Risk
9/25/2008
11:15 AM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%
Repost This

Time To Send Out For Security Help?

Providers are looking to provide everything from e-mail security to log management, all from the cloud.

Security software as a service is increasing in popularity in tandem with the growth in cloud computing, as emerging providers promise to lower costs while increasing security.

Attacks on the scale of a full-on domain hijacking are the nightmare scenario, and outsourced protection against DNS flaws is currently limited to using managed services that patch DNS for you. However, there are other proactive steps companies can take to protect data. Cloud-based Web security companies such as Purewire and Zscaler offer a host of services, including URL filtering, anti-malware, and antivirus, and are seeking to protect against emerging browser-based attacks. Even Google is offering basic security services based on technology from SafeScan.

Purewire and Zscaler can detect malware that has been placed on domains that have been hijacked, and they maintain their own DNS servers. Webroot Software and Savvis provide antivirus and anti-malware scanning of e-mail. Both take advantage of the scalability of the cloud and pitch a "no-capital-expense" service; organizations no longer need to update mail gateways with performance-crimping scanning software. Savvis also performs spam filtering in the cloud, competing with Google's Postini service.

Many have tried--and failed--to sell outsourced log management. Still, Savvis, SecureWorks, and Verizon Business Services are all giving it a go with a new twist, leveraging the cloud. Decreased bandwidth, storage, and hosting costs and increased availability lower the barriers to entry for these companies. It's worth noting that SecureWorks is one of the few remaining original players in the managed security services arena offering log management.

What's next? We expect more vulnerability scanning, Web application firewalls, and even outsourced firewalls in the form of cloud-based offerings.

Return to the story:
Locking Down The Cloud: Why DNS Security Must Be Improved

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Latest Comment: LOL.
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6212
Published: 2014-04-19
Unspecified vulnerability in HP Database and Middleware Automation 10.0, 10.01, 10.10, and 10.20 before 10.20.100 allows remote authenticated users to obtain sensitive information via unknown vectors.

CVE-2013-6213
Published: 2014-04-19
Unspecified vulnerability in Virtual User Generator in HP LoadRunner before 11.52 Patch 1 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1833.

CVE-2013-6214
Published: 2014-04-19
Unspecified vulnerability in the Integration Service in HP Universal Configuration Management Database 9.05, 10.01, and 10.10 allows remote authenticated users to obtain sensitive information via unknown vectors, aka ZDI-CAN-2042.

CVE-2013-6215
Published: 2014-04-19
Unspecified vulnerability in the Integration Service in HP Universal Configuration Management Database 10.01 and 10.10 allows remote authenticated users to execute arbitrary code via unknown vectors, aka ZDI-CAN-1977.

CVE-2013-6218
Published: 2014-04-19
Unspecified vulnerability in HP Network Node Manager i (NNMi) 9.0x, 9.1x, and 9.2x allows remote attackers to execute arbitrary code via unknown vectors.

Best of the Web