Perspectives Summary – EVERYTHING YOU Said

Home   »   Cloud   »   Perspectives Summary – EVERYTHING YOU Said

On Thursday, June 25, Tendency Micro hosted our Perspectives 2-hour virtual event. Because the program progressed, we questioned our attendees, made up of +5000 worldwide registrants, two key queries. This website analyzes those answers.

Very first, what is your present technique for securing the cloud?

Rely completely upon native cloud platform security capabilities (AWS, Azure, Google…) 33%

Increase single-purpose security features (workload protection, container protection…) 13%

Add on security system with multiple security abilities for reduced complexity 54%

This total result affirms IDC analyst Frank Dickson’s observation that a lot of cloud customers will reap the benefits of a suite providing a variety of security features covering several cloud environments. For the 15% to 20% of organizations that depend on one cloud service provider, investing in a security solution through that vendor may provide sufficient coverage. The search for point products (which might be best-of-breed, aswell) introduces extra complexity across several cloud platforms, that may obscure problems, confuse cybersecurity business and analysts customers, increase expenses, and reduce performance.  The extensive suite strategy compliments many companies’ hybrid, multi-cloud technique.

Second, which is multiple choice, nowadays how are you currently enabling secure digital transformation within the cloud?

This implies that cloud users are available to many available solutions for improving cloud security. The adoption design follows traditional on-premise safety deployment models. Probably the most cited solution commonly, Network Protection/Cloud IPS, recognizes that conversation with anything in the cloud takes a trustworthy network. It is a very acquainted technique, dating back to in the on-premise atmosphere to the launch of firewalls in the first 1990s from suppliers like CheckPoint and backed by educational research as within Cheswick and Bellovin’s Firewalls and Web Safety (Addison Wesley, 1994).

The frequency of information exposure because of misconfigured cloud instances drives Cloud Security Posture Administration surely, certainly along with the simple deployment of tools such as Cloud One conformity.

The newness of containers in the production environment probably explains the relatively lower deployment of container security today.

The good thing is that organizations don’t need to deploy and manage a variety of point products addressing one problem using one environment. The suite strategy simplifies today’s jobs and reality the business for tomorrow’s challenges.

Looking ahead, future development in industrial IoT plus increasing deployments of 5G-based public plus non-public networks shall generate further innovations, improving the breadth of the suite method of securing hybrid, multi-cloud conditions.

What do you consider? I want to know @WilliamMalikTM.

%d bloggers like this: