Finding and protecting business-critical applications and data

Visibility and security controls for internet-based applications such as social media, file sharing and email have been widely adopted at the perimeter. As we transition from the legacy perimeter security model to a cloud security model, there is a need to ensure we don’t forget the principles we have established. 

Virtualization has changed how applications are built, deployed and used. It has also created challenges to how security is applied and deployed for these environments. That isn’t necessarily a bad thing; the result of these challenges has driven new innovation in the cloud security space.

+ Also on Network World: The tricky, personal politics of cloud security +

Discovering and mapping application communications and dependencies is one of the first steps in defining and creating security policies for east-west data center traffic. Unfortunately, there is often a lack of understanding about these relationships, making east-west security policies difficult to implement and often prone to misconfiguration. As a result, we still see an abundance of successful attacks and the loss of critical data, even with traditional perimeter security models in place.

Layer 7 visibility and enforcement for the cloud

Layer 7 information provides context about applications, and that context improves the accuracy of the security controls that can be applied. This information is the first step in being able to define security policies that can prevent attacks (such as protocol hijacking or exfiltration) in complex enterprise environments.

Leave a Reply

Your email address will not be published. Required fields are marked *