A Modern Approach to Protecting Against Web Threats

Today’s cyberattacks continue to grow in sophistication and scale as organizations face an uphill battle protecting a growing mobile workforce that uses multiple devices, accesses sensitive data remotely, and utilizes third-party cloud services. Not surprising, cyberattacks have been considered the fastest growing crime in the US. According to Cybersecurity Ventures, global cybercrime damages are expected to reach $6 Trillion USD this year, continue to grow by 15 percent per year, and reach $10.5 Trillion USD annually by 2025. Data breaches are not only costly but they significantly impact the bottom line of any organization, particularly around reputation and IP loss, which can be unrecoverable. In the wake of the Colonial Pipeline hack, even the White House issued a historic cybersecurity directive requiring agencies to adopt better security practices.

Many security practitioners are tasked with the daunting challenge of keeping their organization’s users, devices and applications secure as cyberattacks continue to become more pervasive and intelligent. IT teams are often hampered by traditional solutions that no longer address the security needs of today’s evolving perimeter-less and dispersed network because they lack the ability to protect users, applications, and devices in an agile manner. For example, with organizations adopting cloud-based solutions – such as Google Workspace, Salesforce, Office365, Box, etc. – and accessing these solutions over the public internet, attackers now have more initial points of compromise to begin their attacks.

A Blast from the Past
Traditionally offered as an on-premises solution, Secure Web Gateways (SWG) have been around for a while and are a staple in most security stacks. With the convergence of networking and security capabilities, SWGs logically became a key component in ensuring both secure and optimized internet browsing. Today, organizations looking to implement Secure Access Service Edge (SASE) need to consider SWG as an important piece to the puzzle for protecting users from web-based threats, all while ensuring that security policies are consistently applied and adherent to state and federal regulations.

The key weaknesses of on-premises SWGs are that they are not optimized for a modern workforce and require time and specialized resources to deploy, configure and manage. Traditional SWGs often share the common trait of being anchored to physical sites and security policy not being dynamically applied to access the risk of an access attempt. Also, because they are not able to extend protection to mobile devices and third-party cloud applications, traditional on-premises SWG provide very little visibility, control, or actionable analytics in a “work-from-anywhere” world.

Now Updated for Cloud
To address evolving IT landscapes and security needs, the next generation of Secure Web Gateways is cloud-native, cloud-delivered, and cloud optimized so that organizations can offer secure connectivity for all users over the internet regardless of location. Cloud SWGs are not tied to legacy appliances and offer an innovative set of security and networking capabilities in a flexible, elastic approach. As users connect to the public internet, a cloud SWG can help organizations by:

1. Blocking access to inappropriate websites to protect users against malicious threats on the web such as malware and phishing sites

2. Ensuring compliance with corporate, state, federal, or industry regulations

3. Identifying and containing potential and suspicious threats for analysis and reporting

4. Prioritizing security incidents to speed up time-to-resolution

Ensuring Data Security
The foundation of protecting web traffic is ensuring data integrity and privacy. Therefore, most of the traffic on the internet needs to be encrypted, and all cloud services need to leverage SSL or TLS encryption to protect user data from malicious actors. However, SWGs needs to be able to decrypt, inspection, and then re-encrypt all traffic to perform security checks that ensure the traffic is compliant with corporate policy.

Traffic to and from the internet introduces risks and modern SWGs should decrypt a data packet only once when performing security checks to minimize points of compromise. Every time a data packet is opened and inspected, there is a corresponding increase in both security risks and network latency. Modern SWGs need to be able to provide a comprehensive set of capabilities for security visibility and control to both on-premises and cloud resources in a single pass. This single pass decryption preserves data integrity, bolsters security hygiene, and optimizes connectivity.

How a Modern SWG Works
A SWG is a cloud service that is able to protect access from any device. When a user accesses the internet from their device, instead of connecting directly to a website, the user traffic is routed through the cloud-based SWG. Before allowing the requested access to traverse to the intended destination, the SWG performs a range of security checks to protect the organization from potential web threats, all while ensuring the access attempt is compliant with policy. As an example, these security checks should include URL and deep packet inspection, SSL/TLS decryption, malware prevention, content filtering, user authentication, application control, and more – all done in one pass. While the SWG is simultaneously performing these critical security checks, all application and traffic activity should be optimized so there is no latency or disruption to the end user experience.

A modern SWG is an important security function that organizations need to consider implementing as they begin their SASE journey. Key benefits can be realized, including preventing data leakage to the web, defending against attacks, controlling and authorizing user access, protecting mobile devices and gathering granular real-time web traffic analytics. Tightly integrated SASE solutions enable organizations to deploy SWG and other SASE functions selectively to start, and easily add on additional functions as they scale. Together, these cloud services provide enterprises with a secure architecture with context- aware, intent-based technologies, enforcing security no matter where devices, users and applications are located.

Featured

Featured Cybersecurity

Webinars

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3