I D C T E C H N O L O G Y S P O T L I G H T
|
|
- Barbara Scott
- 5 years ago
- Views:
Transcription
1 I D C T E C H N O L O G Y S P O T L I G H T T h e E m e r g ence of the C loud Perimeter April 2015 Adapted from Cloud Security Gateways: The New Security Pipeline by Pete Lindstrom, IDC #WC Sponsored by Soha Systems Enterprise IT architectures have evolved dramatically from the days of on-premises monolithic and simple client/server architectures with centralized resources. These architectures, once easily protected by firewalls and other "layered" security solutions, have been replaced by highly distributed service-oriented architectures with components deployed in hybrid environments that include public and private clouds. This Technology Spotlight describes how the stresses of today's decentralized architectures require a new model that incorporates a cloud perimeter. Soha Systems, a new player in cybersecurity, has built a solution that delivers a match to the cloud perimeter model today. The Evolution of Technology Architectures When monolithic mainframes gave way to two- and three-tier client/server architectures, IT architectures began their journey toward the n-tier, n-peer highly distributed architectures that they are today. These abstracted, service-oriented frameworks provide much-needed flexibility and resilience, but the need for standardized communications and exposed application programming interfaces to support these benefits comes at a security cost. Attackers may also be able to subvert an expected application flow by probing these new attack points. The cloud crystallizes the nature of this problem, as IT architectures seek out their "manifest destiny" and expand the perimeter of enterprise applications to incorporate what is essentially the entire Internet. In addition, the dynamic capabilities of programming frameworks, virtualization, mashup architectures, and other technology separate users, data, and workloads from their "homes" on previously static networks and servers. How Security Evolves with IT IT has always been heavily reliant on network-based security solutions such as firewalls forming a secure perimeter around resources to keep information safe. This approach makes sense in a static, centralized IT environment. But today's enterprise computing is different, with users, applications, and information now dispersed across a heterogeneous architecture that incorporates traditional enterprise computing, mobile devices, and the cloud. Users may authenticate and then federate their access from local devices to distributed components; data is replicated, shared, and copied as it moves from structured to unstructured forms; and containerized and componentized workloads migrate and multiply to leverage the most efficient and effective available resources. IDC 1893
2 The Defense-in-Depth Security Model Defense in depth (DiD) is a well-regarded security strategy for technology risk management professionals. The metaphor typically used to describe it is the medieval castle, with multiple layers of security surrounding the key assets or resources that must be protected. The information security field has essentially extended the metaphor to include adding layer after layer of defense around some set of resources. The goal of DiD is to protect a set of resources from all sorts of attacks and compromises. The steps include: Collect all resources into a central location Create a perimeter around the resources Apply security controls in layers to protect all of the resources in the collection With today's distributed architectures, the application of DiD is challenged simply because there are no aggregated resources around which to "circle the wagons." While the underlying concept of applying various protection methods is sound, their application in layers must give way to more purpose-built capabilities. In the same way that warfare (and the more mundane notion of simple protection) has evolved with the onset of new tactics and capabilities, security models must evolve to meet the needs of new architectures and new threats. Challenges of DiD The British never saw the Americans coming in What was once a battleground with accepted practices of frontal assaults mowing down the opposition gave way to hit-and-run tactics during troop movements. In some respects, DiD is experiencing the same pain of recognizing that the (relatively) ordered set of assumptions around how security controls are applied layer by layer to protect resources is outdated: Resources are not in collections anymore. Today's distributed architectures, as described, have components strewn around the Internet. Even when applications are collocated and controlled, there are many other applications in other places. Components are becoming more distributed. The clear lesson from the past 30 years of computing is that decoupling or otherwise breaking up pieces of an application architecture provides flexible new capabilities. There is no reason to believe this won't continue for the foreseeable future. Risk levels may be different among assets and resources. Even if aggregation were possible, enterprises would be collecting sets of resources with varying levels of risk. While this approach would seem cost effective, the collected traffic and activity may introduce levels of noise that allow attacks to succeed. Zones of trust are extremely challenging to maintain. With varied levels of risk, the ability to create and maintain many trusted zones is reduced significantly. There is no "inside" or "outside." While the typical perimeter revolves around the concept of inside the perimeter as a trusted zone and outside the perimeter as an untrusted zone, the new architectures diminish that notion. Rapid evolution. Resources are not physical but virtual and, in many cases, software defined. Physical constraints that limited how fast an infrastructure could evolve no longer apply IDC
3 Protecting the "Last Mile" to Users and to Enterprise Applications As cloud architectures evolve to incorporate what were traditionally private datacenter resources, enterprises must consider how protection models change. As we've seen, users are logically migrating further away from enterprise applications in their mobile environment, and now private resources are also migrating away from the notional datacenter protected by the perimeter. The net effect is that there are more "hops" along the network path from user to application that may be intercepted or rerouted. There is less control over the network; so, for example, protecting resources through network isolation (perimeter firewall) becomes incredibly difficult if not impossible, and what's more, users are now on the wrong side of the perimeter that is, one of the benefits to firewalls was to open up ports and services for users inside the trusted zone that were made unavailable on the outside. Now, that paradigm has changed. The last mile on either side of a session may actually be a control point that must be traversed to get from user to application. One way to conceptualize this model is as a cloud perimeter. Objectives of the Cloud Perimeter The cloud perimeter operates somewhat like a traditional perimeter by separating traffic and resources from two sides but also slightly differently in that there are no bounds around the multiple "sides" that may take part in the interaction. It operates more simply as a transfer point or security enclave that manages all security throughout the environment and in any location. More specifically, the cloud perimeter has the following objectives: Connection termination point. The perimeter is the perfect place to terminate connections that originate in a potentially untrusted zone and connect with another potentially untrusted zone. This protection reduces the opportunity for bypass or other attack against a single session. Controlled set of management resources. With the minimal number of resources necessary to configure and otherwise manage, this last bastion environment protects the resources that are the highest risk because other security controls are built on top of them. Highly secure components. The bastion of hope needs to be protected as a bastion host, so each individual component must be given a high level of focus to ensure that it is as protected as possible. Strong communications security. The authenticity and integrity of inbound and outbound traffic must be guaranteed to the highest possible level. Single point of management. The intention of this simplified management scheme is to create a standardized, highly secure environment from which to provide management of all the controls deployed in the cloud and eventually incorporate all controls everywhere. Rapid deployment. The fluid deployment of resources, the locations of resources, and the connections between resources must be matched by the solution that secures them IDC 3
4 The Soha Systems Approach to the Cloud Perimeter Soha Systems is a new player in the burgeoning area of cloud security. Its approach mirrors the cloud perimeter model well, as it provides "cloudlets" to deploy at or near the enterprise resources that connect back to the Soha Cloud environment. Thus, the solution creates two separate connections that meet inside its perimeter. This architecture provides maximum, centralized control to an organization's administrators. Soha recognizes that organizations are building out multiple cloud environments, sometimes on the order of dozens or hundreds, and they all need to be managed. Its goal is to provide the best user experience in a cost-effective, lower-risk environment. Soha claims to provide multiple forms of controls around its central resources to create the highly secure environment necessary for command and control over the cloud. One useful aspect of the Soha architecture is the use of cloudlets alongside enterprise resources. Rather than providing "always on" listening services, the cloudlets are programmed to only make connections back to the Soha Cloud. The purpose of the Soha Cloud service, like that of cloud infrastructure itself, is quick deployment without the complexities of integrating appliances or changing network configuration. Thus, groups within an organization turning to the cloud for quick access to computing resources don't need to make tough trade-offs between security and agility. Challenges The architecture of the cloud perimeter is new and relies heavily on innovators that are willing to stake a claim to a new security model. The same is true for Soha. Cloud-adopting organizations challenged to deploy a traditional DiD model of security will more likely find this alternative compelling than traditional enterprises that will need some time to adjust. In addition, the need for a secure environment is paramount. Soha's cloud must be protected at all costs. Even though there is no way to guarantee security, Soha will need to show that the measures it takes to secure its infrastructure meet the requirements of its customers. To this end, Soha must be transparent with respect to third-party security validations, and the company is pursuing several industry security certifications. Conclusion Enterprises are at an inflection point with their approach to securing future IT architectures. The cloud perimeter is a new model that can address the shortcomings of the existing DiD model. As enterprises turn more to distributed, cloud-oriented architectures, they will need to adjust to the extent and level of complexity associated with traditional security models. Soha Systems provides a solution that matches well with the cloud perimeter model and addresses the needs of organizations moving quickly into the cloud. If the company addresses the challenges described in this paper and executes well on its strategy, it will be poised for success in the cloud security market. A B O U T T H I S P U B L I C A T I ON This publication was produced by IDC Custom Solutions. The opinion, analysis, and research results presented herein are drawn from more detailed research and analysis independently conducted and published by IDC, unless specific vendor sponsorship is noted. IDC Custom Solutions makes IDC content available in a wide range of formats for distribution by various companies. A license to distribute IDC content does not imply endorsement of or opinion about the licensee IDC
5 C O P Y R I G H T A N D R E S T R I C T I O N S Any IDC information or reference to IDC that is to be used in advertising, press releases, or promotional materials requires prior written approval from IDC. For permission requests, contact the IDC Custom Solutions information line at or gms@idc.com. Translation and/or localization of this document require an additional license from IDC. For more information on IDC, visit For more information on IDC Custom Solutions, visit Global Headquarters: 5 Speen Street Framingham, MA USA P F IDC 5
I D C M A R K E T S P O T L I G H T
I D C M A R K E T S P O T L I G H T E t h e r n e t F a brics: The Foundation of D a t a c e n t e r Netw o r k Au t o m a t i o n a n d B u s i n e s s Ag i l i t y January 2014 Adapted from Worldwide
More informationI D C T E C H N O L O G Y S P O T L I G H T
I D C T E C H N O L O G Y S P O T L I G H T P ow e ring Digital Transfor m a t i o n T h r ough the C l o u d - R e a d y E n t e r p rise September 2016 Adapted from Developing a Cloud Strategy for Digital
More informationWorkload Management Automation Drives Digital Business and Multicloud Expansion
I D C V E N D O R S P O T L I G H T Workload Management Automation Drives Digital Business and Multicloud Expansion November 2017 Adapted from Worldwide Workload Management Software Market Shares, 2016:
More informationRet h i n k i n g Security f o r V i r t u a l Envi r o n m e n t s
I D C T E C H N O L O G Y S P O T L I G H T Ret h i n k i n g Security f o r V i r t u a l Envi r o n m e n t s April 2012 Adapted from Market Analysis Perspective: Enterprise Virtualization Software Mainstream
More informationI D C T E C H N O L O G Y S P O T L I G H T. V i r t u a l and Cloud D a t a Center Management
I D C T E C H N O L O G Y S P O T L I G H T Orchestration S i m p l i f i es and Streamlines V i r t u a l and Cloud D a t a Center Management January 2013 Adapted from Systems Management Software Purchasing
More informationI D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: V i r t u a l ization and Cloud C h a n g e s E ve r yt h i n g
I D C T E C H N O L O G Y S P O T L I G H T S e r ve r S e c u rity: V i r t u a l ization and Cloud C h a n g e s E ve r yt h i n g January 2016 Adapted from Worldwide Endpoint Security Market Share,
More informationI D C T E C H N O L O G Y S P O T L I G H T. SD- W AN : M o m e n t u m B u i l d s as Early Ad o p t e r s
I D C T E C H N O L O G Y S P O T L I G H T SD- W AN : M o m e n t u m B u i l d s as Early Ad o p t e r s E x p e r ience Tangible Benefits January 2018 Adapted from Worldwide SD-WAN Survey Special Report
More informationWindows 7 Done Right: From Migration to Implementation
I D C E X E C U T I V E B R I E F Windows 7 Done Right: From Migration to Implementation Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com July 2010
More informationHybrid Cloud for the Enterprise
An IDC InfoBrief, Sponsored by VMware August 2018 Research by Gary Chen, Research Manager, Software Defined Compute, IDC There s no standard path to cloud Companies begin with cloud in many different ways.
More informationI D C C O U N T R Y B R I E F
I D C C O U N T R Y B R I E F THE DIGI T AL UNIVERSE IN 20 20: Big Da ta, Bigger Digi tal Shadow s, and Biggest Grow th in the Far Eas t China February 2013 By John Gantz, David Reinsel, and Richard Lee
More informationThe Emerging Role of a CDN in Facilitating Secure Cloud Deployments
White Paper The Emerging Role of a CDN in Facilitating Secure Cloud Deployments Sponsored by: Fastly Robert Ayoub August 2017 IDC OPINION The ongoing adoption of cloud services and the desire for anytime,
More informationGlobal Headquarters: 5 Speen Street Framingham, MA USA P F
WHITE PAPER Support for Virtualized Environments: HP's Critical Advantage Sponsored by: HP Matt Healey February 2011 Rob Brothers Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200
More informationDEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise
DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION
More informationVerizon Software Defined Perimeter (SDP).
Verizon Software Defined Perimeter (). 1 Introduction. For the past decade, perimeter security was built on a foundation of Firewall, network access control (NAC) and virtual private network (VPN) appliances.
More informationI D C T E C H N O L O G Y S P O T L I G H T
I D C T E C H N O L O G Y S P O T L I G H T T h e S h i f t t o I / O Optimization to Boost Virtual a n d P h ys i c a l S e r ve r P e r formance May 2013 Adapted from Scale-Out Meets Virtualization by
More informationI D C T E C H N O L O G Y S P O T L I G H T
I D C T E C H N O L O G Y S P O T L I G H T Object-Based Storage: Tr u e Ac c e l e r a t o r of D i g i t a l T ransformation April 2017 Sponsored by Dell EMC Enterprises worldwide are contending with
More informationOptimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach
White Paper Optimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach Sponsored by: Red Hat Tim Grieser January 2018 IN THIS WHITE PAPER This IDC White Paper discusses
More informationI D C T E C H N O L O G Y S P O T L I G H T
I D C T E C H N O L O G Y S P O T L I G H T P B B As T a p i n to Key D a t a P r o t e c t i o n Trends to D r i ve S t r o n g M a r k e t Grow t h October 2014 Adapted from Worldwide Data Protection
More informationI D C M A R K E T S P O T L I G H T
I D C M A R K E T S P O T L I G H T H yp e r c o n ve r g e d D a t a c e nter Infrastructure for t h e 3 r d Platform March 2016 Adapted from Worldwide Hyperconverged Systems 2015 2019 Forecast by Jed
More informationI D C T E C H N O L O G Y S P O T L I G H T. SD- W AN : A C r i t i c al S t e p in Transforming the N e tw o r k for the Cloud Era
I D C T E C H N O L O G Y S P O T L I G H T SD- W AN : A C r i t i c al S t e p in Transforming the N e tw o r k for the Cloud Era April 2017 Sponsored by GTT As the cloud era prevails in enterprise application
More informationW H I T E P A P E R U n l o c k i n g t h e P o w e r o f F l a s h w i t h t h e M C x - E n a b l e d N e x t - G e n e r a t i o n V N X
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R U n l o c k i n g t h e P o w e r o f F l a s h w i t h t h e M C x - E n a b
More informationPaper. Delivering Strong Security in a Hyperconverged Data Center Environment
Paper Delivering Strong Security in a Hyperconverged Data Center Environment Introduction A new trend is emerging in data center technology that could dramatically change the way enterprises manage and
More informationSecurity Fundamentals for your Privileged Account Security Deployment
Security Fundamentals for your Privileged Account Security Deployment February 2016 Copyright 1999-2016 CyberArk Software Ltd. All rights reserved. CAVSEC-PASSF-0216 Compromising privileged accounts is
More informationCloud Services. Infrastructure-as-a-Service
Cloud Services Infrastructure-as-a-Service Accelerate your IT and business transformation with our networkcentric, highly secure private and public cloud services - all backed-up by a 99.999% availability
More informationPROTECT WORKLOADS IN THE HYBRID CLOUD
PROTECT WORKLOADS IN THE HYBRID CLOUD SPOTLIGHTS Industry Aviation Use Case Protect workloads in the hybrid cloud for the safety and integrity of mission-critical applications and sensitive data across
More informationCyberArk Privileged Threat Analytics
CyberArk Privileged Threat Analytics Table of Contents The New Security Battleground: Inside Your Network 3 Privileged account security 3 Collect the right data 4 Detect critical threats 5 Alert on critical
More informationSecuring Your Amazon Web Services Virtual Networks
Securing Your Amazon Web Services s IPS security for public cloud deployments It s no surprise that public cloud infrastructure has experienced fast adoption. It is quick and easy to spin up a workload,
More informationSecuring Your Most Sensitive Data
Software-Defined Access Securing Your Most Sensitive Data Company Overview Digital Growth Means Digital Threats Digital technologies offer organizations unprecedented opportunities to innovate their way
More informationAutomated Infrastructure Management Powers Future-Ready Enterprise Clouds
WHITE PAPER Automated Infrastructure Management Powers Future-Ready Enterprise Clouds Sponsored by: Dell Mary Johnston Turner April 2016 Richard L. Villars IDC OPINION Future-ready enterprises continually
More informationGlobal Headquarters: 5 Speen Street Framingham, MA USA P F
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R E x t e n d i n g P C L i f e - C y c l e M a n a g e m e n t a n d C l i e n
More informationEnterprise Workloads, Infrastructure, and
Sponsored by: Cisco Digital transformation activities are refactoring application and data models across large and small enterprises. They also are driving significant investments in technology along with
More informationOptimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution
DATASHEET Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution Features & Benefits Best-in-class VPN and vadc solutions A single point of access for all
More informationI D C T E C H N O L O G Y S P O T L I G H T
I D C T E C H N O L O G Y S P O T L I G H T NB- I o T P r o vi d e s S o l u t i o n to Mobile Netw o r k Operators' IoT Needs April 2017 Adapted from Worldwide Internet of Things Installed Base by Connectivity
More informationSecuring Your Microsoft Azure Virtual Networks
Securing Your Microsoft Azure Virtual Networks IPS security for public cloud deployments It s no surprise that public cloud infrastructure has experienced fast adoption. It is quick and easy to spin up
More informationI D C T E C H N O L O G Y S P O T L I G H T
I D C T E C H N O L O G Y S P O T L I G H T I n t h e W or l d of Digital Transformation, Data Is N o t F l a t : A F r e s h Look at M u l t i V alue Database July 2017 Adapted from The Shifting Data
More informationBuild Your Zero Trust Security Strategy With Microsegmentation
Why Digital Businesses Need A Granular Network Segmentation Approach GET STARTED Overview The idea of a secure network perimeter is dead. As companies rapidly scale their digital capabilities to deliver
More informationWe make hybrid cloud deliver the business outcomes you require
We make hybrid cloud deliver the business outcomes you require Leverage the optimum venues for your applications and workloads and accelerate your transformation as a digital business The business outcomes
More informationSpecialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com
Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE s3security.com Security Professional Services S3 offers security services through its Security Professional Services (SPS) group, the security-consulting
More informationCato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief
Cato Cloud Software-defined and cloud-based secure enterprise network Solution Brief Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise Cato Networks: Software-defined and Cloud-based
More informationAWS Reference Design Document
AWS Reference Design Document Contents Overview... 1 Amazon Web Services (AWS), Public Cloud and the New Security Challenges... 1 Security at the Speed of DevOps... 2 Securing East-West and North-South
More informationIntegrated Access Management Solutions. Access Televentures
Integrated Access Management Solutions Access Televentures Table of Contents OVERCOMING THE AUTHENTICATION CHALLENGE... 2 1 EXECUTIVE SUMMARY... 2 2 Challenges to Providing Users Secure Access... 2 2.1
More informationBackup and Recovery: New Strategies Drive Disk-Based Solutions
I D C E X E C U T I V E B R I E F Backup and Recovery: New Strategies Drive Disk-Based Solutions Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com December
More informationGlobal Headquarters: 5 Speen Street Framingham, MA USA P F
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.935.4445 F.508.988.7881 www.idc-hi.com Agile IT for Accountable Care Success: E n d - to- End Cloud Solutions for H e a l thcare Providers
More informationHOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS
HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS Danielle M. Zeedick, Ed.D., CISM, CBCP Juniper Networks August 2016 Today s Objectives Goal Objectives To understand how holistic network
More informationNetworking for a smarter data center: Getting it right
IBM Global Technology Services October 2011 Networking for a smarter data center: Getting it right Planning the network needed for a dynamic infrastructure 2 Networking for a smarter data center: Getting
More informationZero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers
Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere How Okta enables a Zero Trust solution for our customers Okta Inc. 301 Brannan Street, Suite 300 San Francisco, CA 94107 info@okta.com
More informationSD-WAN Solution How to Make the Best Choice for Your Business
HOW-TO GUIDE Choosing the Right SD-WAN Solution How to Make the Best Choice for Your Business Section Title - 1 TABLE OF CONTENTS Introduction 3 CH. 1 Why Organizations are Choosing SD-WAN 4 CH. 2 What
More informationServer Workloads Forecasts and Analysis Study,
EXCERPT Server Workloads Forecasts and Analysis Study, 2005-2010 Matthew Eastwood Michelle Bailey IN THIS EXCERPT Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015
More informationGlobal Headquarters: 5 Speen Street Framingham, MA USA P F
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R T h e R e a l i t y o f D a t a P r o t e c t i o n a n d R e c o v e r y a n
More informationTotal Threat Protection. Whitepaper
Total Threat Protection Whitepaper Organizations Are Caught Between a Growing Threat Landscape and Resource Limitations Today s organizations continue to struggle with providing adequate protection in
More informationNetworking for a dynamic infrastructure: getting it right.
IBM Global Technology Services Networking for a dynamic infrastructure: getting it right. A guide for realizing the full potential of virtualization June 2009 Executive summary June 2009 Networking for
More informationPredictive Insight, Automation and Expertise Drive Added Value for Managed Services
Sponsored by: Cisco Services Author: Leslie Rosenberg December 2017 Predictive Insight, Automation and Expertise Drive Added Value for Managed Services IDC OPINION Competitive business leaders are challenging
More informationI D C T E C H N O L O G Y S P O T L I G H T. P r i m a r y F l a s h Market Evo l vi n g t o Next- Generation Ar c h i t e c t u r e s
I D C T E C H N O L O G Y S P O T L I G H T P r i m a r y F l a s h Market Evo l vi n g t o Next- Generation Ar c h i t e c t u r e s April 2017 Adapted from Worldwide All-Flash Array Market Shares, 3Q16:
More informationfirewalls perimeter firewall systems firewalls security gateways secure Internet gateways
Firewalls 1 Overview In old days, brick walls (called firewalls ) built between buildings to prevent fire spreading from building to another Today, when private network (i.e., intranet) connected to public
More informationa U n i f i e d D ata Storage, Management, and P r o t e c t i o n Platform
I D C T E C H N O L O G Y S P O T L I G H T T a k i n g D a t a Protection to the Next Le ve l w i t h a U n i f i e d D ata Storage, Management, and P r o t e c t i o n Platform June 2017 Adapted from
More informationSecure Technology Alliance Response: NIST IoT Security and Privacy Risk Considerations Questions
Secure Technology Alliance Response: NIST IoT Security and Privacy Risk Considerations Questions April 26, 2018 The Secure Technology Alliance IoT Security Council is pleased to submit our response to
More informationHybrid WAN Operations: Extend Network Monitoring Across SD-WAN and Legacy WAN Infrastructure
Hybrid WAN Operations: Extend Network Monitoring Across SD-WAN and Legacy WAN Infrastructure An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for SevOne May 2017 IT & DATA MANAGEMENT RESEARCH,
More informationRealities and Risks of Software-Defined Everything (SDx) John P. Morency Research Vice President
Realities and Risks of Software-Defined Everything (SDx) John P. Morency Research Vice President Key Issues 1. SDx Today s Reality 2. SDx Risks and How to Avoid Them 1 2017 Gartner, Inc. and/or its affiliates.
More informationVMAX3: Adaptable Enterprise Resiliency
ESG Solution Showcase VMAX3: Adaptable Enterprise Resiliency Date: August 2015 Author: Scott Sinclair, Analyst Abstract: As enterprises respond to the ever- present reality of rapid data growth, IT organizations
More informationI D C T E C H N O L O G Y S P O T L I G H T
I D C T E C H N O L O G Y S P O T L I G H T Making the Right Broadband Choice for Your Business October 2016 Adapted from Market Analysis Perspective: U.S. SMB Telecom, Broadband, and Video, 2016 by Matt
More informationWHITE PAPER MICRO-SEGMENTATION. illumio.com
MICRO-SEGMENTATION CONTENTS OVERVIEW Business drivers Current challenges with micro-segmentation The Illumio solution CURRENT APPROACHES TO MICRO-SEGMENTATION IP address rules VLANs Firewall zones Software-defined
More informationCommentary. EMC VPLEX Launches the Virtual Storage Era
Mesabi Group Commentary May 10, 2010 EMC VPLEX Launches the Virtual Storage Era Magicians make objects appear, disappear, or change appearance. EMC is doing the same thing with information and long-held
More informationSoftware-defined Storage by Veritas
ESG Technology Showcase Software-defined Storage by Veritas Date: August 2015 Author: Scott Sinclair, Analyst Abstract: The days of enterprise storage technology being predominantly constrained to specific
More informationSecurity for an age of zero trust
Security for an age of zero trust A Two-factor authentication: Security for an age of zero trust shift in the information security paradigm is well underway. In 2010, Forrester Research proposed the idea
More informationUsing the Network to Optimize a Virtualized Data Center
Using the Network to Optimize a Virtualized Data Center Contents Section I: Introduction The Rise of Virtual Computing. 1 Section II: The Role of the Network. 3 Section III: Network Requirements of the
More informationWHITEPAPER. How to secure your Post-perimeter world
How to secure your Post-perimeter world WHAT IS THE POST-PERIMETER WORLD? In an increasingly cloud and mobile focused world, there are three key realities enterprises must consider in order to move forward
More informationCisco Cloud Services Router 1000V and Amazon Web Services CASE STUDY
Cisco Cloud Services Router 1000V and Amazon Web Services CASE STUDY CASE STUDY ADOBE 2 About Adobe Adobe Systems provides digital media and marketing solutions to customers around the world including
More informationAUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs
AUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs WITH PALO ALTO NETWORKS AND REAN CLOUD 1 INTRODUCTION EXECUTIVE SUMMARY Organizations looking to provide developers with a free-range development environment
More informationSponsored by: VMware. Mary Johnston Turner May 2009
W H I T E P A P E R S u c c e s s f u l D a t a c e n t e r V i r t u a l i z a t i o n D e p e n d s o n C o m p r e h e n s i v e M a n a g e m e n t S o l u t i o n s Sponsored by: VMware Mary Johnston
More informationThe Benefits and Significance of Private Platform as a Service
I D C T E C H N O L O G Y S P O T L I G H T The Benefits and Significance of Private Platform as a Service June 2013 Adapted from The Pressures That Are Reshaping Platform as a Service by Stephen D. Hendrick,
More informationTop Priority for Hybrid IT
Make Your Enterprise Network a Top Priority for Hybrid IT Hybrid IT has become a vital element in enterprises digital transformation strategy. But putting in place a hybrid IT framework is one thing, and
More informationWHITEPAPER. Embracing Containers & Microservices for future-proof application modernization
WHITEPAPER Embracing Containers & Microservices for future-proof application modernization The need for application modernization: Legacy applications are typically based on a monolithic design, which
More informationReal-time Communications Security and SDN
Real-time Communications Security and SDN 2016 [Type here] Securing the new generation of communications applications, those delivering real-time services including voice, video and Instant Messaging,
More informationThe State of Cloud Monitoring
REPORT The State of Cloud Monitoring Survey Reveals Visibility is Key to Cloud Security and Performance INTRODUCTION Ixia, a Keysight business, commissioned Dimensional Research to conduct a survey measuring
More informationIdentity-Based Cyber Defense. March 2017
Identity-Based Cyber Defense March 2017 Attackers Continue to Have Success Current security products are necessary but not sufficient Assumption is you are or will be breached Focus on monitoring, detecting
More information21ST century enterprise. HCL Technologies Presents. Roadmap for Data Center Transformation
21ST century enterprise HCL Technologies Presents Roadmap for Data Center Transformation june 2016 21st Century Impact on Data Centers The rising wave of digitalization has changed the way IT impacts business.
More informationAssessing the Business Value of the Secured Datacenter
IDC SOLUTION BRIEF Assessing the Business Value of the Secured Datacenter Sponsored by: Cisco Pete Lindstrom Matthew Marden December 2014 Richard L. Villars OVERVIEW The world of IT is in the midst of
More informationCloud Security Gaps. Cloud-Native Security.
Cloud Security Gaps Cloud-Native Security www.aporeto.com Why Network Segmentation is Failing Your Cloud Application Security How to Achieve Effective Application Segmentation By now it s obvious to security-minded
More informationSTRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview
STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking
More informationHosted Services: Providing SMBs with Access to Advanced Technology
I D C V E N D O R S P O T L I G H T Hosted Services: Providing SMBs with Access to Advanced Technology May 2009 Adapted from Adoption of Software as a Service in U.S. Small Businesses: Crafting Effective
More information2018 Report The State of Securing Cloud Workloads
2018 Report The State of Securing Cloud Workloads 1 Welcome to our 2018 report on the state of securing cloud workloads A summary of the responses of close to 350 professionals whose primary areas of responsibility
More informationBorderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security. #truecybersecurity
Borderless security engineered for your elastic hybrid cloud Kaspersky Hybrid Cloud Security www.kaspersky.com #truecybersecurity Borderless security engineered for your hybrid cloud environment Data
More informationSMASHING THE TOP 7 VIRTUALIZATION SECURITY MYTHS
SMASHING THE TOP 7 VIRTUALIZATION SECURITY MYTHS WHY VIRTUALIZATION? VIRTUALIZATION HAS MANY BUSINESS BENEFITS, INCLUDING THE FOLLOWING: Cost containment: Virtualization reduces the overall hardware footprint,
More informationIBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights
IBM Secure Proxy Advanced edge security for your multienterprise data exchanges Highlights Enables trusted businessto-business transactions and data exchange Protects your brand reputation by reducing
More informationMAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER
MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER Bret Hartman Cisco / Security & Government Group Session ID: SPO1-W25 Session Classification: General Interest 1 Mobility Cloud Threat Customer centric
More informationGovernment IT Modernization and the Adoption of Hybrid Cloud
Government IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Federal and National Governments Are at an Inflection Point Federal and national governments
More informationBest Practices in Securing a Multicloud World
Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers
More informationSobering statistics. The frequency and sophistication of cybersecurity attacks are getting worse.
Sobering statistics The frequency and sophistication of cybersecurity attacks are getting worse. 146 >63% $500B $3.8M The median # of days that attackers reside within a victim s network before detection
More informationGlobal Headquarters: 5 Speen Street Framingham, MA USA P F
WHITE PAPER Datacenter SSDs: Solid Footing for Growth Sponsored by: Samsung David Reinsel January 2008 Jeff Janukowicz IN THIS WHITE PAPER Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200
More informationWhy the Cloud is the Network
Why the Cloud is the Network By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by VeloCloud Executive Summary Mission critical enterprise applications are moving to the cloud, driving the need
More informationWHITE PAPER Dell Virtual Integrated System (VIS) Management Extensions Improve Datacenter Operational Productivity
WHITE PAPER Dell Virtual Integrated System (VIS) Management Extensions Improve Datacenter Operational Productivity Sponsored by: Dell Mary Johnston Turner November 2010 Global Headquarters: 5 Speen Street
More informationAddressing Network Performance Monitoring Requirements in Hybrid Cloud Environments
Sponsored by: Cisco This paper examines the growing importance of pervasive and real-time data plane streaming telemetry to network performance monitoring in the context of hybrid IT and multicloud. The
More informationHow to Leverage Containers to Bolster Security and Performance While Moving to Google Cloud
PRESENTED BY How to Leverage Containers to Bolster Security and Performance While Moving to Google Cloud BIG-IP enables the enterprise to efficiently address security and performance when migrating to
More informationGlobal Headquarters: 5 Speen Street Framingham, MA USA P F
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com C O M P E T I T I V E A N A L Y S I S I D C M a r k e t S c a p e : W o r l d w i d e D a t a c e
More informationHow your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter
How your network can take on the cloud and win Think beyond traditional networking toward a secure digital perimeter Contents Introduction... 3 Reduce risk points with secure, contextualized access...
More informationMobility best practice. Tiered Access at Google
Mobility best practice Tiered Access at Google How can IT leaders enable the productivity of employees while also protecting and securing corporate data? IT environments today pose many challenges - more
More informationVirtustream Cloud and Managed Services Solutions for US State & Local Governments and Education
Data Sheet Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education Available through NASPO ValuePoint Cloud Services VIRTUSTREAM CLOUD AND MANAGED SERVICES SOLUTIONS
More informationService Mesh and Microservices Networking
Service Mesh and Microservices Networking WHITEPAPER Service mesh and microservice networking As organizations adopt cloud infrastructure, there is a concurrent change in application architectures towards
More informationSimple and secure PCI DSS compliance
Simple and secure PCI DSS compliance Get control over PCI audit scope while dramatically improving security posture Decrease IT CapEx and OpEx costs by 25% Reduce PCI compliance time by up to 30% Reduce
More informationEnabling Efficient and Scalable Zero-Trust Security
WHITE PAPER Enabling Efficient and Scalable Zero-Trust Security FOR CLOUD DATA CENTERS WITH AGILIO SMARTNICS THE NEED FOR ZERO-TRUST SECURITY The rapid evolution of cloud-based data centers to support
More information