A new platform brings new risks

October 20, 2017 Emily Davidson

Considered the “third platform” by IDC, dynamic datacenters are answering the call to support gargantuan user demands for applications that support social, mobile, analytics and the cloud.

Examples of these infrastructures include Hilton Hotels, the Office of Personnel Management and Ashley Madison – all of which have suffered high-profile data breaches.

For the modern business, a platform that is scalable, reliable and fast is a must. However, to keep out the modern hacker, protection must extend deep into the network perimeter.

With such high profile hacks, companies are taking notice, and investing. IDC predicts that 40% of security revenues will become tied to predictive capabilities, and protecting the mobile cloud will account for 35% of enterprise security products sold.

As companies take advantage of the operational and economic benefits of virtualization and the cloud, it’s critical to secure their virtualized data centers, cloud deployments, and hybrid environments effectively.

Any neglect to one aspect of security, and you leave gaps that open the door to web threats and the serious (and very public) data breaches mentioned above. Furthermore, to meet data privacy and compliance regulations, you may have to demonstrate that you have the appropriate security, regardless of your computing environment.

Whether you are operating in the data center, or the cloud—you must be able to manage a broad set of security capabilities across multiple environments, ideally from a single platform.

When shopping for a provider, look for a company that leads with the value of server security for physical, virtual, and cloud environments. Instead of managing many point solutions, you can shop from a single vendor to get a complete set of security capabilities with automated management that dramatically reduce both risk and cost.

First, decide what you need to protect. If you’re protecting a data center, you want to consider a solution optimized for VMware virtual environments, including the latest developments such as NSX, as well as virtual desktop infrastructure (VDI).

A virtualization-aware security solution is critical to address the risks posed by the third platform.

For the modern datacenter, a security platform that extends deep beyond the network perimeter will shield unpatched vulnerabilities from attack when hackers get past the perimeter, and stop them at the server. It reduces exposure to these attacks using a host firewall - Blocking attacks and limiting communication to only the ports and protocols necessary (with the ability to log and audit traffic for compliance reporting at the instance level).

To protect the cloud, application and data security needs must be met, while maintaining compliance.

This translates to ensuring server security for cloud instances while simultaneously managing security on virtual and physical servers in the data center. When choosing a solution, you want something simple, with a workload aware policy, and effective administration and reporting tools to give you an up-to-date view of the entire environment.

A solution with a workload-aware policy and integrated administrative console will give you a single, up-to-date view of the security posture for your entire cloud environment, reducing time and resource costs by making security management more efficient. Automated vulnerability shielding prevents the disruption of emergency patching.

Lastly, you should look for a solution that integrates with:

  • CS P platforms and developer tools like AWS, Microsoft Azure, and VMware vCloud Air
  • Cloud deployment tools like Chef, Puppet, RightScale, OpsWorks, Salt, etc

At the end of the day, you (or your IT team) must provide the most complete set of security capabilities available, like Trend Micro’s Cloud and Data Center Security solution for security beyond the network perimeter, to stop attackers even if they breach your firewall.

Previous Article
George's Letter: Welcome to Issue 3
George's Letter: Welcome to Issue 3

Next Article
Simplifying the vendor jumble
Simplifying the vendor jumble