Skip to content

10 Differences Between Cloud-Native & “Faux” Cloud Security Products

For IT and security teams with limited staff and tight budgets, cloud-native software-as-a-service (SaaS) security products offer tremendous value. Some CIOs have even mandated that new security tools be delivered in the cloud where possible. Some vendors with older on-premises products have tried to sneak in their products by claiming they are now “in the cloud,” but the truth is that that is a façade. Let’s call these products “faux” cloud security to contrast against products that are truly “cloud native.” Vendors of faux cloud products hope that with a little marketing smoke and mirrors, they can use some “cloudy” language and potential buyers will not know the difference. When we say faux cloud, technically speaking, we mean that the vendor is just allowing the customer to host their on-premises product in the customer’s public cloud account. This means the customer still must install, configure, deploy, maintain, update, and eventually decommission that product. In other words, you as the customer must do all the work. The only “cloud” aspect of this arrangement is that you can do all the work on a server you are renting (that is, paying for) from AWS, Azure, Oracle, Dell, etc.

Faux Cloud Security in the Real–World

A real-world example of this software sleight-of-hand is Cisco’s Internet Security Engine (ISE). Cisco delivers ISE as a virtual appliance to handle network access control (NAC) – a critical component of any effective cyber security stack. As of ISE’s latest version, a customer can deploy the software in their own AWS or Azure accounts. That is the long and short of it, however. The well-known challenges of setting up ISE – or any other network security appliance – remain. It is difficult to get your ISE server configured properly, ensuring it communicates with all your network equipment, even after having committed over 1,200 pages of ISE documentation to memory.

Cloud Native Reduces the Hassles

In contrast, a truly cloud-native solution allows the customer to sign up through a web page, configure as needed, and move on – the application just works out-of-the-box. Period. Now, that’s the easy part. As your organization consumes a cloud service, it does not have to concern itself with nagging issues and questions along the way common with on-premises software (e.g., How do we roll out patches and upgrades? Is there a security vulnerability in the operating system? Who is handling system backup?). You, as the end-user, have historically been responsible for these items with legacy on-premises software. Portnox CLEAR NAC-as-a-service is cloud-native – “born in the cloud” as it were. To deploy CLEAR, a customer just needs to visit the sign-up page, enter their wireless controller information, configure the RADIUS settings on the network device, and CLEAR will begin enforcing policies. Portnox customers have done this in as fast as 30 minutes from start to finish. As is true of cloud-native solutions in other domains, customers can see value in minutes, not days, weeks, or even months. No complexity. No hassle.

Knowing the Difference Before You Commit

As a potential customer, how can you distinguish cloud-native from faux cloud security software? There are a few telltale signs. The table below summarizes some of the most salient differences. When you evaluate a new vendor, be sure to ask questions such as who is paying for the infrastructure? Who is responsible for updates and upgrades?

Cloud NativeFaux Cloud
InfrastructureProvided, paid, and managed by the vendor; mostly invisible to anyone utilizing the serviceProvided, paid, and managed by you through your own AWS or Azure account
ImplementationQuick time to value; much of the work is invisible to youDepends on the complexity of the app, but it is your responsibility to do the work or pay someone else to do it
PricingSubscription with lower up-front costPerpetual license with expensive up-front cost that are amortized over time.

(Note: many vendors are moving away from perpetual licensing for on-prem or faux cloud products, but as they do, their customers are getting the worst of both worlds – paying more annually while still being responsible for on-going maintenance of the product)
Total Cost of OwnershipThe price of the product reflects the genuine cost of ownershipThe price of the product is only one (and sometimes only a small) part of the total cost that is reflected in the staff time and public cloud expenses; in many instances, you may not even know what it is going to cost you until it is too late
Vendor Lock-InEasy to switch to another vendor should your business needs changeExpensive license, deployment and maintenance costs make switching prohibitive, often for years
AccessAccess anywhere via browser with internet connectionOn-premises model often requires access via VPN

(Note: what happens when there is a problem with your solution and your VPN is configured to use your on-premises system? Sounds like someone is driving into the office!)
ScalabilityAutomatically scales with usageCustomer must increase capacity to keep up with usage
UpdatesVendor regularly updates the underlying components such as servers, databases, etc. This process will often be invisible to you.You are responsible for ensuring that the entire tech stack – components, databases, servers, network – is updated with the latest patches
UpgradesYou seamlessly and transparently reap the benefit of new features, enhancements, and other improvements with zero effortAny upgrade requires you to install, test, and then deploy the upgrade in production, often during nights and weekends in case something goes wrong
AccountabilityThe vendor takes ownership of the uptime and security, performance, and availability of the serviceApart from the infrastructure as a service, you are on the hook for the performance, health, security, and availability of the solution, lock stock and barrel

Cloud Native

Infrastructure
Provided, paid, and managed by the vendor; mostly invisible to anyone utilizing the service

Implementation
Quick time to value; much of the work is invisible to you

Pricing
Subscription with lower up-front cost

Total Cost of Ownership
The price of the product reflects the genuine cost of ownership

Vendor Lock-In
Easy to switch to another vendor should your business needs change

Access
Access anywhere via browser with internet connection

Scalability
Automatically scales with usage

Updates
Vendor regularly updates the underlying components such as servers, databases, etc. This process will often be invisible to you.

Upgrades
You seamlessly and transparently reap the benefit of new features, enhancements, and other improvements with zero effort

Accountability
The vendor takes ownership of the uptime and security, performance, and availability of the service

Faux Cloud

Infrastructure
Provided, paid, and managed by you through your own AWS or Azure account

Implementation
Depends on the complexity of the app, but it is your responsibility to do the work or pay someone else to do it

Pricing
Perpetual license with expensive up-front cost that are amortized over time.

(Note: many vendors are moving away from perpetual licensing for on-prem or faux cloud products, but as they do, their customers are getting the worst of both worlds – paying more annually while still being responsible for on-going maintenance of the product)

Total Cost of Ownership
The price of the product is only one (and sometimes only a small) part of the total cost that is reflected in the staff time and public cloud expenses; in many instances, you may not even know what it is going to cost you until it is too late

Vendor Lock-In
Expensive license, deployment and maintenance costs make switching prohibitive, often for years

Access
On-premises model often requires access via VPN

(Note: what happens when there is a problem with your solution and your VPN is configured to use your on-premises system? Sounds like someone is driving into the office!)

Scalability
Customer must increase capacity to keep up with usage

Updates
You are responsible for ensuring that the entire tech stack – components, databases, servers, network – is updated with the latest patches

Upgrades
Any upgrade requires you to install, test, and then deploy the upgrade in production, often during nights and weekends in case something goes wrong

Accountability
Apart from the infrastructure as a service, you are on the hook for the performance, health, security, and availability of the solution, lock stock and barrel

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

Looking Back at 2021 in OT Security With SCADAfence

As 2021 draws to a close, it is time for our customary round-up of the year’s industry-changing cyber attacks, product and company updates, and SCADAfence’s achievements.

A Landmark Year for SCADAfence

Before we get into the year’s industry and product news, 2021 has been an astonishing year for us at SCADAfence. To start off the year, we unveiled our strategic partnership with Rapid7 which was followed up with many partnerships with industry leaders such as Keysight Technologies, BDO, Fujitsu, NCC and others. Then came recognition from SC media naming SCADAfence the Best SCADA Security Solution for 2021 and Frost & Sullivan announcing SCADAfence as a leader in the Frost Radar for Critical Infrastructure Cyber Security Market report for 2021. On that note, we want to thank all our employees, customers, partners, distributors, investors, for helping us reach new milestones we couldn’t have dreamed of.

OT Security in the Spotlight

2021 started out with the entire security community recovering from the aftermath of the massive SolarWinds campaign. Just a few weeks later news broke that a water treatment plant in Oldsmar, Florida, was under attack but the security team quickly thwarted the attack. The attacker briefly pumped up sodium hydroxide, the main ingredient in liquid drain cleaners, from 100 parts per million to 11,100 parts per million into the water supply. That control was undone almost immediately and the public was never at risk in this case, but it’s a quick lesson at just how important OT security is in 2021 and beyond.

Over the next six months, the OT security industry was reminded that 2021 was the year of ransomware. Some of the ransomware attacks were so colossal, they grabbed national headlines for the impact they had on civilians’ daily lives. In early May, a ransomware attack on Colonial Pipeline, a major East Coast fuel supplier presented the different security risks of exploiting IT networks to reach OT infrastructures. Shortly after in June, meat producer JBS USA paid an $11 million ransom after attackers shut down operations at five of their beef-processing plants.

And now suddenly, it’s been a crazy year of attacks that have affected the OT security landscape but just two weeks ago we have moved onto another threat that could last for years. There’s really no way to predict where threat actors will head in 2022, but we expect to still see more attacks on critical infrastructure via ransomware to be on the rise.

Major SCADAfence Product Updates  

With SCADAfence product, R&D teams, and security researchers working tirelessly, SCADAfence development saw several milestones. Perhaps most importantly, enhancing our Governance Portal with a complete UI facelift that offers faster and more advanced results and more coverage of compliance regulations. Today, our Governance Portal has become a significant contributor to the company’s revenue growth, which was driven by customer and market demand and the cybersecurity executive order by United States President Joe Biden.

SCADAfence’s Multi-Site portal also saw a major update, customers now can distribute their configurations to all their sites from the Multi-Site Portal to the distributed SCADAfence Platforms. The security configuration is managed via profiles and covers many security aspects including alerts policy, IP groups, central licensing, 3rd Party tools integrations, and more. By deploying the central configuration, administrators will now save more time while increasing productivity and efficiency while using the SCADAfence Platform in their multiple sites.

An additional product offering that we launched near the end of 2021 was SCADAfence’s Managed Services for OT security. Now industrial organizations can enable their OT security with minimal effort. Our OT security experts deliver the expertise and technology that is needed to effectively control OT networks with visibility, risk management, and vulnerability detection.

And, as usual, there were many equally important additions, such as feature updates, new integrations, performance improvements, and more.

2021, A Banner Year for SCADAfence

With 2022 right around the corner, we can’t forget the trend-setting year that was 2021. Here at SCADAfence, 2021 was a fruitful year of growth and opportunity which included quadrupling our yearly revenue and doubling our customer base over the last year. We accelerated our expanding global customer base across a diverse set of industries – including manufacturing, water treatment, critical infrastructure, oil and gas, pharmaceuticals, chemicals, and building management systems (BMS).

As a company, we moved to a beautiful new office in Ramat Gan and we recruited several industry-leading OT security experts from leading cybersecurity organizations to grow our sales, sales engineering and strategy team. We’ll share some more on that in future posts.

To a More Secure Year Ahead 

We hope this recap of 2021 at SCADAfence helps you to see the larger trends of OT security and what our product has to offer. Stay tuned for more blog, news articles and innovative product updates in the upcoming year that will continue to examine new and emerging OT security trends we should all focus on.

As we conclude, we’d like to thank all our customers, employees, partners, investors and everyone who supported us this year. We couldn’t have done it without you, and look forward to continuing to collaborate with you!

Happy New Year!

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About SCADAfence
SCADAfence helps companies with large-scale operational technology (OT) networks embrace the benefits of industrial IoT by reducing cyber risks and mitigating operational threats. Our non-intrusive platform provides full coverage of large-scale networks, offering best-in-class detection accuracy, asset discovery and user experience. The platform seamlessly integrates OT security within existing security operations, bridging the IT/OT convergence gap. SCADAfence secures OT networks in manufacturing, building management and critical infrastructure industries. We deliver security and visibility for some of world’s most complex OT networks, including Europe’s largest manufacturing facility. With SCADAfence, companies can operate securely, reliably and efficiently as they go through the digital transformation journey.

Pandora FMS and RedHat6, a story that comes to an end in 2022

Today I will tell you a little story, that of good Redhat6 and Pandora FMS, a relationship that endured, on favorable terms, everything it had to endure, but finally fell apart. Calm down, they still will stay as friends.

Pandora FMS stops supporting RedHat6 this 2022

Redhat6 was once the generation of Red Hat’s complete set of operating systems, designed for mission-critical enterprise computing and certified by leading enterprise software and hardware providers. Many systems were based on Rhel6. Among them we highlight CentOS, which in its day, was a derivation, a kind of free clone of Redhat, with the same life cycle.

As many of us know, CentOS 6 reached the end of its official life cycle, on November 30th, 2020, so it is a system that has been obsolete for more than a year. However, we, Pandora FMS, have maintained a year of extended support (2021) for these systems to make transition and migration from CentOS 6-based systems to systems based on CentOS 7 or the latest RedHat 8 easier. But this is over by 2022.

The Future of RedHat

What will happen now? Well, let’s talk about RedHat Enterprise Linux 8. Because the most cutting-edge IT is hybrid IT. And in order to transform a system into a hybrid environment, from data centers to Cloud services, certain formalities are needed. Like an adaptable scalability. Seamless workload transfer. Application development… And, of course, RedHat already has an operating system that meets all these requirements, the path to its future is RedHat 8. Cutting-edge technology that adapts to businesses and has the essential features, “from container tools to compatibility with graphic processing units”, to launch tomorrow’s technology today.

Some alternatives to CentOS

Are there any alternatives for team administrators who already moved on? Well, we have some candidates and we know them well because we support them.

  • RHEL for Open Source Infrastructure: RedHat itself launched this alternative to the community so that no one would sigh for the death of CentOS, even so we are facing a clone of RHEL.
  • Rocky Linux: It was developed by Greg Kurtzer and named after Rocky McGough. During its first 12 hours of life online, it was downloaded 10,000 times.
  • AlmaLinux: Although now managed by its own foundation, AlmaLinux was launched in its day by those responsible for CloudLinux. Since its inception it was claimed by many as the best positioned successor to CentOS, now its version 8.5 is the proposed exact copy of RHEL 8.5.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

Top 5 Requirements for a Successful Edge Deployment

Earlier this year, Scale Computing published “The Gorilla Guide to: Enabling IT at the Edge” a jargon-free guide designed to help IT leaders and practitioners understand the fundamental principles of edge computing and offers practical guidance as to how to get started on your edge journey. One of the most commented upon chapters was in Chapter 2, The Top 5 Requirements for a Successful Edge Deployment.

Edge computing deployments have unique constraints that are significantly different from the ones with which typical data center deployments contend. After all, by definition, edge deployments are away from normal support services, far from the sanitized data center, and deeply enmeshed in the real work of the organization where they must deliver high value without disrupting other business activities.

Here is what we believe are the top five requirements for a successful edge deployment:

1. Modest Physical Footprint

Some vendors just sell standard data center equipment for edge use without accounting for the less-than-perfect environment that may be encountered there. For example, data center gear designed to work when provided with the highest quality cooling can suddenly develop reliability issues when located in a poorly ventilated storage space at an edge installation.That’s why it’s vital that edge equipment should be conceived from the start for that purpose, with sufficient ruggedness built in to handle the wider range of issues that are typical at the edge — whether that edge is the shop floor, a warehouse, or somewhere in a retail establishment. Edge components and systems need to be thought of as “universal” products that can be deployed when and where they’re needed, with few limitations, and made appropriately secure in any given environment.

2. Affordable but Effective

For the many industries that operate remote sites, ranging from finance and retail to manufacturing and so-called Remote Office Branch Office (ROBO), there’s a need for reliable computing to support their business applications and operational technologies. But none of these scenarios can afford large, dedicated spaces or complexity. Edge adopters must consider the size of the actual equipment and its requirements for access space, air flow, cabling, and so forth. So, smaller and more compact equipment generally helps drive flexibility because it allows more freedom to choose deployment locations and makes it less likely a deployment will disrupt other activities. It typically also implies less onerous cooling and power needs. It is worth noting that compact form factors can also be helpful for enhancing physical security. For example, a smaller form factor means equipment can be secured and ceiling mounted for example, where it becomes harder to tamper with.

3. Resilient and Survivable

Edge computing is no place for daintiness: It’s where real work gets done, some of it dirty, messy, hot, and noisy. So, in addition to needing only a basic physical environment and simple power and connectivity, prudent adopters make sure the edge setup (hardware and software) is designed to be failure resistant, able to recover from many problems autonomously, to protect data, and to maintain operations in almost any circumstance. Edge equipment needs to be ready to handle that kind of stress without generating performance issues. Furthermore, autonomy should be part of the basics — delivering no-nonsense reboots and allowing most other maintenance tasks to be initiated remotely.

4. Simplified Resource Additions (Scale Out) and Hardware Replacement

Edge environments are very dynamic with new applications being deployed regularly and data volumes growing exponentially creating new demands on edge infrastructure. It’s critical that infrastructure is designed to accommodate that growth and expand and upgrade the edge micro-datacenter with new resources and applications as easily as the initial edge deployment. Failure to plan for expansion of the edge environment can lead to expensive forklift upgrades or multiple independent islands of infrastructure to manage, with all the complexity and cost associated with that kind of choice.

5. Repeatable, with Zero-Touch Provisioning

Edge systems should take a standardized approach requiring little or no customization and minimal skills in installation. When possible, edge should offer or embrace infrastructure as code (IaC), which simplifies change control. Repeatability means that service and support is standardized so staff doesn’t need to research each installation before responding to a problem but, instead, can count on using a consistent approach and methodology. Management must not require specialized IT staff on site; upgrades and infrastructure scaling must be non-disruptive; the foundation must be self-healing; and IT specialists must be able to manage the entire edge fleet seamlessly at scale. Finally, look for zero-touch provisioning. This is a device-configuration process that can be operated automatically and eliminates most of the burden on IT administrators when setting up, maintaining, or upgrading an edge system

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

What are CVSS scores?

Understanding Vulnerability Scoring

Threat actors make use of vulnerabilities for their attacks. By exploiting vulnerabilities, attackers can gain access to devices, networks and systems. Vulnerabilities enable attackers to steal corporate information and sell sensitive information. They can also eavesdrop to confidential communication.   

Continue reading
×

Hello!

Click one of our contacts below to chat on WhatsApp

×