SMEs need one thing above all: simple, secure and
A brief look at the key data and function is necessary:
Zscaler:
Ubiquiti:
Hetzner:
What is immediately apparent: Hetzner and Ubiquiti only have limited security functions. In fact, this is precisely the reason why we propose these components for SMEs:
SMEs do not need these enterprise functions! Most SMEs we encounter already lack an existing security baseline. Instead of spending money on enterprise functionalities that these SMEs can't use anyway, we create a secure, micro-segmented baseline with maximum cost-benefit factor
The concept is modularly expandable with a WAF (e.g. Cloudflare), an MDR (e.g. fully managed with 24/7 service from the manufacturer), a SIEM (also from CrowdStrike, as most of the data comes from the endpoint anyway), a PAM for privileged access (e.g. Keeper), a mail server, a security management system (e.g. a security management system) and a security management system (e.g. a security management system).e.g. Keeper), a mail security gateway and awareness training from Proofpoint or Mimecast, an additional NAC that can be integrated with Ubiquiti (802.1.x) or an extended backup for more fine granularity such as Acronis and Rubrik.
No other architecture offers more added value for the francs invested
Hetzner is used as a cloud solution for IaaS and PaaS. The resources are easy to deploy, are located in Europe and are extremely affordable. We use the built-in firewall for East-West communication. Servers can be grouped and segmented from each other on the application side. The built-in backup module is also activated as standard, allowing resources to be restored at the touch of a button.
Zscaler is used as a Zero Trust Network solution via an agent on the clients in order to obtain micro-segmented access to the resources in the Hetzner cloud. App connectors are deployed for this purpose. The cloud does not need a single inbound port open for this approach and can remain completely inaccessible from the outside. Zscaler also filters user access to web applications, as this is one of the biggest attack vectors.
Finally, Ubiquiti is used to provide the entire local network stack at the sites. We are talking about layer 2 with switching and WiFi and layer 3 with a built-in firewall and SD-WAN. If required, the gateways can be designed redundantly using HA clusters. The sites are networked via inexpensive FTTH (fiber) connections with optional provider SLA (we recommend Init7 for direct termination without an additional provider router) and 5G redundancy. Ultimately, the locations only need to segment simple network zones such as guest WiFi (for which we have developed our own captive portal with SMS authentication, see go-online.io), IoT, servers, internal clients and OT. All security and app access is via Zscaler, whereby the clients require no more than Internet access.