Skip to content
11:11 Systems
Rethink Connected
11:11 Systems11:11 Systems
  • Why 11:11
    • Submenu
      • Column 1
        • Cloud Console
          Cloud Console
          Compliance
          Compliance

      • Column 2
        • Global Regions
          Cloud Regions
          Catalyst
          Planning and Assessment

      • WHY CHOOSE 11:11
      • Overview
      • Leadership
      • News & Media
      •  
      • Careers
      • Technology Partners
      • Customer Stories
  • Products & Services
    • Products & Services
      • CLOUD
      • Cloud Overview
      • Public Cloud
      • Private Cloud
      • Object Storage
      • Cloud Labs
      • Colocation/Bare-Metal
      • BACKUP
      • Backup Overview
      • Veeam Backup
      • Microsoft 365 Backup
      • Managed Backup for Cohesity
      • DISASTER RECOVERY
      • DRaaS Overview
      • DRaaS for Veeam
      • DRaaS for Zerto
      • DRaaS for Azure
      • Autopilot
      • SECURITY
      • Security Overview
      • Continuous Risk Scanning
      • Managed SIEM
      • Managed EDR
      • Managed Firewall
      • CONNECTIVITY
      • Connectivity Overview
      • SD-WAN
      • Multi-Cloud Connect
      • Managed IP
  • Solutions
    • Solutions Submenu
      • INDUSTRY
      • Education
      • Financial
      • Government
      • Healthcare
  • Partners
    • Partners Submenu
      • Overview
      • Become a Partner
      • Partner Portals
  • Resources
    • Resources Submenu
      • Events
      • Webinars
      • News & Media
      • White Papers
      • Podcast
      • Data Sheets
      • Customer Stories
      • Innovation Blog
  • Support
    • Support Submenu
      • Contact Support
      • Product Documentation
      • API Documentation
Search:
  • Console Login
  • Contact
Header Right Menu
Free Trial
  • Why 11:11
    • Cloud Console
    • Compliance
    • Cloud Regions
    • Planning and Assessment
    • WHY CHOOSE 11:11
    • Overview
    • Leadership
    • News & Media
    • Careers
    • Technology Partners
    • Customer Stories
    • Blog
  • Products & Services
    • CLOUD
    • Cloud Overview
    • Public Cloud
    • Private Cloud
    • Object Storage
    • Cloud Labs
    • Colocation/Bare-Metal
    • BACKUP
    • Backup Overview
    • Veeam Backup
    • Microsoft 365 Backup
    • Managed Backup for Cohesity
    • DISASTER RECOVERY
    • DRaaS Overview
    • DRaaS for Veeam
    • DRaaS for Zerto
    • DRaaS for Azure
    • Autopilot
    • SECURITY
    • Security Overview
    • Continuous Risk Scanning
    • Managed SIEM
    • Managed EDR
    • Managed Firewall
    • CLOUD CONNECTIVITY
    • Connectivity Overview
    • SD-WAN
    • Multi Cloud Connect
    • Managed IP
  • Solutions
    • INDUSTRY
    • Education
    • Financial
    • Government
    • Healthcare
    • Column 2
  • Partners
    • Overview
    • Become a Partner
    • Partner Portals
  • Resources
    • Events
    • Webinars
    • News & Media
    • Whitepapers
    • Podcast
    • Datasheets
    • Customer Stories
    • Innovation Blog
  • Support
    • Contact Support
    • Success Center
    • API Documentation
  • Contact
  • Console Login
  • Free Trial
Tags: Cloud ServicesDisaster Recovery
Author: Brian Knudtson
Date: June 13, 2019

Your Security Could Be Better in the Cloud

Editor’s Note: As of January 2022, iland is now 11:11 Systems, a managed infrastructure solutions provider at the forefront of cloud, connectivity, and security. As a legacy iland.com blog post, this article likely contains information that is no longer relevant. For the most up-to-date product information and resources, or if you have further questions, please refer to the 11:11 Systems Success Center or contact us directly.

Protecting an IT environment is a non-stop game of whack-a-mole where the board continuously gets larger and the moles get faster and smaller. Two recent vulnerabilities show how quickly a mature and widely distributed software package can turn into a major security hole. First, Microsoft announced CVE-2019-0708, a flaw in Remote Desktop Services that allows an attacker to run arbitrary code without authenticating. Not long after, CVE-2019-10149 revealed a similar issue in the Exim mail transfer software. Fortunately, both had patches available before exploits were seen in the wild. However, both were widely distributed pieces of software that contained the flaw through many iterations, including versions that are no longer officially supported.

Major vulnerabilities like these get the attention they deserve. They are major holes that affect millions of internet-connect systems, and customers should resolve these issues immediately. However, there are plenty of other vulnerabilities out there that could cause a business all sorts of trouble. Many software vulnerabilities are small or not widespread enough to lead to broad organizational awareness and immediate remediation but could still lead to a wide-open door or toe-hold into the larger IT environment. Simple misconfigurations or outdated configurations can leave systems exposed or vulnerable. There are lots of ways an IT infrastructure can have vulnerabilities that can leave systems exposed and potentially go unnoticed for years.

These small issues are often overlooked and overshadowed by news of major vulnerabilities and high-impact security issues like ransomware. Unfortunately, most businesses have IT staff that are busy and don’t have the spare cycles to investigate all the little issues. Even more unfortunate is that the hackers are busy too, and they only need one win in the battle to cause trouble.

Businesses need a robust security infrastructure to prevent, detect, and contain these threats. To provide the best experience in the cloud, 11:11 Systems has integrated many security products into the 11:11 Cloud platform to reduce the effort and cost associated with managing a secure infrastructure. Using tools from security companies like Tenable and TrendMicro, 11:11 provides vulnerability scanning and reporting, malware and virus scanning and reporting, log Inspection, stateful firewall functionality and reporting, file integrity monitoring and reporting, and intrusion detection and prevention directly within the 11:11 Cloud Console. All of these features are architected directly into the infrastructure and offered as standard features for all infrastructure as a service (IaaS) and disaster recovery as a service (DRaaS) customers.

IaaS customers have full-time access to these features. DRaaS customers utilize the same platform, so always-on virtual machines, such as domain controllers, virtual routers, and other “core” infrastructure items, are always protected. As soon as virtual machines are brought online during a DR execution or test, they will also be scanned and protected. Customers are able to run a complete security scan of their entire production environment as part of their DR test with no impact on production. With 11:11 Autopilot Managed Recovery for DRaaS, customers can work with 11:11 to define their entire DR plan and don’t need to spend time running and validating the test failover, saving even more of the IT staff’s valuable time. Once the test failover environment is up, customers can also utilize this environment for testing remediation of any vulnerabilities, so they are better prepared for the actual production remediation.

Whether working with a cloud-based production environment or a failed-over environment, scans can be conducted and reports generated that indicate what known vulnerabilities exist in the environment, what ports may be opened to the Internet, and any other suspicious behaviors that may exist in that environment. Full access to manage their own firewalls with stateful monitoring and reporting give customers the control and visibility they need to shutdown inadvertent ports that could potentially be future targets for new vulnerabilities.

A security-first infrastructure is a real value to customers. Some 11:11 customers have been known to scan their failed over environment during DR tests and find vulnerabilities that their on-premises security scans did not detect. Having this capability can make it easier to justify the cost of DRaaS, while relieving the impacts that an intensive security scan can have on production systems. It’s built into the 11:11 Cloud and Console and run by a dedicated staff focused full time on infrastructure security, so customers have no need to acquire and maintain all this functionality.

There is no single solution to defeating malicious players on the Internet. Backups, recovery plans, and strong defenses are all equally important to maintaining a business today. 11:11 is well regarded when it comes to IT data recovery, but can also help prevent the need to recover by providing a strong security posture for customers relying on 11:11 for either their production or recovery systems.

Categories: Cloud Backup, DRaaS, IaaS, SecurityBy Brian KnudtsonJune 13, 2019
Tags: Cloud ServicesDisaster Recovery

Author: Brian Knudtson

In his 20-year career, Brian has experienced many different perspectives of the IT industry. He has worked as a value-added reseller, vendor and service provider in roles in web development, system administration, post-sales deployment, pre-sales architecting, public cloud design and technical marketing. Currently, Brian is the Director of Cloud Market Intelligence at 11:11. He enjoys spending time with his wife and three kids. He is also heavily involved with the Destination Imagination program and has been a long-time member of the VMware community, notably starting the Omaha VMUG and putting on VMunderground at VMworld. You can find him online occasionally blogging at http://knudt.net/vblog and tweeting at @bknudtson.

Post navigation

PreviousPrevious post:What’s Your Plan for Handling Microsoft 365 Data LossNextNext post:Backup to the Cloud – Save time and experience peace of mind

Related Posts

Security
You Can’t Win: Learning to Live with Security Pessimism
March 13, 2023
Veeam 12
Veeam 12: Appropriate Direct to Object Storage Use Cases
February 15, 2023
Building a Championship-Caliber Data Security Strategy
February 15, 2023
Veeam 12
Veeam 12 Preview: Veeam Cloud Connect Backup vs. Object Storage
February 14, 2023
Veeam 12
Veeam 12 Preview: Multi-Factor Authentication
February 7, 2023
Preparing for 2023 with 11:11 Systems: IT Trends in Security, Cloud, and More
February 1, 2023
PRODUCTS & SERVICES
  • Cloud
  • Backup
  • Disaster Recovery
  • Managed Security
  • Connectivity Solutions
  • Compliance
COMPANY
  • Why 11:11
  • Customer Stories
  • Careers
  • Leadership
  • Technology Partners
  • News & Media
  • Contact Support
CLOUD REGIONS
  • North America
  • EMEA
  • APAC
CONNECT
  • LinkedIn
  • Twitter
  • Facebook
  • Youtube

© 2023 11:11 Systems Inc., All Rights Reserved | Privacy Notice

Go to Top
PRIVACY POLICY AND COOKIE CONSENT
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}
PRIVACY POLICY AND COOKIE CONSENT
To provide the best experiences, we use technologies like cookies to store and/or access device information that allows us to process data such as browsing behavior. Not consenting or withdrawing consent, may adversely affect certain features and functions. By clicking Accept, closing this message, or continuing to browse, you consent to these technologies and accept our Privacy Notice.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}