Cloud Environment
Enterprises, post-pandemic have slowly started moving from their legacy infrastructure to predominantly cloud platforms. From small to large enterprises the movement towards the cloud has occurred considering various components such as remote and hybrid work structure, efficient and robust security mechanisms, cost-effectiveness, etc. But with digital transformation via cloud adoption comes the risk of an increased number of sophisticated attack techniques by threat actors. According to a prediction by Gartner, more than 95% of workloads will be digital by 2025 and this brings the challenge of facing cyber attacks against the cloud environment.
DR Goyal, Vice President at RAH Infotech
DDoS has been one of the most used cyber-attack tactics against cloud where the number of attacks grew by 27% from2020 to 2021. To mitigate this, Radware’s Cloud DDoS Protection Service has been used by enterprises, where on an average 1,591 attacks per day were mitigated. It cannot be denied that, with the transformation being seen in technology, the vulnerability aspects too proportionally increase. Post-pandemic when the digital transformation got fast-paced, the vacuum left during the transition only allowed the cyber attacks to turn sophisticated. With an increasing number of organizations moving towards a virtual setup, cloud environment has become the new target of the threat actors.
How do SMEs protect their cloud environment against an array of malicious and advanced tactics via ‘cloud-scale attacks’?
To protect against the sophisticated DDoS attacks of today, the security measure used too needs to be of at least the same level of sophistication. Hence there are a number of criteria enterprises need to consider before choosing their cloud DDoS protection products. Network capacity is the benchmark for considering a mitigation service as there is a need to consider the overall scalability available during the attacks. Once the attacks are identified the processing capacity of the product is important. Latency is a critical component since website traffic needs to be maintained else high latency can adversely affect the working of the organization. Mitigation time and components, asset and IP protection, and the cost are a few more factors SMEs need when choosing the cloud DDoS protection product for their organization.
Navneet Daga, Sales Director of Cloud Security Services – APJ, Radware
With Our leading DDoS mitigation technology & state of the Art scrubbing network we offer customers leading SLA's to have minimum disruption to users & business and mitigate reputational damage to the Brand.
Cloud protection products
- Automated, behavioural based, zero-day protection; automatic signature creation; smart SSL attack mitigation and widest coverage with multi-layered protection
- The service is backed by 16 globally connected, full mesh mode scrubbing centers, one of them located in India, using analytics-based routing with 10Tbps and growing mitigation capacity
- Multiple deployment options, expert emergency response, comprehensive protection and industry-leading SLAs to attract the enterprises
- Cloud-only simple deployment makes integration and installation easy
Cloud Environments Under Attack by Threat Actors Using New Techniques
Reviewed by Deepika gupta
on
May 24, 2022
Rating: