Risk
9/25/2008
11:15 AM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Time To Send Out For Security Help?

Providers are looking to provide everything from e-mail security to log management, all from the cloud.

Security software as a service is increasing in popularity in tandem with the growth in cloud computing, as emerging providers promise to lower costs while increasing security.

Attacks on the scale of a full-on domain hijacking are the nightmare scenario, and outsourced protection against DNS flaws is currently limited to using managed services that patch DNS for you. However, there are other proactive steps companies can take to protect data. Cloud-based Web security companies such as Purewire and Zscaler offer a host of services, including URL filtering, anti-malware, and antivirus, and are seeking to protect against emerging browser-based attacks. Even Google is offering basic security services based on technology from SafeScan.

Purewire and Zscaler can detect malware that has been placed on domains that have been hijacked, and they maintain their own DNS servers. Webroot Software and Savvis provide antivirus and anti-malware scanning of e-mail. Both take advantage of the scalability of the cloud and pitch a "no-capital-expense" service; organizations no longer need to update mail gateways with performance-crimping scanning software. Savvis also performs spam filtering in the cloud, competing with Google's Postini service.

Many have tried--and failed--to sell outsourced log management. Still, Savvis, SecureWorks, and Verizon Business Services are all giving it a go with a new twist, leveraging the cloud. Decreased bandwidth, storage, and hosting costs and increased availability lower the barriers to entry for these companies. It's worth noting that SecureWorks is one of the few remaining original players in the managed security services arena offering log management.

What's next? We expect more vulnerability scanning, Web application firewalls, and even outsourced firewalls in the form of cloud-based offerings.

Return to the story:
Locking Down The Cloud: Why DNS Security Must Be Improved

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-3308
Published: 2015-09-02
Double free vulnerability in lib/x509/x509_ext.c in GnuTLS before 3.3.14 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted CRL distribution point.

CVE-2015-4330
Published: 2015-09-02
A local file script in Cisco TelePresence Video Communication Server (VCS) Expressway X8.5.2 allows local users to gain privileges for OS command execution via invalid parameters, aka Bug ID CSCuv10556.

CVE-2015-6274
Published: 2015-09-02
The IPv4 implementation on Cisco ASR 1000 devices with software 15.5(3)S allows remote attackers to cause a denial of service (ESP QFP CPU consumption) by triggering packet fragmentation and reassembly, aka Bug ID CSCuv71273.

CVE-2015-6277
Published: 2015-09-02
The ARP implementation in Cisco NX-OS on Nexus 1000V devices for VMware vSphere 5.2(1)SV3(1.4), Nexus 3000 devices 7.3(0)ZD(0.47), Nexus 4000 devices 4.1(2)E1, Nexus 9000 devices 7.3(0)ZD(0.61), and MDS 9000 devices 7.0(0)HSK(0.353) and SAN-OS NX-OS on MDS 9000 devices 7.0(0)HSK(0.353) allows remote...

CVE-2015-6587
Published: 2015-09-02
The vlserver in OpenAFS before 1.6.13 allows remote authenticated users to cause a denial of service (out-of-bounds read and crash) via a crafted regular expression in a VL_ListAttributesN2 RPC.

Dark Reading Radio
Archived Dark Reading Radio
Another Black Hat is in the books and Dark Reading was there. Join the editors as they share their top stories, biggest lessons, and best conversations from the premier security conference.