Case Studies

Businesses Move Security to the Cloud

Companies find cost savings and efficiencies through software as a service solutions.
Businesses Move Security to the Cloud
Credit: iStockphoto/Thinkstock

An IT staff of two full-time people managing more than 100 users needs to take advantage of every cloud-based service that can help reduce costs and make the company more productive. That’s why The Sak Brand Group uses Panda Security’s Panda Cloud Office Protection.

“We run a lean operation,” says Roger Micone, systems administrator for the San Francisco–based handbag maker. “The Panda cloud product lets us protect our workstations while reducing overhead. It also lets us set up whitelists fairly easily.”

Micone says the company decided that it made more sense to have a cloud provider handle a simple, repetitive task such as upgrading antivirus software. “With all the threats that are out there today, it’s unrealistic to think that any antivirus software can do everything,” Micone says. “Panda does a great job with antivirus and malware protection.”


The percentage of organizations surveyed that are at least discussing cloud services

SOURCE: “Avoiding the Hidden Costs of the Cloud: Global Results” (Symantec, 2013)

Phil Hochmuth, an analyst for IDC, says organizations such as The Sak Brand Group realize savings from running a cloud security service across hundreds or thousands of machines.

“There’s no physical patching or maintaining, and all the security gets managed centrally,” Hochmuth says. “In many ways, there’s more of an assurance that the staff are actually using the security features. Especially as organizations move to the bring-your-own-device model, these types of cloud-based security products make an unmanageable situation manageable.”

Mixed Use

Subscribing to a cloud security service requires a major leap of faith for any IT department. Banesco USA, a local community bank with six branches in South Florida, one in Puerto Rico and about 200 corporate users, decided to take a hybrid approach to cloud security.

Luis Rivas, the company’s network security officer, says because Banesco USA had great success with Check Point tools, management had confidence in the vendor when it opted for the security company’s Cloud Managed Security Service for intrusion prevention.

“With all the threats out there and the potential for financial data to be compromised, most financial organizations need a 24/7 cloud service like this today,” Rivas says.

Rivas says if the intrusion prevention system sees something suspicious, it opens a ticket and emails him. Conversely, if he sees something suspicious as he’s reviewing log data on the Check Point portal, he can launch a ticket that notifies the vendor’s staff that there may be an issue.

“What this does is add another layer of eyes and expertise to our team so that the security people at Check Point can be involved 24/7,” Rivas says. “The idea is for this to be a collaborative process.”

Sign up for our e-newsletter

About the Author

Steve Zurier

Steve has more than 30 years of journalism and publishing experience, most of the last 20 of which were spent covering technology. He has covered networking and telecommunications in corporate computing, government and small business environments.

Follow him on Google+ and Twitter:


Heartbleed: What Should Your... |
One of the biggest security vulnerabilities has almost every user and every industry...
Why Businesses Need a Next-G... |
Devices investigate patterns that could indicate malicious activity.
Review: HP TippingPoint S105... |
Next-generation firewall can easily replace a stand-alone intrusion prevention system....


The New Backup Utility Proce... |
Just getting used to the Windows 8 workflow? Prepare for a change.
How to Perform Traditional W... |
With previous versions going unused, Microsoft radically reimagined the backup utility in...
5 Easy Ways to Build a Bette... |
While large enterprises have the resources of an entire IT department behind them, these...

Infrastructure Optimization

Businesses Must Step Careful... |
Slow and steady wins the race as businesses migrate IT operations to service providers,...
Why Cloud Security Is More E... |
Cloud protection services enable companies to keep up with security threats while...
Ensure Uptime Is in Your Dat... |
Power and cooling solutions support disaster recovery and create cost savings and...


Securing the Internet of Thi... |
As excitement around the connected-device future grows, technology vendors seek ways to...
How to Maximize WAN Bandwidt... |
Understand six common problems that plague wide area networks — and how to address them.
Linksys Makes a Comeback in... |
The networking vendor introduced several new Smart Switch products at Interop this week.

Mobile & Wireless

Mobility: A Foundational Pie... |
Other technologies rely on mobile computing, which has the power to change lives, Lextech...
Now that Office for iPad Is... |
After waiting awhile for Microsoft’s productivity suite to arrive, professionals who use...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.

Hardware & Software

Review: HP TippingPoint S105... |
Next-generation firewall can easily replace a stand-alone intrusion prevention system....
New Challenges in Software M... |
IT trends such as cloud, virtualization and BYOD pose serious hurdles for software...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.