Are Security Appliances fit for Purpose in a Decentralized Workplace?

Security appliances have been traditionally considered one of the most effective forms of perimeter security.
Today, security appliances feature amongst the most riskiest enterprise devices and are a preferred method for threat actors to infiltrate a business.
In researching the Common Vulnerabilities and Exposures database or CISA's Known Exploited Vulnerabilities catalog, one immediately discovers a deeply concerning picture, particularly for security appliance manufacturers.
Given how many organizations are understaffed and under-resourced, it's a Herculean task to stay abreast of these vulnerabilities, forget about continuously patching them.
Due to the volume of these potential exploits, security teams have to consciously leave their organizations unduly exposed.
Traditional security architecture is based on a castle and moat concept where security hardware such as firewalls, VPNs, intrusion prevention systems etc.
While operating systems like Windows and macOS have come a long way in making their software updates easy to deploy, the same can't be said for patching or updating hardware appliances.
Security appliances usually serve as critical infrastructure - organizations can scarcely afford to take security offline and security teams must always avoid causing any business disruption.
This is why security hardware such as routers, firewalls, secure web gateways, and IPS appliances are typically updated on weekends or holidays.
Patching security hardware is never seamless; it can lead to unexpected behavior of appliances, lengthy and frustrating troubleshooting, loss of productivity and increased risk of an incident.
Organizations don't just need awareness of these faults, they need to update and patch appliances before hackers can take advantage.
With the computing environment becoming more decentralized and remote working taking center stage, organizations seek security that allows centralized control and visibility over users, applications, devices, data and resources; one that can also support multiple locations.
This is where single-vendor SASE may offer advantages over traditional security hardware.
Convergence: Instead of having multiple security appliances that are siloed and disconnected from each other, single-vendor SASE converges multiple security functions such as a firewall, secure web gateway, IPS, zero-trust network access and data loss prevention, into a single whole.
Patching: In a traditional environment, security teams have to manually identify, physically connect and test multiple security appliances at diverse locations.
In a cloud environment, patching is centrally managed, eliminating the need to patch box-by-box.
SASE can provide CVE mitigation for zero-day vulnerabilities via virtual patching.
Cloud: Most security appliances are designed for on-prem, perimeter security.
This Band-Aid approach offers limited flexibility and makes security more complex than it needs to be.
Many organizations will transition from legacy and disjointed security hardware to cloud-native security technologies, taking note of government directives that have imposed mandates on appliance-based security due to their misconfigurations and rising risk of unpatched vulnerabilities.


This Cyber News was published on www.securityweek.com. Publication date: Tue, 02 Jan 2024 19:43:05 +0000


Cyber News related to Are Security Appliances fit for Purpose in a Decentralized Workplace?

Are Security Appliances fit for Purpose in a Decentralized Workplace? - Security appliances have been traditionally considered one of the most effective forms of perimeter security. Today, security appliances feature amongst the most riskiest enterprise devices and are a preferred method for threat actors to infiltrate a ...
2 years ago Securityweek.com
25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
6 months ago Cybersecuritynews.com
The Power of Purpose - Today we released our annual Purpose Report, which reflects and celebrates the past year's work towards Powering an Inclusive Future for All-the progress we've made against our goals, and the people and lives we've touched. The report explores the ...
2 years ago Feedpress.me
Exploring the Phenomenal Rise of Ethereum as a Digital Asset - In this exploration, we delve into the multifaceted layers of Ethereum's meteoric rise, dissecting the technological breakthroughs, the vibrant community dynamics, and the pivotal moments that have propelled it to the forefront of the digital asset ...
1 year ago Hackread.com Inception
Partnering for Purpose: A Year in Focus - This is typically the time of year when we take time to reflect, and looking back, 2023 has been a wonderful year of fulfillment and purpose for me, specifically in my role leading Partnering for Purpose. A global Cisco initiative, Partnering for ...
2 years ago Feedpress.me
CISA Orders Ivanti VPN Appliances Disconnected: What to Do - The United States Cybersecurity and Infrastructure Security Agency has given Federal Civilian Executive Branch agencies 48 hours to rip out all Ivanti appliances in use on federal networks, over concerns that multiple threat actors are actively ...
1 year ago Darkreading.com
Taking Back the Web with Decentralization: 2023 in Review - In the past few years, there's been an accelerating swing back toward decentralization. Users are fed up with the concentration of power, and the prevalence of privacy and free expression violations, and many users are fleeing to smaller, ...
2 years ago Eff.org
Embracing a Passwordless Future: Navigating the Shift to Decentralized Security in 2024 - The world has swiftly embraced digitalization, empowering individuals to accomplish over 90% of their daily tasks through mobile apps or web interfaces. Activities like bill payments, flight bookings, health consultations, and even exploring one's ...
2 years ago Cysecurity.news
Zoom Workplace Apps Vulnerability Let Attackers Inject Malicious Script - The vulnerabilities, detailed in Zoom Security Bulletin ZSB-25013, affect a wide range of Zoom Workplace applications, including desktop apps for Windows, macOS, and Linux and mobile apps for iOS and Android. Multiple null pointer dereference ...
9 months ago Cybersecuritynews.com CVE-2025-30670
CVE-2017-12244 - A vulnerability in the detection engine parsing of IPv6 packets for Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause high CPU utilization or to cause a denial of service (DoS) condition because the Snort ...
6 years ago
Home AI Revolution: From Assistants to Smart Appliances - In a world where technology is advancing faster than ever, home AI has become an integral part of everyday life. Anachronistically speaking, a time-traveler from even just a few decades ago would be amazed at how far we've come in terms of home ...
2 years ago Securityzap.com Meow
Strengthening Security Posture Through People-First Engagement - Regular, small doses of security education help combat the “forgetting curve,” a theory developed by Hermann Ebbinghaus that suggests people forget 75% of newly learned information within a couple of days. These statistics underscore a critical ...
1 year ago Informationsecuritybuzz.com
Exploring Blockchain's Revolutionary Impact on E-Commerce - The trend of choosing online shopping over traditional in-store visits is on the rise, with e-commerce transactions dominating the digital landscape. Blockchain technology emerges as a solution to bolster the security of online transactions. ...
2 years ago Cysecurity.news Inception
CVE-2016-6368 - A vulnerability in the detection engine parsing of Pragmatic General Multicast (PGM) protocol packets for Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to the Snort ...
8 years ago
CVE-2018-0233 - A vulnerability in the Secure Sockets Layer (SSL) packet reassembly functionality of the detection engine in Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause the detection engine to consume excessive system ...
6 years ago
Alert: Chinese Threat Actors Exploit Barracuda Zero-Day Flaw - In recent developments, Barracuda, a prominent network and email cybersecurity firm, has been grappling with a zero-day vulnerability. In this blog, we'll look into the Barracuda zero-day flaw, exploring its intricacies and the consequential impact ...
2 years ago Securityboulevard.com CVE-2023-7101 CVE-2023-2868
Barracuda fixes new ESG zero-day exploited by Chinese hackers - Network and email security firm Barracuda says it remotely patched all active Email Security Gateway appliances on December 21 against a zero-day bug exploited by UNC4841 Chinese hackers. The company deployed a second wave of security updates a day ...
2 years ago Bleepingcomputer.com CVE-2023-7102 CVE-2023-7101
Ivanti: VPN appliances vulnerable if pushing configs after mitigation - Ivanti warned admins to stop pushing new device configurations to appliances after applying mitigations because this will leave them vulnerable to ongoing attacks exploiting two zero-day vulnerabilities. While the company didn't provide additional ...
1 year ago Bleepingcomputer.com CVE-2023-46805 CVE-2024-21887
Ivanti: Patch new Connect Secure auth bypass bug immediately - Today, Ivanti warned of a new authentication bypass vulnerability impacting Connect Secure, Policy Secure, and ZTA gateways, urging admins to secure their appliances immediately. The flaw is due to an XXE weakness in the gateways' SAML component that ...
1 year ago Bleepingcomputer.com CVE-2023-46805 CVE-2024-21887
CVE-2015-2351 - Multiple cross-site scripting (XSS) vulnerabilities in Alkacon OpenCms 9.5.1 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) homelink parameter to ...
7 years ago
Ivanti patches Connect Secure zero-day exploited since mid-March - Ivanti has released security updates to patch a critical Connect Secure remote code execution vulnerability exploited by a China-linked espionage actor to deploy malware since at least mid-March 2025. While Ivanti has yet to disclose more details ...
9 months ago Bleepingcomputer.com CVE-2025-22457
10 Best Security Service Edge Solutions - Security Service Edge is an idea in cybersecurity that shows how network security has changed over time. With a focus on customized solutions, Security Service Edge Solutions leverages its expertise in multiple programming languages, frameworks, and ...
1 year ago Cybersecuritynews.com
Five business use cases for evaluating Azure Virtual WAN security solutions - To help organizations who are evaluating security solutions to protect their Virtual WAN deployments, this article considers five business use cases and explains how Check Point enhances and complements Azure security with its best-of-breed, ...
1 year ago Blog.checkpoint.com
The Cyber Risk Nightmare and Financial Risk Disaster of Using Personal Messaging Apps in The Workplace - This practice, which is unfortunately still widespread in an environment of relentless cyberattacks, is fraught with major cyber and financial risk. Unsecure messaging apps are a gateway for cybercriminals to access, expose and exploit an ...
1 year ago Cyberdefensemagazine.com
CVE-2021-3450 - The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly ...
2 years ago