Cybersecurity is a broad, deep discipline with a crowded market. There are a lot of different approaches and a lot of companies competing for your attention. This is a perfect recipe for dense jargon.
Confluera is a technically unique product that we’re proud to work on. When we explain it to friends and family, we’ve found that we don’t need impressive language to be impressive. Our product speaks for itself.
This blog is how we’d explain Confluera to a friend working outside of cybersecurity.
Grab a beer!
A fort is designed to defend people and treasure during wartime and closely monitor territory during peacetime. Corporate networks used to be built like forts. They achieved safety primarily through isolation. For the purposes of this analogy, you can think of any computer or server on a corporate network as a “person” the fort is protecting and the data those servers hold as the “treasure”.
Like forts, corporate networks used to place very clear boundaries between the private network and the public internet. Entrances and exits were small and closely monitored. It was often inconvenient, but it kept everyone safe. We call traffic moving in and out of the corporate fort “North-South” traffic.
The structural limitations to this approach were similar to those great forts faced: there’s a hard limit to how many people you can fit inside, and you can’t run a marketplace through a very small door.
Marketplaces are optimized for very different things. They are designed to give people access to as many products as possible and to make that access easy. Movement in and out of the market is fluid. There aren’t strict rules or time-consuming checkpoints.
The public internet and “the cloud” are structured like a marketplace, and the difference in structure requires an entirely different approach to security.
In a marketplace, monitoring entrances and exits (North-South traffic) is insufficient. So you have to pay attention to track patterns in how people move *within* the marketplace. In security, we call traffic moving between different services on the public internet “East-West” traffic.
A modern corporate network or Wide Area Network (WAN) is essentially a series of forts connected by roads that run through a vast public marketplace. Let’s say you have two offices. One is in LA and one is in Tokyo. Each office has a small local network that connects printers, laptops, and maybe a local server with sensitive data. These are your forts. But more and more, businesses are relying on resources in the public internet (the “cloud”) for everyday operations. While there is the regular foot traffic between the fort and the marketplace, there’s a huge growth in “East-West” traffic within the public market, and this foot traffic brings with it a new set of security concerns.
Up until the late 2010’s, cybersecurity products could be broken down into two broad classes:
If an enterprise was vigilant and technically savvy, these two types of solutions, deployed together, would keep their WAN reasonably well protected.
But with modern use of cloud services, traditional endpoint and network security are no longer enough.
According to The Cisco Annual Internet Report, by 2021 85% of enterprise network traffic will be within and between clouds. And “the cloud” is a marketplace. It’s inherently NOT secure.
The hard truth is that right now, most businesses are failing to meet the security challenges posed by new cloud technologies. This is probably not news to you.
Fortune 500 companies are pouring money into their network. Enterprises are predicted to spend $12.6B on cloud security tools by 2023, up from $5.6B in 2018 [2]. But breaches are still commonplace. In the past year, 52% of enterprises using services from more than one cloud provider have reported a breach. And a staggering 69% of those organizations reported 11 to 30 breaches [3].
What does this mean for the security landscape?
Continue Reading Part 2 : Human Readable Introduction To Confluera
References
[1] Unknown, U. (2019). Agra Fort — Red Fort of Agra. Retrieved December 03, 2020, from https://www.tajmahalinagra.com/fort/
[2]Columbus, L. (2020, April 06). 2020 Roundup Of Cybersecurity Forecasts And Market Estimates. Retrieved December 03, 2020, from https://www.forbes.com/sites/louiscolumbus/2020/04/05/2020-roundup-of-cybersecurity-forecasts-and-market-estimates/?sh=480aec2381d7
[3] Fast-Track Your Multi-cloud Monitoring Initiative. (n.d.). Retrieved December 03, 2020, from:https://www.splunk.com/en_us/form/fast-track-your-multicloud-monitoring-initiative.html