Once upon a time, if your PCs sat behind a firewall, were running an AV client, and your email was scanned before it got to you, that was all you needed to stay relatively safe. All three of those security layers remain part of the top seven steps necessary to protect yourself from data breaches, but there is another critical layer required for all company managed PCs (Windows or Mac) and any device accessing the Internet from one of your locations–a Secure Internet Gateway (SIG).
A secure Internet gateway delivers protection by preventing managed devices from accessing potentially dangerous sites and/or code. The intent is to prevent users from getting infected by malicious internet traffic, suspicious websites, or malware. A SIG can also play a role in monitoring and managing compliance of the organization’s IT related policies and regulations.
Every one of JPMerc’s clients now utilizes key applications and stores company intellectual property in the cloud. In addition, more and more work is performed somewhere other than a traditional office. A SIG can help organizations seamlessly transition to a world of cloud computing where the Internet becomes the de facto corporate network.
A SIG works by managing requests to the Internet and preventing the completion of requests that could pose a risk to the organization.
In the office, all requests to the Internet, including BYODs (which by definition are not managed by the organization), go through the SIG.
Company-managed devices get an installed agent, so they are protected regardless of location.
In short, while a SIG makes the office safer, it keeps every company-managed device safer regardless of its location.
There is no such thing as set-it-and-forget-it when it comes to security. SIGs must be properly configured, monitored, and audited to be effective. This is a job for a well-trained, security-conscious IT team. Insist on periodic reports to your management team to ensure your business is properly protected.
JPMerc & Co. offers low cost, no obligation IT assessments. We’ll identify your current IT risks and offer cost-effective solutions. The report and the knowledge gained is yours to keep with zero obligation and no hard-sell. To learn more, connect with us!