Enterprise Strategy Group Getting to the bigger truth. The Evolution of Cloud Security

Size: px
Start display at page:

Download "Enterprise Strategy Group Getting to the bigger truth. The Evolution of Cloud Security"

Transcription

1 Enterprise Strategy Group Getting to the bigger truth. The Evolution of Cloud Security By Jon Oltsik, ESG Senior Principal Analyst May 2016

2 Contents 3. Executive Summary 4. Cloud Computing Momentum in the Enterprise 6. The State of Cloud Security 8. Cloud Security Challenges 10. Cloud Security Tactics and Strategies 13. The Bigger Truth All trademark names are property of their respective companies. Information contained in this publication has been obtained by sources The Enterprise Strategy Group (ESG) considers to be reliable but is not warranted by ESG. This publication may contain opinions of ESG, which are subject to change from time to time. This publication is copyrighted by The Enterprise Strategy Group, Inc. Any reproduction or redistribution of this publication, in whole or in part, whether in hard-copy format, electronically, or otherwise to persons not authorized to receive it, without the express consent of The Enterprise Strategy Group, Inc., is in violation of U.S. copyright law and will be subject to an action for civil damages and, if applicable, criminal prosecution. Should you have any questions, please contact ESG Client Relations at This ESG Research paper was commissioned by varmour and is distributed under license from ESG.

3 Executive Summary In early 2016, varmour commissioned the Enterprise Strategy Group (ESG) to conduct a research survey of 303 IT and cybersecurity professionals with knowledge of or responsibility for cloud security policies, processes, or technologies at enterprise organizations (i.e., more than 1,000 employees). Survey respondents were located in North America and came from companies ranging in size: 50% of survey respondents worked at organizations with 1,000 to 4,999 employees, 23% worked at organizations with 5,000 to 9,999 employees, 13% worked at organizations with 10,000 to 19,999 employees, and 14% worked at organizations with 20,000 or more employees. Respondents represented numerous industry and government segments with the largest participation coming from manufacturing (20%), retail/wholesale (16%), the financial services industry (15%), and business services (14%). For the purposes of this research project, ESG provided the following definitions to survey respondents: Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. These infrastructure resources can be accessed and provisioned via on-premises cloud infrastructure management platforms (e.g., VMware vcloud, OpenStack, etc.) and/or third-party services (e.g., Amazon AWS, Microsoft Azure, etc.). Note that server virtualization technologies like VMware vsphere/esx, Microsoft Hyper-V, etc. on its own (i.e., without some type of cloud infrastructure management software) is NOT considered to be cloud computing. Server virtualization technology is defined as software that divides one physical server into multiple isolated virtual environments. This survey focuses specifically on x86 virtualization technologies, by which x86-based guest operating systems are run under another x86-based host operating system running on Intel or AMD hardware platforms. This research project was intended to assess the current practices and challenges associated with cloud computing security. Furthermore, respondents were asked about future strategic plans intended to improve the efficacy and efficiency of cloud security in the future. Based upon the data collected, this paper concludes: Enterprise organizations continue to embrace heterogeneous cloud computing options. Large organizations are using a wide variety of public and private cloud infrastructure to host a growing number of production workloads. ESG also sees increasing adoption of a wide range of heterogeneous cloud infrastructure and SDN technologies, including AWS, Azure, Cisco ACI, Google Cloud Platform (GCP), NSX, OpenStack, SoftLayers, and VMware vcloud. The heterogeneous nature of cloud computing introduces numerous management and security complexities. 3

4 Traditional security processes and controls can be a mismatch for cloud computing. CISOs often try to bridge the cloud security gap with traditional security processes and controls but survey respondents report weaknesses in status quo data, host-based, and network security technologies when they are applied to the cloud (i.e., physical firewall and IDS/IPS appliances, DLP gateways, switch- and router-based ACLs, Layer 2 VLANs based upon IEEE 802.1q, etc.). The same holds true with security monitoring, where cloud computing often leads to blind spots or data management issues (i.e., collecting the right data in a timely manner, normalizing different data formats, etc.) Little wonder then that 74% of organizations are replacing traditional security processes and choosing extensible, scalable, and independent security technologies designed for cloud computing. Cloud computing is driving a multitude of cybersecurity changes. Aside from traditional security process and technology replacement, enterprise organizations are changing security organizations, processes, and plans to accommodate cloud computing security requirements. This transition has already begun and will only gather additional momentum in the months and years to come. As for cloud computing security lessons learned, successful organizations are making organizational changes to improve collaboration between security, DevOps, and data center operations teams, instituting new security policies and processes to keep up with cloud agility, and adding new types of cloud-centric security technologies designed for extensibility, scalability, and support for multiple types of cloud infrastructure. Cloud Computing Momentum in the Enterprise Enterprise organizations are no longer simply experimenting with cloud computing. Rather, many large firms are embracing heterogeneous cloud computing in mixed environments and actively moving workloads to public and private clouds. For example, ESG research reveals that: 34% More than one-third (34%) of organizations have been using public and private cloud services for 3 years or more. As organizations gain additional cloud computing experience, it tends to accelerate their pace of cloud adoption. 57% More than half of enterprise organizations (57%) are using public and private cloud infrastructure to support production applications and workloads today. This indicates that organizations are growing more comfortable running their own portfolio of cloud-based workloads and that cloud computing has become an essential part of enterprise IT strategy. 40% One-quarter of IT and cybersecurity professionals report that 40% of their organization s production applications/workloads run on public cloud infrastructure today and this will only increase in the future. 4

5 Enterprises are engaged in numerous other activities in support of cloud computing. For example, 88% are already deploying internal private cloud infrastructure, 66% are using converged or hyper-converged infrastructure solutions, while 69% are using a self-service portal for cloud workload provisioning, configuration management, change management, etc. Why are large organizations embracing cloud computing at an increasing rate? Reasons vary from aligning enterprise IT with emerging technology innovation, to lowering costs, to aligning IT infrastructure with the increased use of agile development (see Figure 1). FIGURE 1 Reasons for Using Cloud Computing Infrastructure What were the main reasons why your organization decided to utilize cloud computing infrastructure when it first made the decision to do so? (Percent of respondents, N=303, multiple responses accepted) Align our IT strategy with emerging industry innovation Lower operating costs Lower capital costs Align our IT infrastructure with our increasing use of agile development Reduce the number of physical data centers my organization owns and/or operates Use cloud computing for application test and development On-demand compute resources to meet the variable needs of a particular application Use cloud computing infrastructure for non-sensitive workload Accelerate application deployment time Provide business units with more IT autonomy 50% 47% 42% 41% 41% 40% 39% 38% 37% 36% Tiered storage options allow us to align the time value of data with cost Converting capital costs to operational costs in a pay of you go utility model 26% 30% 5

6 IT and security professionals still believe that security issues continue to impede overall cloud velocity. The State of Cloud Security In spite of the uptake of cloud computing, IT and security professionals still believe that security issues continue to impede overall cloud velocity. For example, 51% claim that their organizations are concerned about security risks associated with relying on third-party cloud computing providers, 37% say that their organizations are concerned that cloud computing increases their attack surface, and 36% are concerned about the availability and reliability of public cloud infrastructure. Aside from the risks associated with cloud computing, security professionals also admit that cloud security presents some inherent organizational challenges. More than half of all enterprises claim that cybersecurity teams, networking teams, and data center infrastructure teams all get involved in creating and managing cloud security policies. These three teams also collaborate on cloud security technology purchases, deployment, and day-to-day operations. Given the relative immaturity of cloud computing, when it comes to securing these implementations properly, security professionals describe communications and collaboration issues between these groups, increasing risk and creating bottlenecks in cloud security processes. While cloud computing represents a new and distinct model, 92% of organizations approach cloud security with existing security technologies and processes (see Figure 2). FIGURE 2 Use of Existing Security Technologies and Processes for Cloud Computing Does your organization use its existing security technology and processes for securing its cloud infrastructure? (Percent of respondents, N=303) 6% 2% Yes, extensively Yes, somewhat 37% 55% No, but we plan to use our existing security technologies and processes for cloud security in the future No, but we are interested in using our existing security technologies and processes for cloud security in the future 6

7 From a cost and operations perspective, it certainly makes sense to point existing security technologies and processes at new IT initiatives like cloud computing. Unfortunately, these tools and processes were really designed to be used with a traditional static security model (i.e., hardware-centric, perimeter, network-centric, north/south traffic inspection emphasis, etc.) rather than highly dynamic and mobile cloud computing workloads. When asked to identify their least effective traditional security tools for cloud environments, survey respondents pointed to data security technologies (46%), host-based security technologies (46%), and network security technologies (44%, see Figure 3). The research also revealed a general pattern traditional security skills, processes, and technologies were much more mature than their cloud security counterparts on a consistent basis. FIGURE 3 Least Effective Traditional Security Technologies for New Requirements Associated with Cloud Security Which of the following traditional security controls (designed to protect on-premises systems, networks, applications, and data) is least effective for new requirements associated with cloud security? (Percent of respondents, N=303, multiple responses accepted) Data security technologies (encryption, data loss prevention (DLP), etc.) Host-based security technologies (i.e. anti-virus, file-integrity monitoring, host-based IDS/IPS, etc.). Network security technologies (i.e. firewalls, IDS/IPS, gateways, etc.) 44% 46% 46% Web application firewalls (WAFs) 42% Vulnerability management scanner technologies 41% Patch management technologies 37% SIEM and/or security analytics technologies 33% None of the above 4% 7

8 Cloud Security Challenges Aside from security technology controls, survey respondents also called out a variety of cloud security challenges that spanned people, process, and technology. For example, one-third of organizations point to problems in areas such as their ability to provision security controls to new workloads in the cloud, their ability to assess the overall security of cloud infrastructure, their ability to monitor workloads across clouds, and their ability to monitor regulatory compliance while using cloud computing infrastructure effectively (see Figure 4). FIGURE 4 Cloud Security Challenges Which of the following represent the biggest cloud security challenges at your organization? (Percent of respondents, N=303, five responses accepted) Ability to provision security controls to new workloads in the cloud Ability to assess the overall security status of cloud infrastructure Ability to monitor workloads across clouds Ability to maintain regulatory compliance while using cloud computing infrastructure effectively Ability to monitor network traffic patterns for anomalous/suspicious behavior Ability to protect workloads across clouds Ability to collect, process, and analyze security data related to cloud infrastructure Ability to build a tiered cloud consumption model that aligns different cloud options with the sensitivity of individual workloads Ability to build a risk model to assess which workloads can move to the cloud and which should remain on-premises 34% 34% 34% 33% 32% 31% 31% 30% 30% Ability to monitor who provisions or changes cloud-based infrastructure Ability to conduct forensic investigations on cloud resources Ability to segment network traffic 26% 26% 26% None of the above we don t have any cloud security challenges 3% 8

9 Note that many responses in Figure 4 were related to challenges with cloud security monitoring. ESG wanted to dig a bit further into this topic so we asked survey respondents to identify specific challenges with cloud security monitoring as well. As Figure 5 illustrates, security professionals have a long list of cloud security monitoring challenges, including organizational challenges, scalability challenges, technology challenges, and skills challenges. As the old business axiom goes, you can t manage what you can t measure. As the ESG survey concludes, this is a real problem for large organizations where cloud security monitoring remains a work-in-progress. Smart CISOs will address these types of cloud security monitoring challenges, attain situational awareness of all activities happening in heterogeneous clouds, and then use data analysis to mitigate risk, apply controls, and drive security investigations. FIGURE 5 Cloud Security Monitoring Challenges Which of the following challenges has your organization experienced with regard to monitoring the security of applications, workloads, and data residing on cloud infrastructure? (Percent of respondents, N=298, three responses accepted) Various IT and/or business units have adopted cloud computing over the past few years so the security team is now catching up on security monitoring Cloud security monitoring requires greater scalability for security data capture, process, and analysis 38% 36% Each cloud infrastructure technology is distinct so we can t always get consistent security monitoring across diverse cloud infrastructure My organization has a limited number of cybersecurity personnel, so cloud security monitoring has placed an additional burden on the existing team Monitoring cloud can require lots of work for connecting security monitoring tools to cloud platforms via APIs My organization s cybersecurity team does not have adequate cloud security monitoring skills in place today so we are learning as we go Cloud security introduces blind spots where we don t have adequate visibility for security monitoring Traditional monitoring tools are not always effective for cloud security monitoring 31% 30% 29% 28% 28% 26% We have not experienced any challenges 4% 9

10 Cloud Security Tactics and Strategies Cloud security is new and different compared to traditional physical or virtual server models. Based upon the ESG research, it appears that enterprise organizations take a while to internalize these important distinctions. Once this lesson is learned, however, many organizations adjust their security controls and monitoring so they support the requirements and nuances of heterogeneous cloud infrastructure. For example, 74% of organizations say that they have abandoned traditional security policies and technologies because they couldn t be used effectively for cloud security (see Figure 6). FIGURE 6 Cloud Computing Drives the Abandonment of Traditional Security Controls and Processes Has your organization had to abandon its use of any traditional security policies or technologies because it couldn t be used effectively for cloud security? (Percent of respondents, N=303) 13% 14% 32% Yes, we ve abandoned many traditional security policies or technologies because they couldn t be used effectively for cloud security Yes, we ve abandoned some traditional security policies or technologies because they couldn t be used effectively for cloud security 41% No, but we are having sufficient problems that may lead us to abandon one or several traditional security policies or technologies because they couldn t be used effectively for cloud security No The ESG research indicates that many CISOs are altering their security strategies and turning toward new types of security controls, monitoring tools, and processes specifically designed for cloud computing. In addition, data gathered for this project indicates that they are also: Hiring cloud security architects. A vast majority (87%) of enterprise organizations have established a new cloud security architect position but this role is a relatively recent addition over the last few years. As this role becomes more established, ESG expects gradual maturity in areas like security operations automation and orchestration, so security can keep up with agile development and DevOps groups that are often driving cloud computing initiatives. Changing security requirements. In the past, security professionals tended to judge security technologies based upon their efficacy the ability to prevent, detect, or respond to changing risks or cyber-attacks. While these attributes remain important, cloud computing demands additional requirements like extensibility, scalability, and openness to a wide variety of cloud computing infrastructure (see Figure 7). 10

11 FIGURE 7 Most Desired Security Attributes for Securing Cloud Infrastructure What is your organization s most desired security attribute when it comes to securing cloud infrastructure? (Percent of respondents, N=303) Extensibility (i.e., ability to extend across both heterogeneous infrastructure) 8% 7% 3% 23% Scalability (i.e., ability to scale up or down appropriately with cloud resources) Infrastructure-agnostic (i.e., independent of the underlying IT infrastructure) 8% Manageability 10% 21% Pervasiveness (i.e., exists throughout entire IT environment - from public to on-premises) Deep visibility (i.e., at application or workload layer) 20% Stateful (i.e., security policies maintain consistent, even as they move throughout the IT environment) Automation Growing use of micro-segmentation. More than half (55%) of enterprise organizations are already using security technologies for micro-segmentation (i.e., the ability to create and manage granular and virtual network segments in order to limit network communications to specific sources and destinations). Furthermore, 81% plan to have well documented formal processes for micro-segmentation of network traffic between heterogeneous cloud infrastructure within the next year. Based upon this data, it is safe to categorize microsegmentation as a burgeoning best practice for cloud security. 11

12 Large organizations have a number of other plans for cloud security over the next 12 to 24 months. For example, 47% will determine which security technologies they can begin to eliminate as they use cloud computing more extensively. This is a clear indication that some legacy security technologies will be replaced by cloud-ready alternatives designed for extensibility, scalability, and heterogeneous cloud infrastructure support. Additionally, 43% of organizations plan to classify workloads and then align them with cloud security controls, and 43% will investigate how they can integrate security technologies with cloud APIs (see Figure 8). FIGURE 8 Cloud Security Plans over the Next 12 to 24 Months Which of the following activities does your organization have planned for the next 12 to 24 months? (Percent of respondents, N=303, multiple responses accepted) Determine which security technologies we can begin to eliminate as we use cloud computing more extensively Classify workloads and then align them with various cloud computing options based upon their risk profiles Investigate how we can integrate our security technologies with cloud APIs Provide additional cloud security training for the security staff Make changes to the IT organization to enable more collaboration on cloud security between groups Align security controls with cloud self-service provisioning Invest in new types of security technologies designed for cloud computing Develop ways to automate security provisioning that aligns with what we are doing for cloud computing Create a service catalogue that aligns security controls with various types of workloads 30% 47% 43% 43% 42% 42% 40% 40% 38% Establish a cloud security architect position None planned 2% 4% 12

13 The Bigger Truth Based upon the data presented in this research insight paper, ESG concludes that, while cloud security remains somewhat immature today, it is developing rapidly as large organizations acquire and deploy cloud-ready security tools, gain experience protecting cloud workloads, and establish best practices. This ESG research project can also provide some useful lessons learned that may help large organizations avoid some of the pitfalls and challenges described above. ESG recommends that CISOs: Establish the right organizational model. Security teams must be organized so they can keep up with business initiatives and cloud computing models featuring automation, orchestration, and self-service. To achieve this goal, CISOs will need to improve communications with business and IT executives, bolster cloud computing training, and hire cloud security architects who can go toe-to-toe with cloud specialists and DevOps. Institute appropriate cloud security policies and processes. Cloud security is often an afterthought for infrastructure teams, forcing the cybersecurity team into a perpetual game of catch-up. This leads to growing IT risk, since most security departments tend to always be a few steps behind changes in infrastructure. To bridge this risk gap, large organizations must ensure that risk and security considerations become inexorably linked with cloud computing application development, business decisions, provisioning, and management. In other words, cloud security should be built into heterogeneous cloud projects from their inception rather than bolted on reactively as projects approach their production phase. Start with comprehensive monitoring for cloud security. Even highly skilled cybersecurity professionals can t mitigate risk, detect malicious activity, or respond to security alerts unless they collect, process, and analyze the right data. Similarly, strong cloud security must start with continuous monitoring of all workloads and network traffic on heterogeneous public and private clouds. Armed with comprehensive cloud security analytics, CISOs, IT auditors, and SOC specialists can make informed and timely decisions when it comes to preventing and responding to cyber-attacks. Plan for heterogeneity and massive scale. As the research indicates, large organizations are using a multitude of different private and public cloud infrastructure platforms today with no end in sight. Security controls, monitoring, and processing will need to be built for highperformance and high-throughput to keep up with dynamic workloads, constant mobility, and massive scale. In this way, organizations can bridge the gap between today s tactical security point tools and a more strategic cloud security architecture that can support cloud agility. Embrace a DevOps cloud security model for security enforcement technologies. To keep up with the pace of application development and cloud computing, security teams must work with DevOps on a common lexicon and process automation methodology. This should include things like workload classification for policy enforcement templates, API integration for automation and orchestration, a move toward software-based security services, and central management. All Rights Reserved by The Enterprise Strategy Group, Inc contact@esg-global.com P

Research Perspectives

Research Perspectives Research Perspectives Paper Network Security Operations and Cloud Computing By Jon Oltsik, Senior Principal Analyst April 2015 This ESG Research Perspectives Paper was commissioned by Tufin and is distributed

More information

This ESG White Paper was commissioned by Blue Coat and is distributed under license from ESG.

This ESG White Paper was commissioned by Blue Coat and is distributed under license from ESG. White Paper Network Encryption and its Impact on Enterprise Security By Jon Oltsik, Senior Principal Analyst February 2015 This ESG White Paper was commissioned by Blue Coat and is distributed under license

More information

Virtual Patch Management Offers Automation, Availability, and Cost Benefits Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst

Virtual Patch Management Offers Automation, Availability, and Cost Benefits Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Virtual Patch Management Offers Automation, Availability, and Cost Benefits Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: Timely patch management is a security best practice,

More information

Compensating Security Controls for Windows Server 2003 Security

Compensating Security Controls for Windows Server 2003 Security ESG Solution Showcase Compensating Security Controls for Windows Server 2003 Security Date: May 2015 Author: Jon Oltsik, Senior Principal Analyst Abstract: It is common knowledge by now that Microsoft

More information

The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst

The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst ESG Brief The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: ESG data indicates that many enterprise organizations

More information

IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst

IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst ESG Brief IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: Many enterprise organizations claim that they already

More information

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: Large organizations have spent millions of dollars on security

More information

Getting on the Road to SDN. Attacking DMZ Security Issues with Advanced Networking Solutions

Getting on the Road to SDN. Attacking DMZ Security Issues with Advanced Networking Solutions White Paper Getting on the Road to SDN Attacking DMZ Security Issues with Advanced Networking Solutions By Bob Laliberte, Senior Analyst March 2014 This ESG White Paper was commissioned by NEC and is distributed

More information

Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst

Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: What do large enterprises need in order to address increasingly

More information

ESG Brief. Overview. 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved.

ESG Brief. Overview. 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved. ESG Brief Webroot Delivers Enterprise-Class Threat Intelligence to Security Technology Providers and Large Organizations Date: September 2014 Author: Jon Oltsik, Senior Principal Analyst; Kyle Prigmore,

More information

Cybersecurity Skills Shortage: A State of Emergency

Cybersecurity Skills Shortage: A State of Emergency Enterprise Strategy Group Getting to the bigger truth. ESG Brief Cybersecurity Skills Shortage: A State of Emergency Date: February 2016 Author: Jon Oltsik, Principal Analyst, Doug Cahill, Senior Analyst,

More information

Enterprise Strategy Group Getting to the bigger truth. Cisco: ACL Survey. Final Results. Jon Oltsik, Senior Principal Analyst

Enterprise Strategy Group Getting to the bigger truth. Cisco: ACL Survey. Final Results. Jon Oltsik, Senior Principal Analyst TM Enterprise Strategy Group Getting to the bigger truth. Cisco: ACL Survey Final Results Jon Oltsik, Senior Principal Analyst Summary of Key Findings 2 Project Overview 154 completed online surveys

More information

Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst

Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst ESG Solution Showcase Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst Abstract: Information security practices are in the midst

More information

White. Paper. Building Next Generation Data Centers. Implications for I/O Strategies. August 2014

White. Paper. Building Next Generation Data Centers. Implications for I/O Strategies. August 2014 White Paper Building Next Generation Data Centers Implications for I/O Strategies By Bob Laliberte, Senior Analyst August 2014 This ESG White Paper was commissioned by Emulex and is distributed under license

More information

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave

More information

How To Understand The Needs Of The Network

How To Understand The Needs Of The Network White Paper The Modern Network Monitoring Mandate By Bob Laliberte, Senior Analyst April 2014 This ESG White Paper was commissioned by Emulex and is distributed under license from ESG. White Paper: The

More information

Netzwerkvirtualisierung? Aber mit Sicherheit!

Netzwerkvirtualisierung? Aber mit Sicherheit! Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction

More information

Simplify IT. With Cisco Application Centric Infrastructure. Roberto Barrera rbarrera@grupo-dice.com. VERSION May, 2015

Simplify IT. With Cisco Application Centric Infrastructure. Roberto Barrera rbarrera@grupo-dice.com. VERSION May, 2015 Simplify IT With Cisco Application Centric Infrastructure Roberto Barrera rbarrera@grupo-dice.com VERSION May, 2015 Content Understanding Software Definded Network (SDN) Why SDN? What is SDN and Its Benefits?

More information

Is your organization developing its own custom applications specifically for mobile devices? (Percent of respondents, N=242)

Is your organization developing its own custom applications specifically for mobile devices? (Percent of respondents, N=242) Solution Brief Check Point Capsule for Mobile Computing Security, Operations Efficiency, and Business Enablement Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst; Kyle Prigmore, Research

More information

ESG Brief. Modern Data Centers: Massive Scale and Complexity. Data Center Networking Discontinuity

ESG Brief. Modern Data Centers: Massive Scale and Complexity. Data Center Networking Discontinuity ESG Brief IBM and NEC Bring SDN/OpenFlow to Enterprise Data Center Networks Date: January, 2012 Author: Jon Oltsik, Senior Principal Analyst, and Bob Laliberte, Senior Analyst Abstract: Enterprise data

More information

2015 DevOps SECURITY GUIDE For continuous application delivery

2015 DevOps SECURITY GUIDE For continuous application delivery 2015 DevOps SECURITY GUIDE Presented by: THE NEED FOR ADAPTIVE SECURITY Information security is not keeping up with the speed of business and IT. The network- and perimeter-centric security model being

More information

The ESG Cybersecurity Maturity Model

The ESG Cybersecurity Maturity Model ESG Brief The ESG Cybersecurity Maturity Model Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: As part of its research, ESG regularly uses a scoring system to divide survey populations

More information

Why I/O Is Strategic Software- defined Networking Date: April 2013 Author: Bob Laliberte, Senior Analyst

Why I/O Is Strategic Software- defined Networking Date: April 2013 Author: Bob Laliberte, Senior Analyst Book Project Why I/O Is Strategic Software- defined Networking Date: April 2013 Author: Bob Laliberte, Senior Analyst What Is Software- defined Networking? The emergence of software- defined networking

More information

By Jason Buffington, Senior Analyst, and Monya Keane, Research Analyst

By Jason Buffington, Senior Analyst, and Monya Keane, Research Analyst White Paper How to Accelerate IT Resiliency Through Virtualization By Jason Buffington, Senior Analyst, and Monya Keane, Research Analyst August 2015 This ESG White Paper was commissioned by Axcient and

More information

Advanced Cyber Threats Demand a New Privileged Account Security Model Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst

Advanced Cyber Threats Demand a New Privileged Account Security Model Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Advanced Cyber Threats Demand a New Privileged Account Security Model Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: In spite of marginal progress, privileged accounts

More information

Safeguarding the cloud with IBM Dynamic Cloud Security

Safeguarding the cloud with IBM Dynamic Cloud Security Safeguarding the cloud with IBM Dynamic Cloud Security Maintain visibility and control with proven security solutions for public, private and hybrid clouds Highlights Extend enterprise-class security from

More information

AccelOps NOC and SOC Analytics in a Single Pane of Glass Date: March 2016 Author: Tony Palmer, Senior ESG Lab Analyst

AccelOps NOC and SOC Analytics in a Single Pane of Glass Date: March 2016 Author: Tony Palmer, Senior ESG Lab Analyst ESG Lab Spotlight AccelOps NOC and SOC Analytics in a Single Pane of Glass Date: March 2016 Author: Tony Palmer, Senior ESG Lab Analyst Abstract: This ESG Lab Spotlight details ESG s hands-on testing of

More information

White. Paper. The Rise of Network Functions Virtualization. Implications for I/O Strategies in Service Provider Environments.

White. Paper. The Rise of Network Functions Virtualization. Implications for I/O Strategies in Service Provider Environments. White Paper The Rise of Network Functions Virtualization Implications for I/O Strategies in Service Provider Environments By Bob Laliberte, Senior Analyst August 2014 This ESG White Paper was commissioned

More information

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro Staying Secure After Microsoft Windows Server 2003 Reaches End of Life Trevor Richmond, Sales Engineer Trend Micro Windows Server 2003 End of Life- Why Care? The next big vulnerability (Heartbleed/Shellshock)

More information

Software defined networking. Your path to an agile hybrid cloud network

Software defined networking. Your path to an agile hybrid cloud network Software defined networking Your path to an agile hybrid cloud network Is your enterprise network ready for the latest business and consumer trends? Cloud How easily can your users connect to cloud resources?

More information

STATE OF OPENSTACK ADOPTION REPORT Industry Survey Results February 2016

STATE OF OPENSTACK ADOPTION REPORT Industry Survey Results February 2016 STATE OF OPENSTACK ADOPTION REPORT Industry Survey Results February 2016 Why Another OpenStack Report? The open source cloud computing project, OpenStack, has come a long way since NASA and Rackspace launched

More information

Tufin Orchestration Suite

Tufin Orchestration Suite Tufin Orchestration Suite Security Policy Orchestration across Physical Networks & Hybrid Cloud Environments The Network Security Challenge In today s world, enterprises face considerably more network

More information

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical

More information

A Look at the New Converged Data Center

A Look at the New Converged Data Center Organizations around the world are choosing to move from traditional physical data centers to virtual infrastructure, affecting every layer in the data center stack. This change will not only yield a scalable

More information

IT Infrastructure Development and Its Future

IT Infrastructure Development and Its Future White Paper Transforming the Enterprise with a Dynamic IT Infrastructure By Mark Bowker, Senior Analyst January 2015 This ESG White Paper was commissioned by HP and is distributed under license from ESG.

More information

Unlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre

Unlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre Unlock the full potential of data centre virtualisation with micro-segmentation Making software-defined security (SDS) work for your data centre Contents 1 Making software-defined security (SDS) work for

More information

White. Paper. Rethinking Endpoint Security. February 2015

White. Paper. Rethinking Endpoint Security. February 2015 White Paper Rethinking Endpoint Security By Jon OItsik, Senior Principal Analyst With Kyle Prigmore, Associate Analyst February 2015 This ESG White Paper was commissioned by RSA Security and is distributed

More information

EMC Isilon: Data Lake 2.0

EMC Isilon: Data Lake 2.0 ` ESG Solution Showcase EMC Isilon: Data Lake 2.0 Date: November 2015 Author: Scott Sinclair, Analyst Abstract: With the rise of new workloads such as big data analytics and the Internet of Things, data

More information

EMA Radar for Private Cloud Platforms: Q1 2013

EMA Radar for Private Cloud Platforms: Q1 2013 EMA Radar for Private Cloud Platforms: Q1 2013 By Torsten Volk ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) Radar Report March 2013 BMC Software EMA Radar for Private Cloud Platforms: Q1 2013 (IaaS, PaaS, SaaS)

More information

Security Intelligence: A Key Component of Big Data Security Analytics Date: December 2012 Author: Jon Oltsik, Senior Principal Analyst

Security Intelligence: A Key Component of Big Data Security Analytics Date: December 2012 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Security Intelligence: A Key Component of Big Data Security Analytics Date: December 2012 Author: Jon Oltsik, Senior Principal Analyst Abstract: The intersection of big data and security analytics

More information

REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION

REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION The modern data centre has ever-increasing demands for throughput and performance, and the security infrastructure required to protect and segment the network

More information

HAWAII TECH TALK SDN. Paul Deakin Field Systems Engineer

HAWAII TECH TALK SDN. Paul Deakin Field Systems Engineer HAWAII TECH TALK SDN Paul Deakin Field Systems Engineer SDN What Is It? SDN stand for Software Defined Networking SDN is a fancy term for: Using a controller to tell switches where to send packets SDN

More information

VMware and the Need for Cyber Supply Chain Security Assurance

VMware and the Need for Cyber Supply Chain Security Assurance White Paper VMware and the Need for Cyber Supply Chain Security Assurance By Jon Oltsik, Senior Principal Analyst September 2015 This ESG White Paper was commissioned by VMware and is distributed under

More information

Solution White Paper Build the Right Cloud, Quickly

Solution White Paper Build the Right Cloud, Quickly Solution White Paper Build the Right Cloud, Quickly BMC Express Cloud Table of Contents 1 THE PROMISE OF CLOUD COMPUTING Getting Started 2 SUCCEEDING WITH CLOUD COMPUTING 3 INTRODUCING BMC EXPRESS CLOUD

More information

1.1.1 Introduction to Cloud Computing

1.1.1 Introduction to Cloud Computing 1 CHAPTER 1 INTRODUCTION 1.1 CLOUD COMPUTING 1.1.1 Introduction to Cloud Computing Computing as a service has seen a phenomenal growth in recent years. The primary motivation for this growth has been the

More information

Catbird 6.0: Private Cloud Security

Catbird 6.0: Private Cloud Security WHITE PAPER Catbird 6.0: Private Cloud Security and agile infrastructure that is exposing weaknesses in legacy perimeter-based network controls and leaving applications vulnerable to advanced threats.

More information

A Mock RFI for a SD-WAN

A Mock RFI for a SD-WAN A Mock RFI for a SD-WAN Ashton, Metzler & Associates Background and Intended Use After a long period with little if any fundamental innovation, the WAN is now the focus of considerable innovation. The

More information

White. Paper. Understanding and Addressing APTs. September 2012

White. Paper. Understanding and Addressing APTs. September 2012 White Paper Understanding and Addressing APTs By Jon Oltsik, Senior Principal Analyst September 2012 This ESG White Paper was commissioned by Trend Micro and is distributed under license from ESG. 2012,

More information

White. Paper. Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS. January 2013

White. Paper. Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS. January 2013 White Paper Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS By Jon Oltsik, Senior Principal Analyst January 2013 This ESG White Paper was commissioned by McAfee. and is distributed

More information

Windows Server 2003 End of Support. What does it mean? What are my options?

Windows Server 2003 End of Support. What does it mean? What are my options? Windows Server 2003 End of Support What does it mean? What are my options? Windows Server 2003 End of Life- Why Care? The next big vulnerability (Heartbleed/Shellshock) is looming No more patches from

More information

White. Paper. Cloud Computing Demands Enterprise- class Password Management and Security. April 2013

White. Paper. Cloud Computing Demands Enterprise- class Password Management and Security. April 2013 White Paper Cloud Computing Demands Enterprise- class Password Management and Security By Jon Oltsik, Senior Principal Analyst April 2013 This ESG White Paper was commissioned by McAfee (a Division of

More information

Application and Infrastructure Monitoring In A Distributed World Beyond Summary Statistics

Application and Infrastructure Monitoring In A Distributed World Beyond Summary Statistics Beyond Summary Statistics Introduction As the world becomes ever more competitive, organizations are seeking ways to differentiate. Delivering data and applications to internal and external stakeholders

More information

Designing Virtual Network Security Architectures Dave Shackleford

Designing Virtual Network Security Architectures Dave Shackleford SESSION ID: CSV R03 Designing Virtual Network Security Architectures Dave Shackleford Sr. Faculty and Analyst SANS @daveshackleford Introduction Much has been said about virtual networking and softwaredefined

More information

Balancing Cloud-Based Email Benefits With Security. White Paper

Balancing Cloud-Based Email Benefits With Security. White Paper Balancing Cloud-Based Email Benefits With Security White Paper Balancing Cloud-Based Email Benefits With Security Balancing Cloud-Based Email Benefits With Security CONTENTS Trouble Spots in Cloud Email

More information

SOFTWARE-DEFINED NETWORKS

SOFTWARE-DEFINED NETWORKS THE PROMISE OF SOFTWARE-DEFINED NETWORKS SDNs offer organizations a flexible solution capable of reimagining the enterprise network. The IT community is abuzz with discussions about software-defined networks

More information

The Network Application Security Architecture Requirement

The Network Application Security Architecture Requirement White Paper The Network Application Security Architecture Requirement By Jon Oltsik March, 2011 This ESG White Paper was commissioned by Juniper Networks and is distributed under license from ESG. 2011,

More information

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc. Public Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc. Introduction Public clouds are the latest evolution of computing, offering tremendous value

More information

White. Paper. The Big Data Security Analytics Era Is Here. January 2013

White. Paper. The Big Data Security Analytics Era Is Here. January 2013 White Paper The Big Data Security Analytics Era Is Here By Jon Oltsik, Senior Principal Analyst January 2013 This ESG White Paper was commissioned by RSA Security and is distributed under license from

More information

Achieve Economic Synergies by Managing Your Human Capital In The Cloud

Achieve Economic Synergies by Managing Your Human Capital In The Cloud Achieve Economic Synergies by Managing Your Human Capital In The Cloud By Orblogic, March 12, 2014 KEY POINTS TO CONSIDER C LOUD S OLUTIONS A RE P RACTICAL AND E ASY TO I MPLEMENT Time to market and rapid

More information

VMware vcloud Networking and Security Overview

VMware vcloud Networking and Security Overview VMware vcloud Networking and Security Overview Networks and Security for Virtualized Compute Environments WHITE PAPER Overview Organizations worldwide have gained significant efficiency and flexibility

More information

Business Values of Network and Security Virtualization

Business Values of Network and Security Virtualization Business Values of Network and Security Virtualization VMware NSX in the context of the Software Defined Data Center Klaus Jansen Virtual Networks Sales Specialist VMware NSBU 2014 VMware Inc. All rights

More information

VDI-Centric Endpoint Security Can Help Lower Costs and Increase ROI

VDI-Centric Endpoint Security Can Help Lower Costs and Increase ROI White Paper VDI-Centric Endpoint Security Can Help Lower Costs and Increase ROI By Jon Oltsik, Senior Principal Analyst June 2012 This ESG White Paper was commissioned by Trend Micro and is distributed

More information

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA Advanced Visibility Moving Beyond a Log Centric View Matthew Gardiner, RSA & Richard Nichols, RSA 1 Security is getting measurability worse Percent of breaches where time to compromise (red)/time to Discovery

More information

Simplify IT. With Cisco Application Centric Infrastructure. Barry Huang bhuang@cisco.com. Nov 13, 2014

Simplify IT. With Cisco Application Centric Infrastructure. Barry Huang bhuang@cisco.com. Nov 13, 2014 Simplify IT With Cisco Application Centric Infrastructure Barry Huang bhuang@cisco.com Nov 13, 2014 There are two approaches to Control Systems IMPERATIVE CONTROL DECLARATIVE CONTROL Baggage handlers follow

More information

turnkey clouds, turnkey profits

turnkey clouds, turnkey profits WHITE PAPER Turnkey Clouds, Turnkey Profits March 2011 turnkey clouds, turnkey profits To meet customer demand and succeed, service providers need to build cloud services that are agile, secure, and profitable.

More information

The Continuing Evolution of Virtualization, Cloud Computing, and Information Security

The Continuing Evolution of Virtualization, Cloud Computing, and Information Security White Paper The Continuing Evolution of Virtualization, Cloud Computing, and Information Security By Jon Oltsik April, 2012 This ESG White Paper was commissioned by Trend Micro and is distributed under

More information

What's the Difference Between OpenStack & A Cloud Management Platform?

What's the Difference Between OpenStack & A Cloud Management Platform? What's the Difference Between OpenStack & A Cloud Management Platform? White Paper Zefflin Systems LLC Table of Contents 1. Introduction... 1 2. What is a Cloud Management Platform?... 1 3. What is OpenStack

More information

Data Center Migration Lift and Shift Use Case Scenario

Data Center Migration Lift and Shift Use Case Scenario Why Datacenter Migration Is Challenging for Enterprises Datacenter migration projects are usually complex and involve considerable planning and coordination between multiple teams, including network, security,

More information

Securing the Journey to the Private Cloud. Dominique Dessy RSA, the Security Division of EMC

Securing the Journey to the Private Cloud. Dominique Dessy RSA, the Security Division of EMC Securing the Journey to the Private Cloud Dominique Dessy RSA, the Security Division of EMC June 2010 Securing the Journey to The Private Cloud The Journey IT Production Business Production IT-As-A-Service

More information

North American Electric Reliability Corporation (NERC) Cyber Security Standard

North American Electric Reliability Corporation (NERC) Cyber Security Standard North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation

More information

Market Research. Study. Database Security and Compliance Risks. December, 2009. By Jon Oltsik

Market Research. Study. Database Security and Compliance Risks. December, 2009. By Jon Oltsik Market Research Study Database Security and Compliance Risks By Jon Oltsik December, 2009 An ESG Market Research Study Sponsored by Application Security, Inc. 2009, Enterprise Strategy Group, Inc. All

More information

How To Secure Cloud Infrastructure Security

How To Secure Cloud Infrastructure Security Cloud Infrastructure Security It s Time to Rethink Your Strategy Cloud Infrastructure Security It s Time to Rethink Your Strategy Infrastructure security used to be easier. Now, it is dramatically more

More information

How To Protect A Data Center From A Hacker Attack

How To Protect A Data Center From A Hacker Attack CHECK POINT & VMWARE NSX AUTOMATING ADVANCED SECURITY FOR THE SOFTWARE-DEFINED DATACENTER Micki Boland Virtual and Cloud Cyber Security Architect mboland@checkpoint.com 2015 Check Point Software Technologies

More information

Assessing the Business Value of SDN Datacenter Security Solutions

Assessing the Business Value of SDN Datacenter Security Solutions IDC SOLUTION BRIEF Assessing the Business Value of SDN Datacenter Security Solutions Sponsored by: Cisco Pete Lindstrom Matthew Marden May 2015 Richard L. Villars Overview CTOs, CIOs, and application architects

More information

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst ESG Lab Spotlight ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst Abstract: This ESG Lab Spotlight examines the

More information

This ESG White Paper was commissioned by Extreme Networks and is distributed under license from ESG.

This ESG White Paper was commissioned by Extreme Networks and is distributed under license from ESG. White Paper Network Solutions for Modern Data Centers By Bob Laliberte, Senior Analyst October 2013 This ESG White Paper was commissioned by Extreme Networks and is distributed under license from ESG.

More information

Cloud and Data Center Security

Cloud and Data Center Security solution brief Trend Micro Cloud and Data Center Security Secure virtual, cloud, physical, and hybrid environments easily and effectively introduction As you take advantage of the operational and economic

More information

Enterprise Strategy Group Getting to the bigger truth. Radware ADC Survey. Final Results. Jon Oltsik, Senior Principal Analyst

Enterprise Strategy Group Getting to the bigger truth. Radware ADC Survey. Final Results. Jon Oltsik, Senior Principal Analyst TM Enterprise Strategy Group Getting to the bigger truth. Radware ADC Survey Final Results Jon Oltsik, Senior Principal Analyst Project Overview 243 completed online surveys with IT professionals responsible

More information

VMware vcloud Networking and Security

VMware vcloud Networking and Security VMware vcloud Networking and Security Efficient, Agile and Extensible Software-Defined Networks and Security BROCHURE Overview Organizations worldwide have gained significant efficiency and flexibility

More information

2016 Firewall Management Trends Report

2016 Firewall Management Trends Report 2016 Firewall Management Trends Report A survey of trends in firewall use and satisfaction with firewall management JANUARY 2016 Copyright 2016 Skybox Security, Inc. All rights reserved. Skybox is a trademark

More information

White. Paper. Information Security, Virtualization, and the Journey to the Cloud. August, 2010

White. Paper. Information Security, Virtualization, and the Journey to the Cloud. August, 2010 White Paper Information Security, Virtualization, and the Journey to the Cloud By Jon Oltsik August, 2010 This ESG White Paper was commissioned by Trend Micro and is distributed under license from ESG.

More information

THE STATE OF THE VIRTUALIZED DATA CENTER IN EDUCATION. CHAPTER 1: Education Trends. CHAPTER 2: SDN & Virtualization

THE STATE OF THE VIRTUALIZED DATA CENTER IN EDUCATION. CHAPTER 1: Education Trends. CHAPTER 2: SDN & Virtualization n ebook DATA CENTER THE STATE OF THE VIRTUALIZED DATA CENTER IN EDUCATION CHAPTER 1: Education Trends CHAPTER 2: SDN & Virtualization CHAPTER 3: Virtualization: Why You Need a Simplified Architecture CHAPTER

More information

Integrated Network Security Architecture: Threat-focused Nextgeneration

Integrated Network Security Architecture: Threat-focused Nextgeneration White Paper Integrated Network Security Architecture: Threat-focused Nextgeneration Firewall By Jon Oltsik, Senior Principal Analyst September 2014 This ESG White Paper was commissioned by Cisco Systems

More information

The Distributed Cloud: Automating, Scaling, Securing & Orchestrating the Edge

The Distributed Cloud: Automating, Scaling, Securing & Orchestrating the Edge White Paper The Distributed Cloud: Automating, Scaling, Securing & Orchestrating the Edge Prepared by Jim Hodges Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.juniper.net October

More information

Hyperconverged Transformation: Getting the Software-defined Data Center Right

Hyperconverged Transformation: Getting the Software-defined Data Center Right Enterprise Strategy Group Getting to the bigger truth. White Paper Hyperconverged Transformation: Getting the Software-defined Data Center Right By Colm Keegan, ESG Senior Analyst February 2016 This ESG

More information

RED HAT OPENSTACK PLATFORM A COST-EFFECTIVE PRIVATE CLOUD FOR YOUR BUSINESS

RED HAT OPENSTACK PLATFORM A COST-EFFECTIVE PRIVATE CLOUD FOR YOUR BUSINESS WHITEPAPER RED HAT OPENSTACK PLATFORM A COST-EFFECTIVE PRIVATE CLOUD FOR YOUR BUSINESS INTRODUCTION The cloud is more than a marketing concept. Cloud computing is an intentional, integrated architecture

More information

MEETING CSIP OBJECTIVES WITH AN AUTOMATED AND PREVENTIVE SECURITY APPROACH

MEETING CSIP OBJECTIVES WITH AN AUTOMATED AND PREVENTIVE SECURITY APPROACH MEETING CSIP OBJECTIVES WITH AN AUTOMATED AND PREVENTIVE SECURITY APPROACH A Palo Alto Networks and Channel Partner Case Study Every day, the U.S. federal government experiences increasingly sophisticated

More information

AURO Enterprise Cloud

AURO Enterprise Cloud AURO Enterprise Cloud White Paper: How AURO Elimitates Vendor Lock In How AURO Eliminates Cloud Lock- In Cloud computing today is significantly improving enterprises and business IT speed, agility and

More information

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle

More information

Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices

Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices Research Report Abstract: Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices By Jon Oltsik, Senior Principal Analyst With Bill Lundell, Senior Research Analyst and Jennifer Gahm,

More information

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION SOLUTION BRIEF Trend Micro CLOUD AND DATA CENTER SECURITY Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION As you take advantage of the operational and economic

More information

Securing the Cloud: Making Cloud an Opportunity to Enhance Security

Securing the Cloud: Making Cloud an Opportunity to Enhance Security Securing the Cloud: Making Cloud an Opportunity to Enhance Security February 2016 Greg Coughlin Director, IBM Security @JGCoughlin 1 The rise of Shadow IT? 2 Security reality we have all been compromised

More information

Private Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Private Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc. Private Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc. Introduction Cloud computing has completely transformed the way business organizations

More information

Software Defined Data Centers Network Virtualization & Security. Jeremy van Doorn Director of Systems Engineering EMEA, Network & Security

Software Defined Data Centers Network Virtualization & Security. Jeremy van Doorn Director of Systems Engineering EMEA, Network & Security Software Defined Data Centers Network Virtualization & Security Jeremy van Doorn Director of Systems Engineering EMEA, Network & Security 1 My business and its IT organization are being engulfed by a torrent

More information

Lab Validation Report

Lab Validation Report Lab Validation Report EMC ProSphere End-to-End Cloud Storage Resource Management By Vinny Choinski with Bob Laliberte January 2012 Lab Validation: EMC ProSphere 2 Contents Introduction... 3 Background...

More information

Research Report. Abstract: The Evolution of Server Virtualization. November 2010

Research Report. Abstract: The Evolution of Server Virtualization. November 2010 Research Report Abstract: The Evolution of Server Virtualization By Mark Bowker and Jon Oltsik With Bill Lundell, John McKnight, and Jenn Gahm November 2010 2010 Enterprise Strategy Group, Inc. All Rights

More information

Cisco Intercloud Fabric for Business

Cisco Intercloud Fabric for Business Data Sheet Cisco Intercloud Fabric for Business Combining the Benefits of Public and Private Clouds in a Hybrid Cloud Cisco Intercloud Fabric for Business enables enterprises to create a seamless hybrid

More information

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! I D C T E C H N O L O G Y S P O T L I G H T S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! December 2014 Adapted from Worldwide Endpoint Security 2013 2017 Forecast and 2012 Vendor Shares by

More information

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services. Security solutions To support your IT objectives Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services. Highlights Balance effective security with

More information

The Emergence of Security Business Intelligence: Risk

The Emergence of Security Business Intelligence: Risk The Emergence of Security Business Intelligence: Risk Management through Deep Analytics & Automation Mike Curtis Vice President of Technology Strategy December, 2011 Introduction As an industry we are

More information