By extending security to the Internet cloud, denial-of-service attacks, for example, never reach the gateway.
“We would take what an MSSP does and mesh that with our infrastructure so that the service provider and carrier becomes one,” said AT&T CISO Ed Amoroso.
CISOs, meanwhile, will still have network responsibilities like setting policy and aligning policy with an enterprise business model. They’ll be alleviated of costly signature updates and license renewals.
“Carriers and ISPs will provides these services for you,” Gartner research director John Pescatore said.
Gartner research director Greg Young identified seven selection criteria IT managers should use when purchasing an IPS.
“I could see some [savings] with these services, but they’d have to be secure by definition,” said Neil Delaney, IT infrastructure manager with NJ Manufacturers of New Jersey. “The SLA with the carrier would have to say no DoS attacks, no scanning, no RPC viruses getting through. And let’s say I push all this to the cloud, does that mean I don’t have a firewall on my side anymore?”
In the meantime, Gartner cautions that it may be more crucial than ever to establish secure zones between IT systems and the Internet.
Attacks are maturing beyond broad-based worms, and now target specific applications and business processes putting additional perimeter pressure on managers to deploy tools like next-generation firewalls that combine IPS and a Web application firewall, in addition to traditional IDS and IPS defenses. “You’re not going to see mass signatures that protect anymore,” Pescatore said.
Next generation firewalls that do deep-packet inspections from vendors like Juniper Networks, Check Point and Fortinet employ a heuristics engine and allow all network traffic and behavior, except those which policy says it must block.
http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1095562,00.html