{"id":99748,"date":"2019-07-29T06:00:19","date_gmt":"2019-07-29T13:00:19","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=99748"},"modified":"2019-07-26T15:23:38","modified_gmt":"2019-07-26T22:23:38","slug":"cloud-delivered-security-benefits-govt-agencies","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2019\/07\/cloud-delivered-security-benefits-govt-agencies\/","title":{"rendered":"Advantages of Cloud-Delivered Security for U.S. Govt Agencies"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Last year, <\/span><span style=\"font-weight: 400;\">three-quarters of the U.S. federal government\u2019s IT budget<\/span><span style=\"font-weight: 400;\"> were spent on supporting and maintaining legacy systems. Combined with the Cloud Smart strategy, agencies have more reasons than ever to consider cloud alternatives to on-premise applications, services and storage.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cybersecurity is one cloud service that can make a big impact. Like other services from the cloud, cloud-delivered security scales quickly and easily and simplifies deployment and management. These are all attractive traits for departments struggling under the weight of their IT infrastructure.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But cloud-delivered security has other advantages. Zero-day malware prevention is a great way to start with security from the cloud since you can reap immediate dividends. First, many agency departments do not have zero-day threat prevention protecting all of their assets, such as desktops, servers and cloud workloads. Rather than adding new products to your on-premise infrastructure, begin as you mean to continue: in the cloud.\u00a0<\/span><\/p>\n<p><b>Reduce risk from constantly increasing cyberthreats<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Second, unknown or zero-day malware and ransomware is increasing in volume, velocity and variety. We\u2019re still seeing a year-over-year increase in the amount of malware targeting governments. We are also seeing new threats that are successfully infiltrating governments and enterprises. As an example, cryptojacking is a relatively new malware area that increased a <\/span><i><span style=\"font-weight: 400;\">thousand percent<\/span><\/i><span style=\"font-weight: 400;\"> in governments over the last year, according to Palo Alto Networks AutoFocus contextual threat intelligence service. Hackers use cryptomining malware to infiltrate servers and endpoints, and then use their computing power to mine cryptocurrency for profit. Governments, with their huge amount of computing resources, are a popular target. Once hackers start mining, server energy consumption goes up and lifecycle goes down, threatening citizen services\u00a0<\/span><span style=\"font-weight: 400;\">as well as <\/span><span style=\"font-weight: 400;\">critical infrastructure<\/span><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><b>Prevent data breaches<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Cryptomining malware is a small but growing threat, but it\u2019s also the \u201ccanary in the coal mine.\u201d If a hacker can penetrate your servers, it\u2019s a strong signal that your servers can be compromised to steal data. Cyberespionage is still the primary motive behind public administration data breaches and most threat actors use more than one type of malware to gain access and quickly exfiltrate data. Zero-day malware prevention in the cloud scales quickly and automatically to deal with spikes in malware activity.\u00a0<\/span><\/p>\n<p><b>Gain the wisdom of the cloud crowd<\/b><\/p>\n<p><span style=\"font-weight: 400;\">While scalability and operational efficiency are excellent advantages, the real benefit of cloud-delivered malware prevention is the fact that it can deliver better threat intelligence. With a cloud repository, your agency has the potential to leverage the wisdom of a global threat sharing community. Thousands of new pieces of malware are created every day around the world, and they travel quickly, targeting governments before they can adapt their defenses. Not only can you receive threat intelligence on malware seen in other government departments, you can benefit \u2013 in seconds \u2013 from other governments or industries around the world reporting the malware they have seen. And since the cloud is everywhere, its threat intelligence can even reach the computers of employees who are traveling outside the agency network.\u00a0<\/span><\/p>\n<p><b>Automatic protections <\/b><span style=\"font-weight: 400;\">\u2013<\/span><b> the gift that keeps on giving<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Of course, your SOC can\u2019t possibly detect, let alone build protections against, multiple pieces of malware every day. That\u2019s where automation comes in. In terms of the cyberattack lifecycle, it\u2019s best to use automation in the early stages of a cyberattack, preventing malware and exploits from getting further along the lifecycle. Cloud-delivered malware prevention can speedily detonate malware, analyze it, and develop and deliver protections against it in minutes. That frees up time for the valuable resources in your SOC to focus on hunting persistent threats.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Preventing breaches is the goal of every agency. If you want to learn more about how Palo Alto Networks helps agencies automatically detect and prevent malware, visit our <\/span><a href=\"https:\/\/paloaltonetworks.com\/security-for\/government\/wildfire-us-gov.html\"><span style=\"font-weight: 400;\">WildFire: U.S. Government page<\/span><\/a><span style=\"font-weight: 400;\">, a FedRAMP authorized, cloud-delivered service.\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last year, three-quarters of the U.S. federal government\u2019s IT budget were spent on supporting and maintaining legacy systems. Combined with the Cloud Smart strategy, agencies have more reasons than ever to consider &hellip;<\/p>\n","protected":false},"author":660,"featured_media":100540,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[484,6769],"tags":[6640,123,6755,69],"coauthors":[6815],"class_list":["post-99748","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-government","category-public-sector","tag-fedramp","tag-government2","tag-products-and-services","tag-wildfire"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/07\/image.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/99748","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/660"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=99748"}],"version-history":[{"count":7,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/99748\/revisions"}],"predecessor-version":[{"id":100509,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/99748\/revisions\/100509"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/100540"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=99748"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=99748"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=99748"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=99748"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}