<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.cloud9advisers.com/News/tag/firewall/feed" rel="self" type="application/rss+xml"/><title>Cloud 9 Advisers - News #firewall</title><description>Cloud 9 Advisers - News #firewall</description><link>https://www.cloud9advisers.com/News/tag/firewall</link><lastBuildDate>Wed, 25 Feb 2026 18:45:58 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Supplier Spotlight: CloudGenix]]></title><link>https://www.cloud9advisers.com/News/post/supplier-spotlight-cloudgenix</link><description><![CDATA[An ESG survey of 600 senior IT decision makers showing that 76% of respondents had already deployed multi-cloud environments, and as many as 67% were already using SaaS-delivered business applications. How do you keep it secure?]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_gMTjFHMQQouCTEvm73pVXg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_a552PfiNQ2abz9vN3GgR5w" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_laFE2tfZRsmIS8FcYW3UGA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_gyqi8LfZTZKuQmzFl-cngQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_gyqi8LfZTZKuQmzFl-cngQ"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true">Secure SD-WAN from CloudGenix and Palo Alto</h1></div>
<div data-element-id="elm_p17pdP2b981AR5BSqjP8uA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_p17pdP2b981AR5BSqjP8uA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://images.unsplash.com/photo-1447752875215-b2761acb3c5d?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjQ1Nzk3fQ" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_AWuxccOpSCnL4M1Toqwfrg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_AWuxccOpSCnL4M1Toqwfrg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="font-size:12px;">By:</span></p></div>
</div><div data-element-id="elm_r5J9FG4pQbu39ghdN1XCCQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_r5J9FG4pQbu39ghdN1XCCQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:18px;">Cloud 9 Supplier Spotlight:&nbsp; <span style="font-weight:bold;"><a href="https://www.cloudgenix.com/" title="CloudGenix" target="_blank">CloudGenix</a></span></span></p></div>
</div><div data-element-id="elm__kx0Mkn2HCQ-xDeyaLhGnA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm__kx0Mkn2HCQ-xDeyaLhGnA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.cloudgenix.com/" target="_blank" title="www.cloudgenix.com" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Supplier%20Logos/SD%20CloudGenix2.png" size="medium" style="width:800px;"/></picture></a></figure></div>
</div><div data-element-id="elm_eM_fCvnwabg7idsbREHIJQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_eM_fCvnwabg7idsbREHIJQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_fy_61GMWyfO5YQIF8gBjTw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_fy_61GMWyfO5YQIF8gBjTw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_pWf02sJh-65p9yMYlI6l5w" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_pWf02sJh-65p9yMYlI6l5w"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Secure SD-WAN from CloudGenix and Palo Alto</span></h2></div>
<div data-element-id="elm_PD5xx7UrDuj5zcKllqxSVg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_PD5xx7UrDuj5zcKllqxSVg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>By now, most organizations have extended their IT infrastructure to the cloud. And many are using multiple clouds. ESG, in a recent webinar presented by CloudGenix and Palo Alto Networks, shared findings from a survey of 600 senior IT decision makers showing that 76% of respondents had already deployed multi-cloud environments, and nearly as many – 67% – were already using SaaS-delivered business applications.</div><p><br></p><div>ESG also talked about the challenges of not only ensuring network performance in these complex multi-cloud environments, but also making sure that SaaS-delivered apps are always on, are always secure, and always perform how employees need them to – especially employees in remote office locations.</div><p><br></p><div>In a traditional network architecture, applications are housed in an on-premise data center. Remote office workers access those apps via MPLS VPN connections. Routers enable the underlying network between geographically diverse locations, and firewalls deployed at both the central data center and at each remote office create a security perimeter.</div><p><br></p><div>But this approach simply doesn’t work in the world of cloud. Here’s why:</div><ul><li><span style="font-weight:bold;">Cost</span> – more routers are needed to deploy and manage as well as additional MPLS fees.<br></li><li><span style="font-weight:bold;">Complexity</span> – already overcommitted teams must manage multiple systems to fulfill network and security needs across multiple locations, and traditional MPLS-based networks are notoriously hard to provision or modify.<br></li><li><span style="font-weight:bold;">Performance</span> – with the rise of SaaS-based apps comes a need to not only ensure that networks are performing as needed, but that the apps critical for employees and customers are as well.<br></li><li>Security – data breaches and attacks are part of today’s reality, and in the world of cloud services where data is traveling over the public internet, there is no fixed perimeter to patrol.</li></ul><p><span style="color:inherit;"><br></span></p><div><span style="font-weight:bold;">Opportunities and Obstacles of SD-WAN</span></div><div>Many organizations have adopted SD-WAN solutions to solve for these issues, but they too present their own challenges. Most solutions require multiple hardware products for SD-WAN and security, which once again means more complexity and more cost. Others are mediocre “all-in-one” solutions that have separate roadmaps for features related to network and security, making it near impossible for an organization to simultaneously meet both networking and security needs.</div><p><br></p><p>So how can organizations cost-effectively and securely meet the needs of remote branch offices? In reality, overcoming the challenges presented by centralized network architecture or legacy SD-WANs means re-imagining remote office IT infrastructure. It needs to be cloud-delivered rather than based on complex hardware or software stacks, and:<br></p><ul><li>WANs have to be unconstrained and highly reliable<br></li><li>Security has to be pervasive across multi-cloud, SaaS, and data centers<br></li><li>Unified Communications as a Service (UCaaS), voice, and video have to be highly reliable<br></li><li>Multi-cloud access has to be high-speed<br></li><li>IT operations have to be proactive</li></ul><p><br></p><p><span style="font-weight:bold;">Next-gen WANs: The CloudGenix Autonomous WAN</span><br></p><p>The CloudGenix Autonomous SD-WAN uses global intelligence to deliver performance and security SLAs for all applications over any WAN-type. By providing app-policies aligned to business intent, direct access to multi-cloud and dev-ops frameworks, it delivers significant productivity gains and cost-savings compared to gen-1 SD-WAN alternatives.<br></p><p><br></p><div>Our new joint solution with Palo Alto Networks – and validated by ESG in the Secure SD-WAN: 7 Best Practices from Palo Alto Networks and CloudGenix webinar – combines CloudGenix Autonomous WAN with Palo Alto Networks Prisma Access, enabling organizations to deploy best-of-breed secure SD-WAN that is pre-integrated, requires no additional hardware or software to provision at the remote office, and lays the foundation for a zero-trust security architecture.</div><p><br></p><div>The joint secure SD-WAN solution enables organizations to:</div><ul><li><span style="font-weight:bold;">Apply traffic policy to application traffic</span>. No longer are they restricted to applying policy within the on-premise network. L3 is insufficient in a multi-cloud, hybrid model. L3 – L7 is ideal.<br></li><li><span style="font-weight:bold;">Ensure consistent performance</span> and high availability by automatically monitoring performance metrics against threshold, minimizing the need for manual intervention.<br></li><li><span style="font-weight:bold;">Create policies in the cloud</span> once and deploy them everywhere without the need for backhauling traffic to a controller<br></li><li><span style="font-weight:bold;">Via an easy-to-use platform</span>, integrate other services to be used in conjunction with SD-WAN and deploy them with a few clicks</li></ul><p><span style="color:inherit;"><br></span></p><div>To hear experts at Palo Alto and ESG talk more about this solution, as well as explain the 7 best practices for a secure SD-WAN, check out the on-demand webinar Secure SD-WAN: 7 Best Practices from Palo Alto Networks and CloudGenix.</div></div>
</div></div><div data-element-id="elm_A-lBT1Y6As9HumgAyzMyeQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_A-lBT1Y6As9HumgAyzMyeQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_KpJsJMIwQZe99o87fTfMSw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_KpJsJMIwQZe99o87fTfMSw"] div.zpspacer { height:279px; } @media (max-width: 768px) { div[data-element-id="elm_KpJsJMIwQZe99o87fTfMSw"] div.zpspacer { height:calc(279px / 3); } } </style><div class="zpspacer " data-height="279"></div>
</div><div data-element-id="elm_ABIoVtigkJ-BLbKZY8fjvg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_ABIoVtigkJ-BLbKZY8fjvg"].zpelem-imagetext{ border-style:dotted; border-color:#000000 !important; border-width:1px; border-radius:6px; padding:10px; margin:10px; } </style><div data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-center zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/C9-Logo1.1.150.t.png" size="small" data-lightbox="true" style="width:1800px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;">CloudGenix is a leading SDWAN company in the Cloud 9&nbsp;<a href="https://sitebuilder-662896043.zohositescontent.com/solutions">Supplier Portfolio</a>. Our curated list of over 200 companies provides all the nutrients and daily vitamins a growing company needs for their technology: Cybersecurity, Communications, Connectivity, and Cloud. Our SDWAN, SASE, network and cybersecurity experts are vendor-agnostic and will help uncover the right solutions and the right companies to look at for you needs. We can even help reduce your monthly technology operating costs and create new efficiencies you may have never thought possible.&nbsp;</span><br></p></div>
</div></div><div data-element-id="elm_TUAl_srLIP6w17iCVFvufw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_TUAl_srLIP6w17iCVFvufw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like to learn more about how Cloud 9 can help" title="email us: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Contact Cloud 9 Advisers</span></a></div>
</div></div></div><div data-element-id="elm_RzwdkzSMYXKc2kbBGdg6lQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_RzwdkzSMYXKc2kbBGdg6lQ"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_yqFUQ700ZvaSEpXuju79zg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_yqFUQ700ZvaSEpXuju79zg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>CloudGenix is a leading SDWAN company in the Cloud 9 <a href="/solutions" title="Supplier Portfolio">Supplier Portfolio</a>. Our curated list of over 200 companies provides all the&nbsp;<span style="color:inherit;">daily&nbsp;</span>nutrients and&nbsp; vitamins a growing company needs for their technology: Cybersecurity, Communications, Connectivity, and Cloud. Our SDWAN, SASE, network and cybersecurity experts are vendor-agnostic and will help uncover the right solutions and the right companies to look at for you needs. We can even help reduce your monthly technology operating costs and create new efficiencies you may have never thought possible.&nbsp;</p></div>
</div><div data-element-id="elm_5l-viDwzFM5A_NZRRQ9lCA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_5l-viDwzFM5A_NZRRQ9lCA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_-n6E9JzfP30QReuiUcIYvQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_-n6E9JzfP30QReuiUcIYvQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_6tBU5e2aGC2aXOds3yok7A" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_6tBU5e2aGC2aXOds3yok7A"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like to learn more about how Cloud 9 can help" title="email us: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Learn more about CloudGenix </span></a></div>
</div></div><div data-element-id="elm_qTeK158sEXmavPgOwvCj-g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_qTeK158sEXmavPgOwvCj-g"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_mRNsOujEa2-aBsozBuQM7w" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_mRNsOujEa2-aBsozBuQM7w"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval zpbutton-outline " href="/sdwan"><span class="zpbutton-content">Learn more about SDWAN</span></a></div>
</div></div></div><div data-element-id="elm_HcG71hnznhzCd528q6RWsQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_HcG71hnznhzCd528q6RWsQ"].zpelem-divider{ border-radius:1px; margin-block-start:37px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_-WGKbl7YqFDmgMj-KFhBIw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_-WGKbl7YqFDmgMj-KFhBIw"].zpelem-heading { border-radius:1px; margin-block-start:78px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">About CloudGenix</h2></div>
<div data-element-id="elm_mzTYL4JpaPBsyxnTPuyWbQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_mzTYL4JpaPBsyxnTPuyWbQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>We have a deep understanding of complex networking issues and designs. We know the only way to truly solve networking issues that surface with next-generation application architectures, rich media, cloud, and SaaS, is to approach the problem top-down with a transformational networking architecture. An architecture that abstracts the complexity of low-level networking rules and configurations away in favor of top-down business policies for applications, sites, performance, security, and compliance. We built the CloudGenix AppFabric™ from the ground up for exactly this purpose.</div></div>
</div><div data-element-id="elm_WxKyFdhP0kno0x7dv_fBww" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_WxKyFdhP0kno0x7dv_fBww"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-weight:bold;">CloudGenix: Cloud Blades Platform</span></div><div>Build branch locations with best-of-breed infrastructure services that are pre-integrated and can be turned on with one click. <br>No additional hardware or software required.</div></div>
</div><div data-element-id="elm_PcLrJ3b2D-xaoGAyExJPew" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_PcLrJ3b2D-xaoGAyExJPew"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/cgx-cloudbld_1-intro-2x-1500x528.png" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 11 Feb 2020 09:45:59 -0500</pubDate></item><item><title><![CDATA[SASE, the next-gen SD-WAN?]]></title><link>https://www.cloud9advisers.com/News/post/Is-SASE-the-next-gen-SDWAN</link><description><![CDATA[Gartner claims SASE will make legacy networking obsolete. This is not hyperbole. We cut through the marketing noise to define the four non-negotiable requirements of a true SASE architecture and why identity, not the IP address, is the new network anchor.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_aVn03PLjTPC2C0--suORlg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_oY8K_nMGQwKzWiHm9mR4mA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_YJlc6Aw3R--ufTdeEYFGlA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_UwRnoKqwSXqUs1DqV3gR6g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_UwRnoKqwSXqUs1DqV3gR6g"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span style="color:inherit;"><div><span>The Four Pillars of SASE: Why Your Legacy Network Architecture is Obsolete</span></div></span></h1></div>
<div data-element-id="elm_I1dOk7MZXI2b2D5bRFjL6g" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p style="text-align:center;"><span>Gartner makes the claim that the shift to SASE will make obsolete existing networking and security models.</span><br/></p><p style="text-align:left;"><span><br/></span></p><p style="text-align:left;"><span>Secure Access Service Edge (SASE): The Foundational Shift Driven by Cloud, Mobility, and the Demise of the Traditional Perimeter<br/></span></p><p style="text-align:left;"><span>A true SASE framework moves security policy from the physical office location to the user’s identity, fundamentally transforming how enterprises connect and protect their digital assets.</span></p></div><p></p></div>
</div><div data-element-id="elm_0RjKUZh11XaAKusROPkYlw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_0RjKUZh11XaAKusROPkYlw"] .zpimagetext-container figure img { width: 1024px !important ; height: 576px !important ; } } [data-element-id="elm_0RjKUZh11XaAKusROPkYlw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-original zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/infosecmonitoring.jpeg" size="original" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><span><span>The SASE architecture is a fundamental shift, moving the security perimeter from a physical location to a cloud-native, identity-centric service edge.</span></span></div>
</div></div><div data-element-id="elm_MiJR7M7sK9og5Q6EWEJbNQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_MiJR7M7sK9og5Q6EWEJbNQ"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_ziZwRssE0coI-arTeb4D0Q" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_ziZwRssE0coI-arTeb4D0Q"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_W8xv7NeDY6YcbyevKlOYZA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_W8xv7NeDY6YcbyevKlOYZA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><div></div><div><h2><span>Secure Access Service Edge (SASE): The Foundational Shift Driven by Cloud, Mobility, and the Demise of the Traditional Perimeter</span></h2><p><span>In 2019, Gartner introduced the Secure Access Service Edge (SASE) model, describing it as a fundamental architectural shift that would eventually render existing networking and security models obsolete. While many in the industry initially treated it as hype, the events of the last few years—namely, the explosion of cloud application usage and the permanence of the dispersed, mobile workforce—have made this prediction an undeniable reality.</span></p><p><span><br/></span></p><p><span>Today, every enterprise is facing unprecedented pressure on its legacy network and security architecture. Users, applications, and data have migrated from the confines of the corporate network to the cloud and the edge. This digital transformation improves agility and competitiveness, but it requires a corresponding evolution in how we connect and, more importantly, how we secure those connections.</span></p><p><span><br/></span></p><p><span>The SASE category represents this necessary evolution. It converges the capabilities of the WAN edge (networking) with network security (security) into a single, unified, cloud-native service. However, the market is crowded with vendors claiming SASE capabilities, when, in reality, they are offering little more than traditional products loosely &quot;service-chained&quot; together.</span></p><p><span><br/></span></p><p><span>To cut through this noise and ensure you are making a strategic, future-proof investment, you must evaluate solutions against the </span><strong>four non-negotiable pillars</strong><span> of a true SASE architecture.</span></p><h3><span><br/></span></h3><h3><span>The Problem: When SDWAN Alone Is Not Enough</span></h3><p><span>SDWAN is a critical part of the modern network, solving performance, resilience, and efficiency problems. But as valuable as it is, it is only </span><em>one part</em><span> of the larger SASE story.</span></p><p><span><br/></span></p><p><span>The traditional approach to security—regardless of whether you use SDWAN—was to </span><strong>backhaul</strong><span> all traffic from remote users and branch offices back to a central, on-premise security stack. This approach is fatally flawed today:</span></p><ol><li><p><strong>High Latency:</strong><span> For users accessing cloud applications like Microsoft 365, forcing traffic halfway across the country just to hit a corporate firewall and then turn back to the cloud introduces unacceptable latency and degrades performance.</span></p></li><li><p><strong>Inconsistent Security:</strong><span> Creating a patchwork of appliances (VPN concentrators, firewalls, web gateways) and physically stringing them together via &quot;service chaining&quot; results in fragmented visibility, inconsistent policy enforcement, and complex management. As Gartner noted, service chaining is emphatically </span><strong>not</strong><span> SASE.</span></p></li><li><p><strong>The IP Address Conundrum:</strong><span> Legacy security is tied to a network anchor, typically the IP address of a device or location. In a world where the office can be a coffee shop, an airport, or a home network, an IP address is useless as a hook for security enforcement.</span></p></li></ol><p><span>To overcome these structural limitations, the architecture must evolve beyond the old data center and embrace the cloud-native design principles of SASE.</span></p><h3><span><br/></span></h3><h3><span>Pillar I: Converged WAN Edge and Network Security</span></h3><p><span>A true SASE architecture is defined by convergence. It cannot be a collection of disparate appliances or services loosely managed by different dashboards.</span></p><p><strong><br/></strong></p><p><strong>The Requirement:</strong><span> The WAN edge (SDWAN functionality, traffic optimization, and routing) and the comprehensive network security stack (Firewall-as-a-Service, Secure Web Gateway, CASB, ZTNA) must be folded into a single, cloud-native software fabric.</span></p><p><strong><br/></strong></p><p><strong>The Pragmatic Benefit:</strong><span> This convergence delivers the simplicity, scalability, and pervasive security that customers demand. By operating as a single software stack, the platform can perform </span><strong>single-pass architecture</strong><span> inspection, where traffic is decrypted, inspected against all security and networking policies simultaneously, and then re-encrypted. This greatly reduces processing time and latency compared to chaining separate security devices, ensuring high performance while maintaining security coverage.</span></p><p><span><br/></span></p><p><span>In essence, SASE mandates that networking and security cannot be two separate domains managed by different tools; they must be a single, centrally controlled entity.</span></p><h3><span><br/></span></h3><h3><span>Pillar II: Cloud-Native, Global Service Delivery</span></h3><p><span>The nature of cloud applications—specifically, their sensitivity to latency—demands that networking and security be delivered as close to the endpoint as possible. The edge is the new cloud, and it requires a distributed approach.</span></p><p><strong><br/></strong></p><p><strong>The Requirement:</strong><span> SASE offerings must be purpose-built for </span><strong>scale-out, cloud-native, and cloud-based delivery</strong><span>. This means relying on a vast, globally distributed network of Points of Presence (PoPs) to minimize the physical distance between the user and the security enforcement point.</span></p><p><strong><br/></strong></p><p><strong>The Pragmatic Benefit:</strong><span> The geographical footprint is critical. It is not sufficient to simply run the service on a hyper-scaler with a limited number of PoPs, as this still forces users in remote regions to connect over long distances. A true SASE solution requires providers with a deep, global footprint and the agility to instantiate a PoP in response to emerging customer demands. This optimized, low-latency delivery ensures that security inspection does not negatively impact the performance of real-time applications.</span></p><h3><span><br/></span></h3><h3><span>Pillar III: A Network Designed for All Edges</span></h3><p><span>The traditional network focused almost exclusively on the site (the branch office or the headquarters). The modern enterprise must focus on securing </span><strong>all edges</strong><span> equally—the site, the cloud, and the individual mobile user.</span></p><p><strong><br/></strong></p><p><strong>The Requirement:</strong><span> SASE services must be capable of connecting and securing more than just physical sites. This requires an agent-based capability, managed as a cloud service, that can be installed on laptops and mobile devices to extend the full security stack to the individual user, regardless of their connecting network.</span></p><p><strong><br/></strong></p><p><strong>The Pragmatic Benefit:</strong><span> Offerings that rely solely on on-premises, box-oriented delivery or only cater to a limited number of fixed cloud PoPs will inevitably fail to meet the requirements of an increasingly mobile workforce and emerging latency-sensitive edge applications. A genuine SASE architecture ensures that an employee working from a home office or a client site receives the same level of security and performance optimization as if they were sitting in the corporate headquarters.</span></p><h3><span><br/></span></h3><h3><span>Pillar IV: Identity and Real-Time Condition</span></h3><p><span>This is arguably the most revolutionary pillar of SASE, representing the complete departure from the legacy model.</span></p><p><strong><br/></strong></p><p><strong>The Requirement:</strong><span> Security access and policy enforcement must be based on the </span><strong>user's identity</strong><span> and their real-time context (device type, time of day, location, and posture of the device), not the static IP address.</span></p><p><strong><br/></strong></p><p><strong>The IP Address Conundrum:</strong><span> Anything tied to a physical IP address is useless for security policy enforcement when users and resources are constantly moving. The legacy data center is no longer the center of the network universe. The new center of secure access networking design is the </span><strong>Identity</strong><span>—with the policy following that identity wherever they go.</span></p><p><strong><br/></strong></p><p><strong>The Pragmatic Benefit:</strong><span> SASE allows IT leaders to customize the security level and network experience based on risk. For example:</span></p><ul><li><p><span>A user accessing a critical financial application from a corporate laptop in the office receives </span><strong>full access</strong><span>.</span></p></li><li><p><span>The same user attempting to access that application from an unmanaged personal device (different identity/condition) from a foreign country receives </span><strong>restricted, or zero, access</strong><span>.</span></p></li></ul><p><span>All policies are tied to the user's validated identity (which can be a person, a device, or an IoT entity), eliminating the vulnerability inherent in IP-based enforcement and fully embodying the principles of </span><strong>Zero Trust Network Access (ZTNA)</strong><span>.</span></p><h3><span><br/></span></h3><h3><span>A Pragmatic Call to Action</span></h3><p><span>The introduction of SASE is not marketing buzz; it is a true reflection of our times. The technologies have changed considerably, forcing a profound rethinking of legacy enterprise networks.</span></p><p><span><br/></span></p><p><span>As this market category matures, the marketing noise will continue to grow. Your responsibility as a technology leader is to move past the vendor claims and evaluate potential solutions against these four non-negotiable architectural pillars. If the solution cannot prove a </span><strong>cloud-native, globally converged architecture</strong><span> where policy is tied to </span><strong>identity</strong><span>, it will not deliver the simplicity, scale, or security your business needs to thrive in the cloud-first era.</span></p><p><strong><br/></strong></p><p><strong>KITS: Keep IT Simple.</strong></p></div><div></div>
</div></div><div data-element-id="elm_MJc7eDBKZTKrsZoU1epf0w" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_MJc7eDBKZTKrsZoU1epf0w"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_MJc7eDBKZTKrsZoU1epf0w"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_InOaHn6hN9Y0q2v9O4yaaw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_InOaHn6hN9Y0q2v9O4yaaw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="/sase"><span class="zpbutton-content">Learn about &quot;Sassy&quot;</span></a></div>
</div><div data-element-id="elm_sNE3REWav7IN4moRylK3kA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_sNE3REWav7IN4moRylK3kA"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_sNE3REWav7IN4moRylK3kA"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_CM4zod7TxypCvspafJfz9w" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>See our other articles about SDWAN and SASE:&nbsp;</p><p><a href="https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age" rel="">Redefining Connectivity in the Digital Age</a><a href="https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age" rel=""><br/></a></p><p><a href="https://www.cloud9advisers.com/News/post/sdwan-call-survivability" rel="">The 'Real' SDWAN Test:</a><a href="https://www.cloud9advisers.com/News/post/sd-wan-and-sase" rel=""></a><br/></p><p><a href="https://www.cloud9advisers.com/News/post/never-trust-and-always-verify" rel="">Never Trust and Always Verify</a></p></div><p></p></div>
</div><div data-element-id="elm_bIxD0GfgDnkGtzPLuDaPyA" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_bIxD0GfgDnkGtzPLuDaPyA"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 15 Oct 2019 12:47:06 -0500</pubDate></item><item><title><![CDATA[CyberSecurity Basics]]></title><link>https://www.cloud9advisers.com/News/post/cybersecurity-basics</link><description><![CDATA[The following is a quick, simple list of must-dos to help businesses of all sizes protect themselves against cyber threats.&nbsp; Vulnerability Scannin ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_ssfqJdnYTPqaI4KdiXha5g==" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_VuBZ60mUQAW5kxDvBEjbvA==" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_eWNoaWioQjCbE-D3VmBUNw==" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_ZXOzB36hQqKKOOp30fMHJw==" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true">The Basics of Cyber Security, What&nbsp;<span style="font-style:italic;">every</span>&nbsp;business should do</h2></div>
<div data-element-id="elm_v3UJN5KXS_6VeAJJXXZX_g==" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;"><span>The following is a quick, simple list of must-dos to help businesses of all sizes protect themselves against cyber threats.&nbsp;</span></span></p><ul><li style="font-size:11pt;"><p><span style="font-size:11pt;font-weight:bold;">Vulnerability Scanning</span></p></li><ul><li style="font-size:11pt;"><p><span style="font-size:11pt;">Doesn’t actually fix anything, but...</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Shows “bad spots’”</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Good services will show a plan of remediation</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">If subject to compliance (HIPPA, PCI, etc) recurring V.Scans are required </span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Do it </span><span style="font-size:11pt;font-style:italic;">at least </span><span style="font-size:11pt;">&nbsp;annually, quarterly is common for many businesses, monthly “managed” services best, but more costly</span></p></li></ul></ul><p style="margin-left:72pt;"><span style="font-size:11pt;">Think of it as a home inspection. </span></p><ul><li style="font-size:11pt;"><p><span style="font-size:11pt;font-weight:bold;">Penetration Testing</span></p></li><ul><li style="font-size:11pt;"><p><span style="font-size:11pt;">Different than a V.Scan but related</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Considered “white-hat” or “ethical” hacking</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Attempts to actually hack into your network</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Should come after a V.Scan and initial remediations steps to test efficacy </span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Most Pen Tests will deliver a detailed, lengthy report of findings and remediation suggestions</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Usually done annually. Should at least be done every couple/few years. </span></p></li></ul><li style="font-size:11pt;"><p><span style="font-size:11pt;font-weight:bold;">Endpoint Security</span></p></li><ul><li style="font-size:11pt;"><p><span style="font-size:11pt;">Mobile Security; </span></p></li><ul><li style="font-size:11pt;"><p><span style="font-size:11pt;">increasingly important and often overlooked window in to the network </span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">proprietary and cloud apps. </span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">corporate or employee owned mobile devices (BYOD) </span></p></li></ul><li style="font-size:11pt;"><p><span style="font-size:11pt;">Anti-Virus</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Firewall, go with a Next Gen FW (NGFW). Best would be a managed Firewall solution. Depending on your situation also look into a cloud firewall solution.&nbsp;</span></p></li></ul><li style="font-size:11pt;"><p><span style="font-size:11pt;font-weight:bold;">Employee Education</span></p></li><ul><li style="font-size:11pt;"><p><span style="font-size:11pt;">Email phishing; train employees to recognize bad, phishing emails by using mock emails </span></p></li></ul></ul><p><span style="color:inherit;"><span><br></span></span></p><p><span style="font-size:11pt;">Contact us at </span><span style="font-size:11pt;"><a href="/" title="Cloud 9 Advisers ">Cloud 9 Advisers</a></span><span style="font-size:11pt;"><a href="/" title="Cloud 9 Advisers ">. </a>We are impartial, independent, and provider-neutral, consultants of Communications, Collaboration, Connectivity, and Cloud technologies. We guide our clients through the morass of options, solutions, and providers. Sign up for our Consulting &amp; Buying Program and get the real story on CyberSecurity and the best methodology for your business.</span><span style="font-size:11pt;">Find out who the best providers are and who to avoid. Get real-world advice, recommendations, and unbiased solution design.&nbsp;</span></p><p><span style="color:inherit;"><br><span style="font-size:11pt;">Through the Program, you’ll have access to our distributor team of provider-neutral SME-Subject Matter Experts and Services Engineers. We’ll help you get pricing and bids from multiple, competing companies through our distributor portfolio of nearly 200 vetted and approved service providers. Use our evaluation tools to show decision makers the entire process, reasoning, and recommendations and complete due diligence for the project. We’ll help manage the entire procurement process (and keep all those pesky sales-guys off your back!). Visit </span><span style="font-size:11pt;"><a href="/" title="www.Cloud9Advisers.com">www.Cloud9Advisers.com</a></span><span style="font-size:11pt;"> for more information</span></span><br></p></div>
</div><div data-element-id="elm_lPPlgC14BcKXAxO2d18kvg" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-sm zpbutton-style-roundcorner " href="/engagement" target="_blank"><span class="zpbutton-content">Get Started</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sat, 29 Sep 2018 12:27:49 -0500</pubDate></item><item><title><![CDATA[Cyber Security - What is the cost?]]></title><link>https://www.cloud9advisers.com/News/post/cyber-security-what-is-the-cost</link><description><![CDATA[<img align="left" hspace="5" src="https://www.cloud9advisers.com/files/image- work in real world 2.jpg"/>what is the real cost of a cybersecurity breach? Are you too small to worry about these things? Are you willing to bet your business on your Firewall and the IT group managing it?]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_QBHuJXfaSU2N6lTO3DKwDA==" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1_7v-2uRT0GJrVBMqCKTbA==" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_30He43UiQkCeS2yxIdDPSw==" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_w0U9xwvbR8G5HlhF7Y6EJQ==" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div>The costs associated with security breaches are going up, jumping 29 percent in recent years to more than $4 million per incident, according to Ponemon’s annual bench marking report. In addition, when it comes to the impacts of breaches – such as cost per record lost – Ponemon says the gap is widening between organizations that are unprepared and those that have added policies and processes like incident response plans, encryption, and employee training.</div><p><br></p><div>To calculate the average cost of a data breach, Ponemon collects both the direct and indirect expenses as well as opportunity costs incurred by the organization as follows:</div><ul><li><span style="font-weight:700;">Direct cost</span> – the direct expense outlay to accomplish a given activity, such as engaging forensic experts, outsourcing hotline support and providing free credit monitoring subscriptions and discounts for future products and services.<br></li><li><span style="font-weight:700;">Indirect cost</span> – the amount of time, effort and other organizational resources spent in the aftermath of a breach, such as in-house investigations and communications. This category also includes the extrapolated value of customer loss resulting from turnover.<br></li><li><span style="font-weight:700;">Opportunity cost </span>– the cost of lost business opportunities resulting from negative reputation effects after the breach has been reported to victims and publicly revealed to the media.<br></li></ul><p>A recent report from Deloitte says the costs of a cybersecurity breach could be higher than most data shows as the costs can rack up for many years after the initial incident. The firm identified 14 cyberattack impact factors, including seven it claims are hiding beneath the surface and account for 95 percent of the financial impact. (see chart below).<br></p></div>
</div><div data-element-id="elm_EohnBovmbHX4hQpxlo2AwA" data-element-type="image" class="zpelement zpelem-image "><style></style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/14%20impacts%20of%20cyberattack.png" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div><div data-element-id="elm_9KItdo1-cR6utLWqbfh90A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div>Small business owners need to take caution as well. One may think; "I'm too small to be a target". Security by obscurity is not a good policy. One may think: "I've got a firewall and a good IT company".&nbsp;<span style="color:inherit;">Are you willing to bet your business on that?&nbsp;</span>Cyber Security is a specialized field and many "generalist" IT and MSP organizations today simply do not have the expertise needed to properly and adequately protect your hard earned investment and customers. There are numerous cost-effective, methods, practices, and managed services that will significantly reduce your exposure and augment what your IT company is already doing.</div><p><br></p><div>Contact us at Cloud 9 Advisers to learn about better ways to protect your business. Through our Consulting &amp; Buying Program, our consulting services are free to you. We are provider-neutral, independent, and unbiased consultants of technology, telecom, cloud, <span style="font-style:italic;">and </span>security services.</div></div>
</div><div data-element-id="elm_HHOJ_jSGTpiyagB3K_W2CQ==" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 23 Jul 2018 13:50:54 -0500</pubDate></item></channel></rss>