Bizety: Research & Consulting

4th Gen CyberSecurity CDN Architecture

Chase spends $200M annually on cyber security, and yet they got blind sided with a security breach. If Chase spends $1B annually on cyber security, would that prevent a breach? Probably not, as Chase is already one of the most cyber fortified companies in the world today. Target and Home Depot deployed the best cyber security solutions money could buy, and they suffered the same fate as Chase. The problem is bound to get much worse, as the “Internet of Things” starts taking off. It’s a cat and mouse game between the good guys and the adversaries, and by the looks of it, the adversaries are winning all day long.

New Radical Approach to Cyber Security   

What is needed is a new approach to cyber security that is radical, revolutionary, far-reaching, and ahead of its time. Is there a singular, overarching layer of security that can mitigate advanced malware, zero day exploits, DDoS attacks, and phising scams 99% of the time? The answer is Yes, and its possible with the CyberSecurity CDN of 2020. Akamai, EdgeCast, CloudFlare and Incapsula have taken the first step in the right direction. Now they need to take an additional hundred steps forward to get to the point where they can absorb every single type of attack, from anywhere in the world, down to the packet level. It’s complex, but feasible. First let visualize the solution, than discuss it in bullet points down below.

 4th Gen CyberSecurity CDN of 2020
4th Gen CyberSecurity CDN
4th Gen CyberSecurity CDN

Solution to Cyber Security Attacks  

In order to accomplish the state of cyber security enlightenment, CyberSecurity CDNs must transform themselves into a completely new company, and develop things we haven’t seen before. Here are a few brainstorming ideas.

The theme of the 4th Gen CDN is “end-to-end” packet visibility and control. The CyberSecurity CDN will force all requests/response to go through its POPs, where they will be filtered, cleaned up, and tracked in real time, from origin to destination, from one country to the next. Thus, if an adversary decides to install RAM scraper malware at the POS system of Walmart, and is successful, it won’t really matter, because the server in the network that the hacker controls, can only push out traffic through the CDN, where the CDN will clean it up, whether its port 80, 443, or whatever. In a way, its like have a dozen Palo Alto’s and FireEyes in each CDN POP, in POPs located around the world, with a feature that tracks and controls packets.

Exit mobile version