123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Ensure Consistent Egress Policies Across Regions

Profile Picture
By Author: Tomas Cohen
Total Articles: 16
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Cloud services offer a ton of benefits (ease of use, scalability, value, dynamic updates) when compared to traditional software. But, while enterprise software has been around for eons, cloud services have been around less than a decade and businesses have plenty of opportunities to reduce security risks due to the use of cloud services.

Believe me – this is not a cut on cloud services, or the businesses using them. We are a cloud service, and we love other cloud services that make our work and personal lives easier and more efficient. However, we work with many very strategic and responsible enterprises that haven’t yet mastered Cloud Security, so we figured we’d make your life a little easier and tell you about the Top 10 Quick-Tips for Shoring Up your Cloud Data Security. Every week we’ll count down and share 1 tangible opportunity from real-life customer feedback, and tell you how to make it happen in your environment.

The companies we work with almost always have some type of cloud service ...
... usage policy in place that dictates which specific or types of cloud services employees are permitted to use. Polices also often outline cases in which employees with certain functions are granted access that others are not (e.g., marketing can use Facebook, but others cannot). In order to enforce these policies, customers rely on firewalls and proxies to permit/block access to web services. This process can be tricky though because the network edge is compromised of a patchwork of egress devices (firewalls & proxies).

The issue we see time and time again is that cloud policies are enforced inconsistently from region to region. The reason behind this is that the egress devices used in one location are different than those used in other locations. They were either procured by regional offices, or came on-board through M&A. The end result in either case can be vastly different regional enforcement of cloud service policies, which leads to cracks of vulnerability across the enterprise.

For example, we had one customer who used Bluecoat proxies in Asia and Palo Alto Networks firewalls in Europe. They discovered that scores of employees in Europe were using social media services in violation of policy, while in Asia employees could access certain cloud storage services that were blocked everywhere else. This exposed them to legal issues and potential loss of IP loss…not good.

In order to identify these inconsistencies we encourage our customer to review the allow/deny statistics across all Cloud Security services and regions to identify instances in which access is permitted or denied in violation to corporate policy.

Author:
Tomas Cohen is a security enthusiast and analyst covering the most significant security topics and trends prevalent worldwide. He also involves in the technology related to Cloud Security, Data Loss Prevention, Cloud Data Security etc.,

Total Views: 447Word Count: 479See All articles From Author

Add Comment

Computers Articles

1. 10 Dropshipping Shopify Apps For Shopify Stores 2025
Author: Elightwalk Technology

2. How To Write A Great Creative Ux Brief For A Design Consultancy
Author: goodcoders

3. How To Market Your Gojek Clone App Effectively
Author: simonharris

4. Scrape Restaurant Guru Review Data: Unlock Actionable Insights
Author: DataZivot

5. How To Make A Rental Search App To Solve Tenants’ Problems?
Author: goodcoders

6. Is The Is200ehpag1d Exciter Gate Pulse Amplifier Board The Ideal Choice For Your Power System Needs?
Author: Alex Zilk

7. Document Management System For Clinical Trials
Author: Giselle Bates

8. Vupico Sdp
Author: Lorenzoe Taala

9. An Extensive Guide On E-commerce Application Development
Author: goodcoders

10. Why Do Your Businesses Need Vehicle Rental Management Software In 2025?
Author: RentAAA

11. Exploring Bigpond A Reliable Choice For Your Internet Needs
Author: james smith

12. Elevate Your Online Presence With Leading Digital Marketing Solutions In Surat
Author: sassy infotech

13. How To Power Several Appliances Together Safely?
Author: Jennifer Truong

14. Web Scraping Zomato Restaurant Customer Reviews
Author: DataZivot

15. Why Every Coworking Space Needs Management Software To Thrive
Author: RentAAA

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: