Tech News

Tech Business News

  • Home
  • Technology
  • Business
  • News
    • Technology News
    • Local Tech News
    • World Tech News
    • General News
    • News Stories
  • Media Releases
    • Tech Media Releases
    • General Media Releases
  • Advertisers
    • Advertiser Content
    • Promoted Content
    • Sponsored Whitepapers
    • Advertising Options
  • Cyber
  • Reports
  • People
  • Science
  • Articles
    • Opinion
    • Digital Marketing
    • Gaming
    • Guest Publishers
  • About
    • Tech Business News
    • News Contributions -Submit
    • Journalist Application
    • Contact Us
Reading: Why uptime and performance are key to cloud network security
Share
Font ResizerAa
Tech Business NewsTech Business News
  • Home
  • Technology News
  • Business News
  • News Stories
  • General News
  • World News
  • Media Releases
Search
  • News
    • Technology News
    • Business News
    • Local News
    • News Stories
    • General News
    • World News
    • Global News
  • Media Releases
    • Tech Media Releases
    • General Press
  • Categories
    • Crypto News
    • Cyber
    • Digital Marketing
    • Education
    • Gadgets
    • Technology
    • Guest Publishers
    • IT Security
    • People In Technology
    • Reports
    • Science
    • Software
    • Stock Market
  • Promoted Content
    • Advertisers
    • Promoted
    • Sponsored Whitepapers
  • Contact & About
    • Contact Information
    • About Tech Business News
    • News Contributions & Submissions
Follow US
© 2022 Tech Business News- Australian Technology News. All Rights Reserved.
Tech Business News > General > Why uptime and performance are key to cloud network security
General

Why uptime and performance are key to cloud network security

Tech Writer
Last updated: November 8, 2022 11:13 pm
Tech Writer
Share
SHARE

Imagine you just bought a brand new car featuring all the latest bells and whistles. You’re itching to take advantage of speed camera detection and try out the heated seat backs and armrests.

Unfortunately, when you try to turn your car on, nothing happens. If the vehicle doesn’t work, what’s the point of having it and all its exciting features? Ideally, you want something that provides the latest bells and whistles and performs as promised whenever you want. 

This is equally true for cloud security solutions. 

Over the past several weeks, the importance of uptime and performance for cloud security solutions has been on full display. During that time, my company received calls from other SASE vendors’ customers as they wrestle with their existing security solutions’ downtimes.

Unfortunately, one competitor’s product recently went down for 14 hours, while another suffered from six outages in 15 days. Such events not only expose organisations to increased risks but can disrupt the normal flow of operations and even grind business continuity to a halt.

Typically, such service outages find their origins in the underlying infrastructure on which a vendor’s products are built. Most SASE providers have opted to create and maintain their own networks of private data centres to power their solutions.

However, this approach essentially amounts to an attempt to match the level of service provided by public cloud companies that have dedicated entire businesses to it.

As we observe these outages, a common question is raised: how has just one company maintained its industry-leading uptime of 99.99% since 2014?

The company’s platform is built-in — and delivered through — the public cloud, meaning it can focus on driving innovation with its security technologies rather than managing a fleet of data centres.

The cloud already has virtually infinite redundancy, storage and compute power, so why try to reinvent it? True cloud security should be delivered from the cloud itself.

Polyscale architecture

There is a broad range of cloud security services on the market with varying functionality. Some operate inline for real-time security. Others operate out-of-band for visibility and control. In either case, the most crucial buying criterion is service uptime and performance.

Some cloud security services may be sold as network services with a fixed capacity priced at an annual fee per Gbps. Such pricing is suitable for network security services such as firewalls or secure web gateway proxies.

Other cloud security services such as email security, data loss prevention (DLP) or cloud access security broker (CASB) may be sold at an annual fee per user. When there is a mismatch between the technology stack and the business model, uptime and performance are compromised.

Legacy security products are designed for single-tenant usage operating at fixed throughput loads, for example, 1GB/sec firewall or secure web gateway proxy.

When these products are offered as cloud services, vendors simply deploy these devices in a data centre and charge customers based on the throughput. Pricing and architecture are aligned, and if a customer overloads the network, congestion ensues naturally.

The customer may elect to purchase additional capacity. Other customers are not affected. However, when the legacy architecture is used for services such as email security, DLP or CASB, uptime and performance suffers. Such services are licensed on a per-user basis, and the customer expects performance and uptime independent of the time of day, user mobility or usage trends.

For example, a customer with 10,000 users expects the same performance and uptime even if half the users fly to a remote offsite meeting. In practice, such a temporary migration of users would overload the remote data centre that has a fixed capacity, bringing it down for all users and possibly for all other customers.

Security services licensed on a per-user basis, such as email security, DLP and CASB, require a broad range of technology components such as proxy, scanning nodes, hadoop clusters, mail servers, databases, search indexes and so forth. Furthermore, such services must scan multiple applications and protocols simultaneously.

In a polyscale architecture, each component is stateless, multi-tenant and can handle any application. When the load rises in a component — for instance, exceeding 50% over a five-minute interval — the component clones itself. For example, when a large customer has an offsite, the remote data centre grows towards the load profile of that customer automatically.

In contrast, vendors with legacy network architectures have struggled to deliver performance and uptime.

Previous Article juniper-networks-australia Juniper Networks Australia posts modest profits in 2020
Next Article Flight sim technology Flight Simulator Technology
Leave a Comment

Leave a Reply Cancel reply

You must be logged in to post a comment.

Cloud security News

Tech Articles

Artificial Intelligence vs. Synthetic Intelligence

The Intelligence Divide: Artificial vs. Synthetic Intelligence

The difference between Artificial Intelligence vs. Synthetic Intelligence is that…

November 6, 2025
Australia’s business Automation Surge: Racing To Digitise Workflows

Australia’s Automation Surge: Why Businesses Are Racing To Digitise Workflows

Australia’s push toward automation is prompting businesses to quickly digitise…

November 12, 2025
Data Privacy 2025

The Data Privacy Paradox: Why Your Information Has Never Been More Vulnerable—Or More Valuable

The Data Privacy Paradox is clear: by the end of…

November 5, 2025

Recent News

China $83bn Gold discovery
General

China’s $83 Billion Gold Discovery: A Seismic Shift In Global Power

6 Min Read
Uber Riders Left Frustrated - Cancellation fees
General

Uber Riders Left Frustrated By Cancellation Fees And Poor Customer Service

3 Min Read
vic gov rental website upgrade
General

VIC Government $9m Website Upgrade To Cut Red Tape For Renters

3 Min Read
Covid-19 brain
GeneralScience

COVID-19 can affect the brain. New clues hint at how

12 Min Read
Tech News

Tech Business News

Stay up to date with the latest technology & business news trends from Australia and the around the world.

Technology News reports and whitepaper publishing services are available along with media and advertising options

Our Australian technology news includes People, Business, Science, World News, Local News, Guest publishers, IT News & Tech News Australia | Tech News was established in 2019

About

About Us 
Contact Us 
Privacy Policy
Copyright Policy
Terms & Conditions

January, 19, 2026

Contact

Tech Business News
Melbourne, Australia
Werribee 3030
Phone: +61 431401041

Hours : Monday to Friday, 9am 530-pm.

Tech News

 

© Copyright Tech Business News 

Latest Australian Tech News – 2024

Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?