Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Securing Dynamic Cloud Environments


Published on

Digital transformation is driving heterogenous cloud adoption within the enterprise, including:

Private cloud — ongoing data center evolution with virtualization, software-defined networking (SDN), software-defined data center (SDDC)
Public and hybrid cloud — cloud migration with AWS, Microsoft Azure, or other Infrastructure-as-a-Service (IaaS) providers
Software as a Service (SaaS) applications — Office 365, Salesforce, etc.
At the same time, concerns about security, privacy, and compliance have remained key cloud adoption and migration issues. Addressing these requires a multi-cloud security approach that can mitigate the risk of the expanded attack surface across both on-premises and multiple IaaS and SaaS environments.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Securing Dynamic Cloud Environments

  1. 1. SECURING DYNAMIC CLOUD ENVIRONMENTS Cloud adoption is changing how we design and deploy technology Read the white paper Securing Dynamic Cloud Environments for all the details SHARED SECURITY MODEL You secure what you put IN the cloud Host secures the infrastructure Security must become “services” that can be dynamically configured and provisioned SOFTWARE-DEFINED SECURITY PUBLIC CLOUD SECURITY of enterprise workloads will migrate to public cloud by 2018 of organizations have or are considering the implementation of public cloud KEY ELEMENTS TO CONSIDER IN A CLOUD SECURITY SOLUTION Applications have different risk profiles, making segmentation critical APPLICATION-CENTRIC SECURITY Solutions must be tightly integrated with the public cloud provider PROVIDER INTEGRATION PRIVATE CLOUD SECURITY HYBRID CLOUD SECURITY Robust VPN functionality for data migration and accessing third-party sites must be available SECURE CONNECTIVITY Segmented applications will minimize the impact if there is a breach SEGMENTATION A single view across all systems operating in the cloud with centralized management is necessary SINGLE PANE-OF-GLASS MANAGEMENT