Matthew Gardiner

by Matthew Gardiner

Senior Product Marketing Manager

Posted Oct 18, 2017

The “Network Effect”

It is not exactly news that most security controls, particularly those that are traditionally thought of as network-centric ones (versus endpoint centric ones), are moving to the cloud.  Many think that this is occurring because of the massive economies-of-scale enabled by cloud providers’ multi-tenancy architectures, the shifting of hardware and software deployment, upgrading, and administration from the customer to the cloud provider, or the elimination of costly data center real estate and its associated operating costs for customer organizations.  Others think that the shift is due to the security staffing economies-of-scale that are inherent with cloud providers versus typical organizations. Of course, these are all important factors driving the move of security to the cloud, but these miss a key value sleeper, the network effect.

A key value of moving ones’ security controls to the cloud is the massive security centric network effect that can be more easily gleaned when one is simultaneously hosting security for tens-of-thousands of global organizations.  This security network effect shows up in two related ways.  Firstly, as attackers shift their tools and tactics, as they are continuously doing, cloud service providers that can effectively pull early warning data from their systems and combine it with a multitude of external intelligence sources, can very quickly detect the attackers’ new tactics and make content changes to better defend against them. Literally, the whole network of customers benefits from the discovery of a new attack type that even hits just one member of the network.

There is a second security network effect that can be leveraged by cloud security providers.  Detecting and blocking some new attacker tools and tactics can sometimes go beyond needing just changes to security content, they require new security functionality. Because the development and deployment of cloud services differ radically from traditional software or appliance-based development models – usually in the form of DevOps – cloud service providers can build and deploy new functionality with relative ease and speed. No need to wait for twice-yearly software releases.  And once the new functionality is available it can be made available to every customer, globally, immediately. Another form of the security network effect of cloud security service providers in action!

Of course, being a cloud security service provider since our founding in 2003 gives Mimecast a great perch from which to leverage these network effects every day.  A recent example of the new feature network effect in action are the recently released new capabilities in our Target Threat Protection services.

 

Matthew Gardiner

by Matthew Gardiner

Senior Product Marketing Manager

Posted Oct 18, 2017

You may also like:

Cloud Archiving: Perception vs. Reality

Perception vs. Reality: Get the facts ab…

Perception vs. Reality: Get the facts about cloud archiving … Read More >

Margot Carmichael Lester

by Margot Carmichael Lester

Mimecast Contributing Writer

Posted Oct 06, 2017

Streamline Workflows with Cloud Archiving

Super-Charge Productivity & Efficien…

Super-Charge Productivity & Efficiency with Email Archiv… Read More >

Margot Carmichael Lester

by Margot Carmichael Lester

Mimecast Contributing Writer

Posted Oct 03, 2017

3 Tips for Expanding your Organization’s Advanced Security Strategy

With a leadership team in place and a s…

With a leadership team in place and a set of known and like… Read More >

Margot Carmichael Lester

by Margot Carmichael Lester

Mimecast Contributing Writer

Posted Sep 05, 2017