLg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-right zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/sdwan" target="_blank"><span class="zpbutton-content">Learn more about SDWAN</span></a></div>
</div><div data-element-id="elm_-M6o_rd5AoLrhwfddyyoDQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_-M6o_rd5AoLrhwfddyyoDQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>See our other articles about SDWAN and SASE:&nbsp;</p><p><a href="https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age" rel="">Redefining Connectivity in the Digital Age</a><a href="https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age" rel=""><br/></a></p><p></p><p><a href="https://www.cloud9advisers.com/News/post/sdwan-call-survivability" title="The 'Real' SDWAN Test:" rel="">The 'Real' SDWAN Test:</a><a href="https://www.cloud9advisers.com/News/post/sd-wan-and-sase" rel=""></a><br/></p><p><a href="https://www.cloud9advisers.com/News/post/never-trust-and-always-verify" rel="">Never Trust and Always Verify</a></p></div><p></p></div>
</div></div><div data-element-id="elm_bFHrnBjhtb96Vh5CJTGcZQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_bFHrnBjhtb96Vh5CJTGcZQ"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_oF0HDA0tROSZN17dhE2uvg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_oF0HDA0tROSZN17dhE2uvg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left zpbutton-align-mobile-left zpbutton-align-tablet-left"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 15 Jun 2023 09:40:58 -0500</pubDate></item><item><title><![CDATA[Under Constant Attack]]></title><link>https://www.cloud9advisers.com/News/post/under-constant-attack</link><description><![CDATA[Most companies only have basic firewall protection, generally hardware-based and maybe a few others may conduct regular scans of their environment. Really no different than your home having a basic lock and maybe a deadbolt.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_PeBlM-B7QBSoRizcLxfeFg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_bVe8xmGiRf2NMBIZ-WIqQw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_RkvKXUFZSsSuqpus-rrQQw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_IJhu5s4OSu-WhUxJzptDAQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_IJhu5s4OSu-WhUxJzptDAQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Constant attacks require constant Security<br></h2></div>
<div data-element-id="elm_iGCsf9_QQSqoCd-C8PQKtQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_iGCsf9_QQSqoCd-C8PQKtQ"].zpelem-text { border-radius:1px; padding:100px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>We’re in an environment where our systems are constantly under attack. They're under attack from all sorts of diverse players who are trying to take advantage of the private proprietary information that is available.&nbsp;</div><p><span style="color:inherit;"><br></span></p><div>Companies are really focused on compliance ensuring that they are protecting their business value from these types of attacks. Every executive has an obligation to ensure that they are compliant with security.&nbsp;<br></div><p><br></p><div>What are most companies doing for security?&nbsp;</div><p><br></p><div>Most companies only have basic firewall protection, your basic intrusion prevention (not necessarily intrusion detection), generally just hardware-based. A few others may do just a little more; they may conduct regular scans of their environment. This is really no different than your home having a basic lock and maybe a deadbolt. There is no alarm system like you might have in a home to see and be alerted when intrusions are happening. Being alerted of intrusion is critical in business so that more immediate actions can be taken. Often enough, attacks can be sly and stealthy. Recent studies show that malicious code is embedded on business systems for more than 250 days before it is ever used to promote an actual attack. The reason being so that attackers know their code is also well planted in several layers of business backups as well as active systems.&nbsp;</div><p><br></p><div>How have today’s complex attacks changed systems and the approach to security?&nbsp;</div><p><br></p><div>The attacks are becoming more sophisticated, automated,&nbsp; and voluminous, so we no longer have the time nor capability to react in a manual way. We actually have to have machine learning and other artificial intelligence technologies to adapt and scan the environment much more rapidly looking for these constant intrusions malicious code, and breeches. These technologies work in tandem with professional cybersecurity teams and Security Operations Centers (SOCs) to constantly manage, monitor, and alert. The trick with alerts is dramatically reducing false positives. Too many alerts are just as futile as too few.&nbsp;</div><div><br></div><div>How much does a cyber attack cost?&nbsp;</div><p><br></p><p>Recent US cyber crime studies show an average measurement of damage from a breach: a 46 day long average resolution at an average of $21k per day, plus regulatory fines, and major customer fallout. These attacks can be highly damaging to any business. Cyber insurance can only go so far and cover so much. Claims can also be denied for a host of often confusing reasons, leaving the business to fit the bill. These newer types of cyber insurance policies have many requirements and stipulations, and with a sense of irony, those requirements are very much cybersecurity technology many of which are security technology related.<br></p><p><br></p><div>Contact us today and let’s evaluate your business security posture.</div></div>
</div><div data-element-id="elm_V_pS7vRFMwv4ksSL0MwbfQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_V_pS7vRFMwv4ksSL0MwbfQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">About Cloud 9</h2></div>
<div data-element-id="elm_Gf5rwbhOiBsyYeCiU86xLg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Gf5rwbhOiBsyYeCiU86xLg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Cloud 9 Advisers is a client-only, client-focused agency and consulting group offering vendor selection and management services to help you solve IT and general technology problems fast. We'll walk you through the identification, research, evaluation, and comparison process, provide board-ready documentation and due diligence, and provide oversight of solution implementation on any of our 250+ vendors, carriers, and service providers.&nbsp;</p><p><br></p><p>Our teams of vendor-neutral security focused engineers will help you slice through the marketing fluff and&nbsp; industry jargon so you know what you're buying. We'll help you make smart IT investments quickly and confidently. Reach out to us today!</p></div>
</div><div data-element-id="elm_-ynmqeVSS66pw0SgNPNkFg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_-ynmqeVSS66pw0SgNPNkFg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us" title="contact us page"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 21 Jul 2021 14:59:22 -0500</pubDate></item></channel></rss>