Network Computing is part of the Informa Tech Division of Informa PLC
This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC’s registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
Business decision-makers today are constantly looking for the most efficient way possible to leverage new applications to grow revenue. Seems like business basics, right? The applied version of this is that most businesses today are looking for this benefit without having to deal with the cost of building an infrastructure to support those applications. Nevertheless, at last, a solution has been provided, and now with the public cloud, businesses can do exactly that – deploy apps immediately without building datacenters, planning resiliency, racking hardware, and more. Essentially, these businesses are getting the benefit, with a lot less cost attached. This mentality and structure are rapidly becoming the normal expectation with regard to how businesses are adopting new technology.
One would assume this means security would also be keeping up with the rest of business adoption strategies. However, for one reason or another, many organizations cling to an outdated model where they still use a box-based model – even in the cloud. There are many steps an organization hurdles before laying out the framework for their security strategy, such as the tremendous amount of work to deploy, maintain and use. However, once racked and plugged in, hardware really isn’t that different than a software appliance.
Let’s take a step back to understand this picture a little clearer.
This particular roadmap suggests a 70/30 cost/benefit of maintaining infrastructure/security benefit, which is antithetical to cloud in that the process treats cloud like a datacenter eliminates much of the business benefit. This puts in conflict with both current staffing models and business expectations.
Instead, businesses should consider a cloud-first approach to be consumed and managed as a service. In this model, the service manages itself, so the team focuses on apps and policies and eliminates steps such as integrating RAS approaches for the build, adding and patching boxes, or monitoring any boxes. The roadmap is simplified to a very straightforward process of adding accounts / VPCs, defining policies, and operating by reviewing logs in the preferred tools.
With this adjustment to the cloud-first approach as a managed service, the cost/benefit changes significantly to more like 10/90 (maintaining infrastructure/security benefit). This shift creates a massive reduction in the overhead of having network security. This, in line with cloud principles and business expectations, using technology and actually benefiting from it rather than maintaining it.
Let’s zoom out to a larger high-level view again. While much of the network security discipline is the same, the implementation must change. In particular, this means businesses should address cloud-specific security problems and need to get network security in line with the cloud model – furthermore in line with business expectations.
So now that businesses understand what the ideal network security service looks like for their organization, the important question to ask next is – “how to move forward?”
The transition from network security boxes to a network security service will likely be a gradual approach. Ideally, start with one aspect and, in turn, adopt others. In many cases, organizations will lead with a purely ops-oriented transition, only later following with cloud-centric policies, adoption of cloud constructs, and a cloud-native app architecture. In other cases, it might be led by architecture. The difference really depends on particular skill sets and the training available.
The second approach to the transition is when an organization wants to go native from the start. In this case, the architecture, security policies, adoption of dynamic cloud constructs and ops are all modern. This second approach is a much steeper learning curve. However, with it, organizations will certainly see immediate benefits.
So, while the rest of the business world has already been fast-tracking their processes through leveraging applications in every which way – now is the time for security to get up to speed. There is no reason for security to lag behind and stick to old models when there are the capabilities and infrastructure to enable cloud-first network security. Use these tools to your advantage and let a cloud-first structure do the heavy lifting. After all, it truly is finding the benefit without the cost.
Vishal Jain is CTO and Co-Founder of Valtix.
How to hamper the adversary using AI-Powered cybersecurity.
Zero-shot AI can function as an almost omnipresent figure that’s constantly analyzing logs, network traffic, and user actions to scan for irregularities.
Secure boot features are typically customizable and capable of being turned on or off by the OEM. The question then arises of which mode should be the default.
Organizations are tacitly agreeing to accept greater risk by moving quickly without equal attention to security. The new normal we heard so much about throughout the pandemic is apparently “insecure by default.”
Zero Trust allows IT professionals to maintain a high level of security despite the extending boundaries of the network perimeter due to the increased use of cloud and remote work.
Copyright © 2021 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and head office is 5 Howick Place, London, SW1P 1WG.

source

You May Also Like

Creating a Modern, Zero Trust Infrastructure: It’s a Journey

Network Computing is part of the Informa Tech Division of Informa PLCThis…

Securing Private Cloud Workloads Using Zero Trust Methodologies

Zero trust is so much more than simply controlling authentication and authorization…