Judul : You Need a Black Cloud Software Defined Perimeter
link : You Need a Black Cloud Software Defined Perimeter
You Need a Black Cloud Software Defined Perimeter
Author: John Shepler
We hope that the virtual network connection is private
A VPN, or Virtual Private Network, is intended to make the Internet a private circuit or MPLS (Multiprotocol Label Switching) network. Whether you have a private T1, DS3, OC3, or Ethernet line in your office, if a sales or maintenance worker pops into a coffee shop and connects to the store via Wi-Fi, you have a huge security hole.
Free means free and open. This guy on the corner is looking at his laptop and watching your traffic. He either hacked the store's Wi-Fi network or created his own "free" dual Wi-Fi network that they connect to instead of the real network. This is known as a "man in the middle" and is what VPNs are designed to prevent. A VPN creates an encrypted connection called a "tunnel" between your employee's computer and your office server. So if someone doesn't have the private key... it's very difficult to join a chat.
Disadvantages of VPN
Not all VPNs have military-grade 256-bit encryption. Some use protocols that are relatively easy to break into with existing hacking tools. PPTP (Peer-to-Peer Tunneling Protocol) has been around for over 20 years and is popular because it's easy and fast to set up and use. It is also more sensitive than protocols with strong encryption.
Not all VPN providers are equally powerful. The weak may have server vulnerabilities or other vulnerabilities that make it easy to hack a cloud VPN server and get all the information. You never know until it breaks and you never know how.
A common weakness of VPNs is that they tunnel your business. If this is compromised in some way, your entire network and everyone in it is open to surveillance and potential attacks. It is better to disclose only a small portion of the company's assets, if not all at once.
Software defined dark cloud perimeter
The idea of a software-defined perimeter (SDP) reduces trust by giving the user access to resources when needed. The study was conducted by the US Information Systems Agency (DISA) and is called "The Dark Cloud". A black mark means that the network infrastructure is hidden in the cloud. No DNS or IP address is displayed.
SDP authenticates each user and ensures that they only have access to the resources that the user has authorized to do their work. Neither the user nor the IoT device knows what else is on the network. you don't see If you don't see it, you can't reach it. Also, no one can impersonate this user.
The host system and the SDP controller will connect and verify authorization. After authorization of authentication and control channels, the controller is responsible for connecting the originating and receiving hosts through the gateway.
SDP is not only between customers and data center. It is also deployed in the data center to isolate the network to isolate critical applications. Only certain users have access to or know about the most secure software.
Encryption and masking are key to SDP security. A regular network scan like a port scan won't work because nothing will show up during the scan. In a sense, SDP creates virtual networks on a per-user, per-session basis. What goes on behind the scenes remains a complete mystery.
The end of networks as we know them?
TCP/IP networking, which has served us well for decades, must go underground to remain relevant in today's high-risk environment. We can't do without the internet anymore and there are too many intrusions on the public internet. Technology must evolve to create the illusion of a simple open Internet, but without a known network topology.
Worried about your company's network being hacked or failing? Now is a good time to see what improvements are being made to network security, especially cloud-managed security solutions.


That's the article You Need a Black Cloud Software Defined Perimeter
That's it for the article You Need a Black Cloud Software Defined Perimeter this time, hopefully can be useful for all of you. okay, see you in another article post.
You are now reading the article You Need a Black Cloud Software Defined Perimeter with link address https://direcway-satelite.blogspot.com/2022/08/you-need-black-cloud-software-defined.html
0 Response to "You Need a Black Cloud Software Defined Perimeter"
Posting Komentar