Does it Make Sense to Trust your Email Hosting Provider’s Security?

With more and more organizations adopting cloud services such as Gmail Mail and Microsoft Office 365, migrating their mailbox hosting to the cloud, a common dilemma CISOs face is whether to put all the eggs in one basket”, and trust the hosting provider to protect the mailboxes as well. Most organizational cloud email providers are suited with basic security features, but what about when we REALLY need to make sure our emails are completely safe?
Despite being market-leading players, common cloud service providers seem to fail to secure mailboxes efficiently. Since hosting providers are a main target for hackers, they Lack the ability to provide complementary features which will guarantee Full Encryption and total protection against outside threats along with accessibility from within the organization. Here are some important considerations to keep in mind when keeping our organization’s email safe: 
  1. Common providers allow the option for hackers to easily obtain a testing” mailbox. through it, they will attempt to run malware against the protection engines until eventually it succeeds to breach through into your personal inbox. From there the way to millions of inboxes is very short.
  1. Large email providers are the primary ideal target for hackers. Hackers have more motivation creating malware which is relevant for and capable of infecting as many mailboxes as possible. Breaching through large providers defense would be the most rewarding, thus the preferred target for hackers. In other words phishing Hosting Providers is simply fishing where the fish are!
  1. Hosting providers offer various services for their clients. While getting hands on an email account and the contacts it contains may be a nice trophy, Credential Harvesting is most rewarding when it grants access not only to the mailbox, but also to other corporate resources and assets associated with the same Hosting or Cloud Provider.
  1. With so many subscribers, false positives may turn to be catastrophic. Large providers tend to tweak security filters very carefully trying to avoid false-positives. This could potentially come at the cost of security preferring false negatives (and passing potentially malicious content),  over false positives, thus exposing the organization to more security risks.
  1. Enterprise Email Hosting requires great capability in terms of managing parallel sessions of users withing the platform. When a huge number of subscribers ask to sandbox attachments at the same time, Performance may become a serious issue . In such cases, security scanning may take a lot of time, sometimes even up to an hour.
  1. Large providers tend to offer slow and complex interface logging and alerts which normally requires additional subscriptions for extra information and further auditing. This is a big problem when IT resources are limited, or when IT is flooded with various products and interfaces accessed on a regular basis.
  1. Another great value missing among large providers, is the ennoblement to provide insight into both the attack and the attacker to make it easier to prioritize alerts and respond to threats.
  1. Large Hosting Providers do not consistently investigate security incidents. Thus, they don’t offer the same security standard as Intelligence security providers do. It is essential for enterprises to posses a security service which is provided by an Intelligence company, fueled by knowledge of security experts, daily investigating the business world’s breaches and hacks.
No protection is a 100% bulletproof in the cyber world, however the more layers we add to security, the lower the chances of malicious content passing through. 3rd party security services offer great value for enterprises, both when it comes to operational cost savings and in adding another layer of security. Normally, using feeds from various vendors, these providers are capable of spotting known threats at much higher rates, and identifying unknown threats by sandboxing in an isolated environment.
About the author:
Internet Binat provides communication and information security services to the business sector. Our services include internet access, information security, communication infrastructure administration, WAN networks and server hosting in Israel and abroad.

Why CSO must consider moving security to the cloud?

In today’s reality, Chief Security Officer, or CSO, is quite a frustrating job. You are always in a position to defend organization resources from ever growing threats, preventing the next attack or data leak and Identifying theft or a Virus which may encrypt corporate data.

Dealing with such challenges is even more complex when users and apps move more and more outside traditional security and perimeters, with the ever growing number of security devices, countless types of software integrated in data centers, limited IT staff… and with the capital investments that all of the above incorporate you get the toughness of CSOs daily challenge.

This reality is forcing CSOs to reconsider alternative solutions in order to accommodate to these challenges. Corporate IT must now face a crossroad in which the traditional way of thinking is less and less relevant, and a new approach to Security in Cloud-oriented environments is required in order to face the new challenges within the corporate resources and capabilities.

Implementing Corporate Cloud Security Solutions

Corporate IT is responsible for the safety of corporation data. It cannot ignore even the slightest potential breach and must be able to achieve the following goals with a comprehensive solution for cloud security, which shall include the following features:

  1. Perform at scale with limited or no IT human resources.
  2. Protect corporate resources residing both in the organization perimeter and the cloud.
  3. Enforce security 24/7 and alert regarding security issues around the clock.
  4. Protect the corporation periodically with up-to-date security updates.
  5. Easy to maintain and most importantly obviate the need for security boxes updates and replacements.
  6. Effortlessly Scalable.
  7. Congest security solutions into a single pane of glass.
  8. Protect corporate users no matter their location or the type of device they use.
  9. Achieve high performance for internal applications both on-perm or in cloud.

When planning business security strategies, all considerations are to be observed. It is crucial taking into account the ability to efficiently maintain and operate the strategy, in a way which would achieve the set goals on a day to day basis, with the IT resources available.


Internet Binat provides communication and information security services to the business sector. Our services include internet access, information security, communication infrastructure administration, WAN networks and server hosting in Israel and abroad.

What does the new Chinese VPN ban mean to corporate IT?

What is VPN and why it is used?

Many organizations that have remote sites or/and mobile users in China, uses IPSEC-VPN or SSL-VPN over the internet. This way of connectivity is very common way to connect mobile users or/and remote sites in a secure way to the corporate resources, located at the main office/data center or as a cloud services.

What’s the reason behind Chinese authorities to ban VPN use?

The reason for this step, is to prevent Chinese citizens to access unauthorized access to websites outside of China, using VPN technology.

This new ban is about to be implemented starting February 2018 but some of our customers who works from China, indicates that they already started facing issues with their VPN from the remote sites and mobile users.

What are the other methods that can be used to fix this issue?

Traditionally this problem was solved by using an MPLS connectivity to connect a specific remote site to the corporate network.

However there are some issues with this kind of solution:

  1. Time to implement .This kind of solution takes around 6 to 1 2 month to implement (depend on the remote site location).
  2. No flexibility. It take long time to upgrade the speed or change the connectivity end location.
  3. 0 agility and elasticity.
  4. Doesn’t support cloud connectivity.
  5. No redundancy

Is there a way to solve the VPN issues and gain all the benefits of using the flexibility the internet is giving us in China?

The specific situation where old technology (like the one I described) doesn’t give answer to the new challenges require organizations to adopt new technologies that can Handel all the requirements with ease .

Since 2009, Aryaka networks built a ground breaking technology based on a private network, that allows companies to have a stable and redundant secured connectivity with traffic optimization and acceleration worldwide as a service module that also provide a bullet proof service that solves the problem with the Chinese VPN ban instantly and without compromising the corporate security policy.

Want to hear more about our services? Please contact us and we will be happy to provide with  more details.

Executing Security at Scale

Raise your hand if you’re not using part or all of these technologies:

    • NGFW
    • URL Filter
    • Antivirus
    • Sandbox
    • VPN

…Pretty much all of us, right? Now raise your hand if you are decrypting SSL/TLS outbound.

SSL/TLS has skyrocketed in the past few years and will continue to grow. If you aren’t decrypting SSL/TLS you have to ask yourself, what good is my NGFW, Antivirus, etc if I am completely blind to this traffic? The answer is simple, it isn’t good, in fact it’s terrible. You are bound by the constraints of legacy security, source/destination and ports. It’s like locking a screen door. It will keep the flies out but it won’t stop any real threats.

Certainly all of your legacy security vendors will tell you that they can decrypt SSL/TLS but it comes at a significant cost to you.

So what does that mean to you? Time to refresh all of your gear but this time you need to buy bigger boxes.  Just go to the business, request a huge Capex, ask for professional services, training, and new head count. Piece of cake right?

That is the old way of thinking and for many of us, that was our reality for the past decade. The business is changing how we do security and we must align to these objectives:

Fast Response Time

  • Higher productivity
  • Prioritize business apps
  • Empower users to use cloud apps

Reduced Risk

  • Secure all users, on all devices, everywhere
  • Consistent policy and protection
  • Always up-to-date

IT Simplification

  • Consolidate point products and simply IT
  • Cloud-enabled network
  • Rapid deployment

Traditional security doesn’t meet today’s business needs and demands.  ask yourself, what level of effort and cost are you willing to accept to do this yourself with legacy security appliances? Is this something that you can do in the next 6, 12, 18, or 24 months?

The best solution is getting an holistic and transparent service from cloud security providers. Maybe it’s time to look at cloud security company that has already done the heavy lifting and proven themselves with over 16 million users.

If you want to learn more on a better way to handle security, please contact us