While the worldwide public cloud services market is expected to grow 18 percent in 2017, the infrastructure as a service (IaaS) segment is projected to grow the fastest - 36.8 percent in 2017. According to Gartner, that’s being driven by businesses migrating their infrastructure to the Cloud and compute-intensive workloads.
However, legacy cybersecurity stacks often hinder this transition for many organizations. Visibility and forensic capabilities are prerequisites for security teams to effectively protect their organizations. Getting visibility and forensics for threats in traditional on-premises enterprise environments is already a challenge. That becomes far more difficult - almost impossible - for organizations that continue to rely on legacy approaches as their workloads move to the Cloud.
For example, legacy approaches are architected as appliances, which run their own proprietary operating systems. Attempting to port these appliances to the Cloud is not DevOps friendly as they can’t be maintained using standard approaches for the Cloud. Another issue is with trying to achieve high availability by porting these legacy appliance architectures to the Cloud. This will require multiple layers of instances of these appliances and associated load balances. What accompanies this additional complexity is reduced performance and uptime and increased latency. These are just a couple of the many drawbacks when trying to use legacy approaches to secure cloud workloads.
The problem is only made worse if you consider another complication. Most large organizations haven’t fully migrated all workloads to the Cloud. Any solution that is being considered for providing visibility and forensic capabilities about threats in cloud workloads must also provide the same for these hybrid environments. Security teams must work across many different vendor solutions to protect their organizations. Adding more complexity into a job function where there is zero percent unemployment and where frustrated analysts find it easy to jump ship is not the way to keep your competitive advantage. In fact, as alternative solutions are being considered, security teams must also ask how many other security products can be replaced by the new solution.
A security-as-a-utility model will enable organizations to more rapidly realize the benefits of moving their workloads to the Cloud, even as they maintain hybrid environments during the transition. The benefits are many. It can provide visibility, forensic capabilities and security analytics at scale. It can enable a DevOps-friendly approach to security. It can help avoid solution sprawl.
On Wednesday, August 23 at 10 AM Pacific / 1 PM Eastern, ProtectWise is hosting the “7 Security Requirements to Accelerate Cloud Adoption” webinar. Attend it to learn about the the other challenges that hinder cloud adoption and the key criteria to evaluate as you consider security solutions to help in your transition to the Cloud.
Next blog post