Why security appliances do not fully protect SMEs

Security Security Appliances

Share post

SMEs should review their security strategy. Avast highlights 6 reasons why security appliances don't fully protect SMBs. But there are alternatives as a solution.

With a simple, uniform approach to threat management, Unified Threat Management (UTM) solutions were particularly convincing when they were introduced to small and medium-sized enterprises (SMEs). In 2007, with a corresponding appliance, these received additional all-in-one security functions such as anti-virus, anti-spyware, anti-spam, intrusion detection and monitoring as well as content filters, which are provided at a single point in the network, in addition to a firewall. However, this simplification is becoming a disadvantage in light of changes in the way things work and the methods of data protection that are now required.

SMEs should review their security strategy

SMEs should therefore review their security strategy. The following six reasons mean that a security appliance no longer fully protects SMEs. However, there is also good news: alternatives are available.

1. Temporary Protection

Conventional UTM solutions only protect the devices that are located within the office space. However, today many employees switch between home and company networks with their laptops, smartphones or tablets or use public networks while on the move. Outside the company premises, however, they are unprotected and pose a risk. This risk group also includes external IT technicians, freelancers and suppliers who often have access to the company network.

2. Local protection

Today, SMEs are increasingly relying on third-party cloud applications such as Office 365, Salesforce, Box and many more. This means that your data is distributed across multiple servers and cloud data centers. This trend towards decentralized, cloud-based data centers is accelerated even further by 5G technologies. However, a local UTM appliance only protects the company data that is stored on-premises.

3. Disabled feature

Although almost all UTM devices have an SSL / TLS decryption function, in practice this is switched off in nine out of ten cases in favor of performance. The result is a security breach that leaves the network open as security threats are also encrypted. Without an SSL / TLS inspection, all other security functions of the appliance are useless.

4. Outdated security information

Cybercriminals have been focusing on SMEs for some time. According to a 2017 study by Small Business Trends, 43 percent of attacks are directed against this group. In addition, according to "Cybercrime Bundeslagebild 2019" published by the Federal Criminal Police Office, 312.000 new malware variants appeared on the Internet every day. While service providers use cloud-based gateways to protect their customers with the latest threat definitions, updates on local UTM devices are only carried out irregularly. This allows new malware to penetrate the company network unnoticed.

5. Weaknesses of "All-in-One"

Even if UTMs are often offered as “All-in-One” (AiO) appliances, they do not contain all the security layers that are necessary to protect SMEs. Depending on the manufacturer, a typical "AiO" UTM appliance lacks integrated e-mail security, anti-virus endpoint protection, patch management or identity and password management. These are all important components to ensure a seamless, multi-layered security strategy for an SME.

6. Hidden additional costs

The performance of an appliance requires continuous investment in order to maintain the level of protection. For example, in order to provide additional bandwidth for a larger volume of data, an upgrade to a higher model usually has to be carried out. The integration of branch offices requires either an additional appliance or an expensive MPLS (Multiprotocol Label Switching) connection so that the data traffic is routed through the head office. There are also personnel costs: The operation of a UTM device requires an IT expert on site, who sets it up and carries out regular firmware and software upgrades. Companies that save here risk life-threatening damage due to security gaps.

Solution from the cloud

Today's cybersecurity needs to be faster, smarter, and more reliable than ever. UTM appliances can no longer withstand the requirements triggered by complex threats, flexible working models and cloud infrastructures. A solution is a software-defined security model (SDSec) from the cloud, which combines a security web gateway and a security platform. As a result, the security gaps in the security appliances are addressed efficiently and effectively. The gateway blocks suspicious downloads and websites known to be malicious and the cloud platform includes security services for end devices, networks and data backup. This includes a central console for device and policy management, reporting functions and real-time security warnings. With an SDSec, SMEs receive a cloud-based solution from a single source that is always up to date with the latest patch status and offers security at the level of large companies - either in-house or as a managed service.

Find out more at Avast.com

 


About Avast

Avast (LSE: AVST), a FTSE 100 company, is a leading global provider of digital security and privacy products. Avast has over 400 million online users and offers products under the Avast and AVG brands that protect people from threats from the Internet and the evolving IoT threat landscape. The company's threat detection network is one of the most advanced in the world, using technologies like machine learning and artificial intelligence to detect and stop threats in real time. Avast's digital security products for mobile, PC or Mac have been top-rated and certified by VB100, AV-Comparatives, AV-Test, SE Labs and other test institutes.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more