jihanajinat66
Dołączył: 08 Lut 2025 Posty: 1
|
Wysłany: Sob Lut 08, 2025 04:34 Temat postu: IT security becomes network functionality |
|
|
The system house Telonic migrates security to the cloud and makes it available as a Cloud Area Network (CAN). According to the IT security and network specialist, this model ensures the highest level of security currently achievable at all times.
In the Cloud Area Network model, security is defined as network functionality and delivered as a cloud service.
Corona has changed the world of work massively in a short space of time and made decentralization through home offices or shared desks the new standard. The security architecture in IT must also follow this, says Telonic Managing Director Andreas Schlechter and explains: "The anchor point used to be the data center, around which virtually everything revolved. Today, companies - whether medium-sized or large-scale industries - have long been in the cloud, while employees sit at home and have to share the WiFi with the television, the vacuum cleaner and other devices without any security rating. It is easy to imagine the risks posed by external attacks, which are now automated."
The system house is migrating security to the cloud using leading Philippines Phone Number Database tools and making it available as a Cloud Area Network (CAN). This makes the company one of the first to be able to deliver a comprehensive solution for Secure Access Service Edge ( SASE ) in Germany. The term SASE was coined by the analyst house Gartner and refers to a model that defines security as network functionality and delivers it as a cloud service - analogous to Telonic's Cloud Area Network model.
Security becomes an integral part of a network, regardless of where access is made from or which systems, endpoints or devices are connected. "It's a bit like road traffic: We put a lot of effort into securing the vehicles, but completely forgot about the roads. Now we have the intelligent road available in IT and are thus significantly reducing the risk," explains Andreas Schlechter from Telonic. The model is particularly attractive for companies that want to reduce their own hardware to a minimum: No matter where the server capacities are, the SASE or CAN model ensures the highest level of security currently achievable.
Many of the technologies from recent years, however, have posed new challenges for security. For example, the connection via SD- WAN simplifies the configuration of a VPN split tunnel - although ideally each individual location would have to have its own firewall. However, purchasing and administering this flood of devices is almost impossible. CAN provides highly available and high-performance data connections from cloud to cloud, cloud to user and cloud to branches, if required also with appropriate "security-as-a-service". This covers all models of WAN connection, including MPLS , VPN, SD-WAN and on-premise. The technology can also be used to move WAN environments to the cloud step by step and without risk. _________________ cell phone number listing |
|