Closing the Hybrid Cloud Security Gap with Cavirin

Similar documents
Enabling Hybrid Cloud Transformation

ForeScout Extended Module for Splunk

THE IMPACT OF HYBRID AND MULTI CLOUDS TO CYBERSECURITY PRIORITIES

Abstract. The Challenges. ESG Lab Review InterSystems IRIS Data Platform: A Unified, Efficient Data Platform for Fast Business Insight

Technical Review Managing Risk, Complexity, and Cost with SanerNow Endpoint Security and Management Platform

Hyperconverged Infrastructure: Cost-effectively Simplifying IT to Improve Business Agility at Scale

Cloud Migration Strategies

The Role of Converged and Hyper-converged Infrastructure in IT Transformation

Veritas Resiliency Platform: The Moniker Is New, but the Pedigree Is Solid

Enabling IT Transformation with Modern Data Protection Strategies

Who Better than Dell EMC to Offer Best-for-VMware Data Protection?

Analyzing the Economic Benefits of the HPE SimpliVity 380 All-flash Hyperconverged Portfolio

Abstract. The Challenges. ESG Lab Review Lumeta Spectre: Cyber Situational Awareness

CyberPosture Intelligence for Your Hybrid Infrastructure

Best Practices in Cloud-powered Data Protection

Efficient Data Center Virtualization Requires All-flash Storage

Reference Research: Disk-based Storage Capacity Trends Date: September 2012 Author: Bill Lundell, Senior Research Analyst

Abstract: Data Protection Cloud Strategies

ESG Research. Executive Summary. By Jon Oltsik, Senior Principal Analyst, and Colm Keegan, Senior Analyst

ESG Lab Review RingCentral Mobile Voice Quality Assurance

Modern Database Architectures Demand Modern Data Security Measures

Flash Storage-based Data Protection with HPE

The Why, What, and How of Cisco Tetration

Cisco Cloud Application Centric Infrastructure

Dell EMC Hyperconverged Portfolio: Solutions that Cover the Use Case Spectrum

Hybrid WAN Operations: Extend Network Monitoring Across SD-WAN and Legacy WAN Infrastructure

How Security Policy Orchestration Extends to Hybrid Cloud Platforms

CLOUD WORKLOAD SECURITY

The Journey to Intent-based Networking

Strong Consistency versus Weak Consistency

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

Video Surveillance Solutions from EMC and Brocade: Scalable and Future-proof

Optimisation drives digital transformation

Software-defined Storage by Veritas

Simplifying and Accelerating the Transition to Hybrid Cloud Environments. By Mark Bowker, Senior Analyst and Bob Laliberte, Senior Analyst

(TBD GB/hour) was validated by ESG Lab

Abstract. The Challenges. ESG Lab Review Proofpoint Advanced Threat Protection. Figure 1. Top Ten IT Skills Shortages for 2016

ESG Lab Review Accelerating Time to Value: Automated SAN and Federated Zoning with HPE 3PAR and Smart SAN for 3PAR

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value

An All-Source Approach to Threat Intelligence Using Recorded Future

Modernizing Virtual Infrastructures Using VxRack FLEX with ScaleIO

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value

Accelerate Your Enterprise Private Cloud Initiative

MiTek Sapphire Build. Scalable Software for Home Building Management. ESG Lab Validation. By Brian Garrett, Vice President, ESG Lab April 2017

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

VMAX3: Adaptable Enterprise Resiliency

ESG Lab Review High-fidelity Breach Detection with Acalvio Autonomous Deception

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value. An IDC InfoBrief, sponsored by Cisco September 2016

Market Report. Scale-out 2.0: Simple, Scalable, Services- Oriented Storage. Scale-out Storage Meets the Enterprise. June 2010.

Dell EMC Isilon All-Flash

IBM FlashSystem 9100: Accelerate Data for the Multi-cloud Era

GDPR Update and ENISA guidelines

Microsoft Security Management

White. Paper. The Application Deluge and Visibility Imperative. How to Ensure Network Performance for Your Business-critical Applications.

Shavlik Protect: Simplifying Patch, Threat, and Power Management Date: October 2013 Author: Mike Leone, ESG Lab Analyst

Analyzing the Economic Benefits of Datrium Cloud DVX

Top 10 most important IT priorities over the next 12 months. (Percent of respondents, N=633, ten responses accepted)

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

Next-generation Connectivity and Security for Enterprise Mobility and Hybrid Cloud Environments

THE SIX ESSENTIAL CAPABILITIES OF AN ANALYTICS-DRIVEN SIEM

Solution Overview Cisco Tetration Analytics and AlgoSec: Business Application Connectivity Visibility, Policy Enforcement, and Business-Based Risk and

Endpoint Security Must Include Rapid Query and Remediation Capabilities

AWS Reference Design Document

Securing Your Cloud Introduction Presentation

RSA NetWitness Suite Respond in Minutes, Not Months

Best Practices in Securing a Multicloud World

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

Why Enterprises Need to Optimize Their Data Centers

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

Flash Storage Fuels IT Transformation

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

ESG Lab Review The Performance Benefits of Fibre Channel Compared to iscsi for All-flash Storage Arrays Supporting Enterprise Workloads

NetApp Clustered Data ONTAP 8.2 Storage QoS Date: June 2013 Author: Tony Palmer, Senior Lab Analyst

Clearing the Path to Micro-Segmentation. A Strategy Guide for Implementing Micro- Segmentation in Hybrid Clouds

White. Paper. EMC Isilon Scale-out Without Compromise. July, 2012

Vulnerability Management Trends In APAC

Cognizant Cloud Security Solution

SYMANTEC DATA CENTER SECURITY

IBM Data Protection for Virtual Environments: Extending IBM Spectrum Protect Solutions to VMware and Hyper-V Environments

Gaps in Resources, Risk and Visibility Weaken Cybersecurity Posture

GDPR COMPLIANCE REPORT

Performance Evaluation Criteria for Hyperconverged Infrastructures

Meeting Data Governance Requirements Starts with Data Visibility

GDPR: An Opportunity to Transform Your Security Operations

Abstract. The Challenges. The Solution: Veritas Velocity. ESG Lab Review Copy Data Management with Veritas Velocity

Development. Architecture QA. Operations

2018 Report The State of Securing Cloud Workloads

Converged Infrastructure Matures And Proves Its Value

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

Automating Security Practices for the DevOps Revolution

Hybrid IT for SMBs. HPE addressing SMB and channel partner Hybrid IT demands ANALYST ANURAG AGRAWAL REPORT : HPE. October 2018

RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Multicloud is the New Normal Cloud enables Digital Transformation (DX), but more clouds bring more challenges

Vectra Cognito Automating Security Operations with AI

ebook ADVANCED LOAD BALANCING IN THE CLOUD 5 WAYS TO SIMPLIFY THE CHAOS

Analyzing the Economic Value of HPE ConvergedSystem 700 in Enterprise Environments. By Mark Bowker, Senior Analyst and Adam DeMattia, Research Analyst

BMC s Cloud Lifecycle Management

Running Splunk on VxRack FLEX

Transcription:

Enterprise Strategy Group Getting to the bigger truth. Solution Showcase Closing the Hybrid Cloud Security Gap with Cavirin Date: June 2018 Author: Doug Cahill, Senior Analyst Abstract: Most organizations are operating hybrid clouds comprised of on-premises and public cloud infrastructure platforms hosting an array of new and legacy technologies including bare metal servers, virtual machines, and application containers. Such heterogeneity, along with the ongoing shift of server workloads to public clouds, has complicated cybersecurity objectives headlined by a visibility gap. The lack of visibility into cloud-resident assets is part of a broader cloud security readiness gap, the delta between the degree to which companies have already adopted cloud services and their ability to secure that use. IT and cybersecurity professionals need to close both gaps with strategies and solutions that move at the speed of the cloud. The Cavirin CyberPosture Intelligence for the hybrid cloud risk and security management platform provides a set of visibility and control capabilities that allows organizations to automate security policy across their hybrid cloud data centers to reduce a growing attack surface area and assure compliance with industry regulations. The Realities of Securing Hybrid Clouds More organizations are leveraging the elasticity of public cloud platforms to gain agility in an increasingly competitive business environment. The cybersecurity charter of mitigating risk is complicated by the resulting expansion of the attack surface, a diversity of asset types to be protected, and a culture of moving at the speed of DevOps. The Shift of Workloads to Public Clouds Creates a Visibility Gap and New Perimeters An oft-heard refrain that captures a common concern about securing public cloud platforms is a lack of visibility. The root cause for this perspective is the shift of server workloads to public clouds that challenges the definition of the network perimeter and the persistence of workloads. According to research conducted by ESG, businesses plan to increase the number of workloads they have deployed in a public cloud platform. In fact, while 26% of respondent organizations state that 31-50% of their production workloads run on public cloud infrastructure services today, 40% of organizations expect to be running 31-50% of their workloads in the public cloud 24 months from now. 1 Network-based approaches to gain visibility are ill-equipped to provide the same level of instrumentation for Network-based approaches to gain visibility are ill-equipped to provide the same level of instrumentation for workloads workloads running in public cloud platforms. ESG s research running in public cloud platforms. highlights the fact that this shift of workloads has created a set of visibility concerns centered around the ability to vet software and configuration vulnerability and auditing and alerting on intra- and inter-workload activity (see Figure 1). 1 Source: ESG Master Survey Results, Trends in Hybrid Cloud Security, March 2018. All ESG research references and charts in this solution showcase have been taken from this set of master survey results unless otherwise noted. This ESG Solution Showcase was commissioned by Cavirin and is distributed under license from ESG.

Solution Showcase: Closing the Hybrid Cloud Security Gap with Cavirin 2 Figure 1. Improving Security Visibility for IaaS/PaaS-hosted Workloads Which areas do you feel are the most important to improve security visibility for your organization s IaaS/PaaS-hosted workloads? (Percent of respondents, N=450, three responses accepted) Identifying software vulnerabilities Identifying workload configurations that are out of compliance including those that do not adhere to Center for Internet Security guidelines 30% 30% An audit trail of all system level activity 27% Alerts on the detection of anomalous system-level workload activity 26% An audit trail of privileged user account activity 26% An audit trail of the use of IaaS APIs 24% The existence of any external facing server workloads which do not route their Internet traffic via a jump/bastion host 21% Inter-workload communication 19% The communication between workloads and an externally facing jump/bastion host 18% Alerts on the anomalous use of cloud APIs 18% Source: Enterprise Strategy Group The Many Dimensions of Hybrid Clouds Creates Complexity While the use of public cloud environments is broad-based, these new technologies will coexist with existing elements of the traditional customer-managed data center, resulting in multiple dimensions that need to be secured. Application Containers Are Creating a Heterogeneous Mix of Server Workload Types Application containers are an increasingly prominent dimension of hybrid clouds, with 56% of organizations having already deployed containers to production and another 24% planning to do so in the next 12 months. Since they are employed for both new and legacy applications and deployed on-premises and in public clouds, applications containers will share those environments with virtual machines and bare metal servers. According to ESG research, while the blend of containers will

Solution Showcase: Closing the Hybrid Cloud Security Gap with Cavirin 3 expand from 19% today to 33% in 24 months, respondents noted that 41% of their server types will be VMs and 26% will still be bare metal servers in the same timeframe. 2 Multi-cloud Adoption Is Creating a Heterogeneous Mix of IaaS Platforms ESG research also reveals that many organizations are adopting a multi-cloud strategy. Of those organizations that indicated that they are consuming IaaS services, 81% are doing so from more than one provider. 3 Closing the Cloud Security Gap The discussion about hybrid cloud security appropriately starts with an overview of what is fundamentally different about the public cloud infrastructure portion of a hybrid cloud. A foundational cloud security construct is the shared responsibility model, which depicts the division of labor between the cloud service provider (CSP) and the subscriber, highlighting how IT and cybersecurity professionals should approach closing the cloud security gap. With that demarcation in mind, IT and cybersecurity professionals should then consider the following best practices. Employ a Workload-centric Approach The shift of workloads to public clouds creates a new perimeter, a server workload perimeter that, in turn, requires a workload-centric approach. Such an approach must include gaining visibility via the following best practices: Continuously update an inventory of all types of on-premises and cloud-resident workloads. Assess the risk profile of all server workloads to enable security and compliance uses cases. Reduce the attack surface area by identifying and remediating software and configuration vulnerabilities. Audit and alert on anomalous system activity and inter-workload east-west communications. Unify Across the Dimensions of the Hybrid Environment The modality for securing hybrid clouds is clearly changing. While 70% of organizations who participated in ESG research stated that they employ different controls for securing public cloud a unified approach to workload security resources and on-premises VMs and servers, the same percentage of independent of server type and location assures respondents shared that they intend to unify controls for all server consistency of policy types across public cloud(s) and on-premises environments within the next two years. And with good reason a unified approach to workload security independent of server type and location assures consistency of policy, improving an organization s cybersecurity posture across its hybrid cloud. Automate Security via DevOps The challenge of managing the complexities of multidimensional hybrid clouds is exacerbated by an ongoing acute shortage of resources, with 51% of organizations citing a problematic shortage of cybersecurity skills. 4 These dynamics make automating the introduction of security controls an essential element of a hybrid cloud strategy and is likely why 40% of ESG research participants are evaluating security use cases that leverage DevOps processes. Such DevSecOps use cases include: Identifying workload configuration and software vulnerabilities before deployment to production. Applying preventative controls and those that can detect anomalous activity and more. 2 Source: ESG Brief, The Growth in the Use of Application Containers, May 2018. 3 Source: ESG Master Survey Results, 2018 IT Spending Intentions Survey, December 2017. 4 ibid.

Solution Showcase: Closing the Hybrid Cloud Security Gap with Cavirin 4 Automating Continuous Hybrid Cloud Security with Cavirin Cavirin s CyberPosture Intelligence employs a pragmatic methodology to automate a workload-centric approach for the hybrid cloud. Risk-based Visibility via CyberPosture Cavirin s CyberPosture is a CISO-focused risk and cybersecurity assessment framework that leverages the intelligence provided by the underlying Cavirin platform. CyberPosture reflects the relative state of security, risk, and compliance based on factor-driven quantitative scoring systems. The key variables that contribute to these scores include vulnerability and configuration assessments, monitoring, alignment with cybersecurity and compliance audit frameworks and benchmarks, and more. Historical scores are retained and displayed on a timeline so CISOs can view and manage the status of their organization s cybersecurity posture in data intervals. A Pragmatic Methodology-based Automation Framework Cavirin s repeatable automation framework is a methodology comprised of four intertwined and repeating phases (see Figure 2). Figure 2. Cavirin s Automation Framework Protect Source: Enterprise Strategy Group Cavirin reduces an organization s attack surface area by comparing server workload configurations against industry standard benchmarks such as those defined by the Center for Internet Security (CIS), AWS, and operating system vendors and by identifying known software vulnerabilities. Monitor The Monitor phase of Cavirin s automation framework provides continuous assessments of server workloads by detecting anomalies so IT and cybersecurity professionals can be forewarned of drift against a golden CyberPosture score.

Solution Showcase: Closing the Hybrid Cloud Security Gap with Cavirin 5 Respond To automate taking action on any drift detected in the Monitor phase, the Cavirin platform prioritizes response plans based on maximizing CyberPosture scores (inversely proportional to risk). A prioritized remediation gap report enables improvement of the CyberPosture by minimizing the remediation actions required, thereby saving time and resources. Predict As organizations affect changes based on Cavirin s response plans, the platform predicts the impact of those changes on CyberPosture, thus closing the loop from change management to security posture. By leveraging and analyzing via machine learning data collected from the prior three stages, Cavirin can help organizations predict future security issues and provide actionable insights and recommendations to improve their cybersecurity posture. DevOps Friendly Cavirin integrates with DevOps continuous integration and continuous delivery (CI/CD) tools to automate the functionality enabled by the four phases of the platform s methodology. Oft referred to as DevSecOps, automating security via DevOps improves the cybersecurity posture of an organization s hybrid cloud workload footprint by integrating security in development, test, and production environments. For example, Cavirin s Protect phase functionality can automate the hardening of server workloads before deployment to production while the Monitor and Respond phases secure workloads at run time in production. The Bigger Truth The strategic imperative to leverage the agility of the cloud has created a readiness gap that IT must close by retooling cybersecurity processes, skills, and technologies. The complexities inherent in the multiple dimensions of today s hybrid cloud data centers have made such adaptations challenging, with effectiveness and efficiency too often mutually exclusive outcomes. However, an organization s cybersecurity, compliance, and efficiency objectives can be realized by leveraging automation and a unified approach to hybrid cloud security. Organizations will need to employ purposeful solutions, designed for the dimensions and scale of hybrid clouds, to unify and automate cybersecurity. Cavirin s hybrid cloud security platform supports the heterogeneous nature of hybrid clouds and provides a DevOps-oriented automation framework that allows businesses to integrate security as an immutable component of their IT infrastructure. All trademark names are property of their respective companies. Information contained in this publication has been obtained by sources The Enterprise Strategy Group (ESG) considers to be reliable but is not warranted by ESG. This publication may contain opinions of ESG, which are subject to change. This publication is copyrighted by The Enterprise Strategy Group, Inc. Any reproduction or redistribution of this publication, in whole or in part, whether in hard-copy format, electronically, or otherwise to persons not authorized to receive it, without the express consent of The Enterprise Strategy Group, Inc., is in violation of U.S. copyright law and will be subject to an action for civil damages and, if applicable, criminal prosecution. Should you have any questions, please contact ESG Client Relations at 508.482.0188. Enterprise Strategy Group is an IT analyst, research, validation, and strategy firm that provides market intelligence and actionable insight to the global IT community. www.esg-global.com 2018 by The Enterprise contact@esg-global.com Strategy Group, Inc. All Rights Reserved. P. 508.482.0188