1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Cloud Security: A Mismatch for Existing Security Processes and Technology

Discussion in 'Network World' started by RSS, May 19, 2016.

  1. RSS

    RSS New Member Member

    To use a long-forgotten metaphor, cloud deployment is moving forward at Internet speed at many enterprise organizations. According to ESG research, 57% of enterprise organizations use public and private cloud infrastructure to support product applications/workloads today and an overwhelming majority of organizations will move an increasing number of applications/workloads to cloud infrastructure over the next 24 months (note: I am an ESG employee).

    Now no one would argue the fact that cloud computing represents a different compute model, but it is really based upon the use of server virtualization for the most part. And since a VM is meant to emulate a physical server, many organizations approach cloud security by pointing traditional security processes and technologies at cloud-based workloads. This behavior is illustrated in a recent ESG research survey where cybersecurity and IT professionals were asked if their organizations used existing security technologies and processes for security workloads residing in cloud infrastructure (i.e. public and private). A vast majority (92%) said they did so, “extensively or somewhat.”

    To read this article in full or to leave a comment, please click here

    Continue reading...

Share This Page