Skip to content

How secure is your network?

Are your remote workers connecting securely back into the network? Is your traffic encrypted between branch offices and how secure is your connection to the cloud?

Effective security relies on multiple layers of defence at both the edge and core of the network, and along the network path. The challenge is that, as data travels over disparate systems and networks, the network perimeter no longer exists and security measures must adapt.

In our extensive guide to modern network security, we’ve mapped out:

  • Where an enterprises most common security touchpoints are
  • What these touchpoints represent as a threat to your security
  • What you can do to future-proof your network
Q3-v4-2

“One of the biggest challenges with security today is that there are so many aspects to consider, with a growing complex technology environment where no simple solution exists. Organisations are required to carefully consider how technology runs the business and how data is used, processed and transmitted so that layers of controls can be applied to protect at every step of the journey over the network.

"Regardless of whether you’re connecting to branch offices, the public cloud or linking up remote workers, a well architected security solution needs to factor in every link in the chain. Only by taking this approach can you deliver a secure network.”

Ashish Surti, Chief Security Officer, Colt

1. Your Data Centres

Physical security is just as important as logical, although it can often be underestimated

Data centre virtualisation has created an environment where it’s now more complicated for data owners to assure themselves of protection - interexchange carriers, multiple cloud hosts, and least-cost-routing algorithms add to the touch points in data transportation where security risks can be higher. Meanwhile the move to edge computing will add more locations where security measures need to be applied.

While traffic between Data centres ought to be on a private, dedicated and robust network, it’s also important to consider who can access your data, where it’s stored and its safety in case of emergency.

How do you create secure data centre connectivity?

Data Centre

2. Your Customer Sites

Maintaining perimeter security has become a major challenge and firewalls can be an unwitting security risk

Connecting to and communicating with customer sites over public internet presents a number of security risks. From Distributed Denial of Service (DDoS) attacks, which have massively increased in size and scale, to data tampering and threat exploitation, deploying a range of security measures is essential to protect both you and your customers.

Virtualisation of the firewall enables fast provisioning, unlimited scalability and eliminates your need to maintain a physical network firewall.

Alongside firewalls, Network Traffic Monitoring and profiling systems can help spot malicious traffic early, along with Intrusion Protection Systems (IPS) to keep risks at bay.

How do firewall services protect our customers?

Customer

3. Your Branch Offices

IPSec is not designed to support the modern cloud environment, where latency and bandwidth requirements are critical

Sharing data between offices can feel more secure than communicating with the wider world, but there are several security aspects that must be considered, regardless of whether sites are connected via public internet or over a private network.

IPSec has been a legacy method of providing network protection but is not designed to support the modern cloud environment where latency and bandwidth requirements are critical. Therefore, the best practice is encrypt the data-in-motion, not just between offices but also between sites and data centres.

How do you securely encrypt traffic on your network?

Branch

4. Your Remote Workers

All VPNs are not the same, which is why it’s important to make sure that your VPN includes end-to-end security

Sharing data between offices can feel more secure than communicating with the wider world, but there are several security aspects that must be considered, regardless of whether sites are connected via public internet or over a private network.

IPSec has been a legacy method of providing network protection but is not designed to support the modern cloud environment where latency and bandwidth requirements are critical. Therefore, the best practice is encrypt the data-in-motion, not just between offices but also between sites and data centres.

How does a VPN protect your network's security end to end?

Branch

5. Public cloud and internet

All VPNs are not the same, which is why it’s important to make sure that your VPN includes end-to-end security

With more and more applications hosted on public clouds, your connection needs to be secure and to protect from external threats. DDoS attacks have impacted some of the biggest companies in the world and are increasing in scale and frequency – a report from Neustar found that attacks sized 100Gbps and higher increased by 967% in Q1 2019 compared to Q1 2018. The largest attack measured 587Gbps - more than 70% larger than the biggest attack in the same period in 2018.

Key to effective mitigation is the ability to identify and block attack traffic while allowing non-attack traffic to flow through to its intended destination. Whether it’s a high-volume flood attack designed to exhaust bandwidth capacity or a targeted attack looking to bring down a website, identifying malicious traffic is the first step in managing a DDoS attack on your business.

How can a business protect their network from DDoS attacks?

Branch

What can you do about your network's vulnerabilities?

In a world where everything is connected, cybersecurity must be comprehensive, adaptive and collaborative.

Colt’s Cybersecurity portfolio offers services to monitor, detect and protect your data and IT infrastructure from cyber threats and security incidents. Our next generation firewall services are fully managed by cybersecurity experts to keep your network safe, DDoS protection is deployed at multiple strategic locations throughout Colt’s global network and our network encryption services secures data as it’s transferred across the network.

Download our Cybersecurity network pack to gain insight into how forward-thinking businesses are using emerging technologies to secure their networks for the future.