Hi. Welcome to Ingram Micro.

Please choose your role, so we can direct you to what you’re looking for.

If you’d like to learn more about Ingram Micro global initiatives and operations, visit ingrammicro.com.

Top 3 Cloud Security Solutions Based on Network Infrastructure

September 16, 2017

Top 3 Cloud Security Solutions Based on Network Infrastructure


As your customers expand their public cloud investments to take advantage of the superior scalability, flexibility, and cost savings offered by third-party cloud service providers, they will be looking for ways to manage their security risks and maintain their regulatory compliance status. While public cloud computing erases the traditional network perimeter in many ways, cloud security can—and should—still start on premises. Here are three critical types of cloud security solutions based on network infrastructure.

 1. Web content filtering

The introduction of public cloud computing to the enterprise data stack brings with it a significant increase in the time that information workers spend on the Web at large, and increased time on the Web means increased exposure to Web-borne malware, viruses, and other threats to corporate infrastructure and data security. Web content solutions that sit on the corporate network, between the user and the public Internet, leverage threat intelligence networks to detect and block threats before they lead to a breach. The more advanced solutions also offer Data Loss Prevention (DLP) integration to detect and prevent data privacy policy violations. And enterprises can choose to deploy them either on traditional physical hardware or on virtual appliances.

2. Identity access management 

Another change that public cloud computing brings to the enterprise is the proliferation of endpoint devices with which users can access that public cloud. The rise of enterprise mobility further complicates matters. Enterprise data privacy and security are no longer a simple matter of making sure that only corporate-owned, IT-controlled, network-connected endpoints can access corporate resources. Dedicated identity access management solutions that live on premises or operate as hosted cloud services provide a single point of control that unifies security management and enforcement across multiple public cloud applications and end-user devices. This security consolidation is a boon to security and IT administrators tasked with protecting corporate data. 

3. Cloud encryption gateways

The third piece of the cloud security puzzle is data protection. Ultimately, the shift in emphasis from private, on-premises infrastructure to the public cloud should also shift the emphasis away from security that protects the infrastructure to security that protects the data—especially since data are the target that most serious cybercriminals are aiming for. Policy-driven cloud encryption gateways that apply encryption in various strengths to different data types can make the difference between a disastrous data leak and a crisis averted. If data are appropriately encrypted, after all, then even if they are exposed, they remain unreadable and therefore harmless to the enterprise and of no value to the attacker. The best of the best cloud encryption gateways also offer DLP integration and cloud access management and controls.

The enterprise's move to the cloud doesn't have to mean a loss of security for businesses or a loss of sales for resellers, as long as all involved take care to shift their strategy and resources to the solutions better suited for protecting enterprise data in public cloud investments.

Are you ready to make the transition? For additional resources and information, speak to an Ingram Micro security specialist today.