Home>APTFilter>Cloud protection, remote browser can minimize cyber breach: Gartner

Cloud protection, remote browser can minimize cyber breach: Gartner

APTFilter AVGNews CERT-LatestNews FSecureNews KasperskyNews Malware McAfeeNews Security News SocialEngineering SophosNews SymantecNews ThreatsActivists ThreatsCybercrime ThreatsEconomic ThreatsStrategic TrendMicroNews Uncategorized VulnerabilitiesAdobe VulnerabilitiesAll VulnerabilitiesApple VulnerabilitiesApplications VulnerabilitiesCisco VulnerabilitiesCrypto VulnerabilitiesDBMS VulnerabilitiesFirmware VulnerabilitiesGoogle VulnerabilitiesHardware VulnerabilitiesLinux VulnerabilitiesMicrosoft VulnerabilitiesMozilla VulnerabilitiesNetwork VulnerabilitiesOS VulnerabilitiesVMWare VulnerabilitiesVOIP
Home > News > Cloud protection, remote browser can minimize cyber breach: Gartner

The reports says successful attacks originate from the public Internet.


At a time when the level of cyber security threat to enterprise IT continues to be alarming, Cloud workload protection platforms (CWPP) and remote browser technologies can protect or thwart such breaches, market research firm Gartner said. According to Gartner, hybrid CWPP provides information security leaders with an integrated way to protect workloads using a single management console and a single way to express security policy.

“As attackers improve their capabilities, enterprises must also improve their ability to protect access and protect from attacks,” said Gartner Vice President Neil MacDonald in a statement. “Security and risk leaders must evaluate and engage with the latest technologies to protect against advanced attacks, better enable digital business transformation and embrace new computing styles such as Cloud, mobile and DevOps,” MacDonald added.

Almost all successful attacks originate from the public Internet and browser-based attacks are the leading source of attacks on users. By isolating the browsing function, malware is kept off of the end user’s system. The market research firm also identified ‘deception’ technologies to thwart cyber attacks.

Deception is defined by the use of deceits, decoys or tricks designed to throw off an attacker’s cognitive processes or disrupt an attacker’s automation tools.  ”By using deception technology behind the enterprise firewall, enterprises can better detect attackers that have penetrated their defences with a high level of confidence in the events detected,” Gartner noted. ALSO READ: India shows growth in LTE availability but average internet speeds behind Pakistan, Sri Lanka 

According to Gartner, by 2020, 80 percent of large enterprises, 25 percent of mid-size organisations and 10 percent of small organisations will have invested in endpoint detection and response (EDR) capabilities.  EDR solutions monitor endpoints for indications of unusual behaviour and activities indicative of malicious intent.

Among other technologies that thwart, delay or identify the potential breaches or cyber attacks are network traffic analysis (NTA) managed detection and response (MDR) and micro segmentation.