Facebook Twitter Instagram
    Trending
    • 5 Ways Technology Makes Your Business Efficient
    • The Journey from Tech Side Project to Return on Investment
    • Top 3 Best Tech Advancements to Help You De-Stress
    • Advancements in Car Technologies Affecting Infrastructure Development
    • David Marcus Talks about the Blurred Lines in Cybersecurity
    • Audi and the Massive Automotive Changes Between 2025 and 2030
    • How to Deploy Managed IT Services in a Mixed Mac and Windows Environment
    • 5 Tech Developments That Have Revolutionized Investing
    TechSpective
    • RSS
    • Facebook
    • Twitter
    • Google+
    • LinkedIn
    • Instagram
    • Pinterest
    • News & Analysis
      Featured
      March 6, 20211

      Fixing The World One Person At A Time: Cisco Networking Academy

      Recent
      April 9, 2021

      CISO Panel Discussion Weighs in on Cybersecurity in the Digital Age

      April 2, 2021

      FTC vs. Qualcomm: Did Apple Illegally Influence The FTC?

      April 2, 2021

      A Look at Microsoft Mesh

    • Business
      Featured
      March 6, 20211

      Fixing The World One Person At A Time: Cisco Networking Academy

      Recent
      April 21, 2021

      5 Ways Technology Makes Your Business Efficient

      April 21, 2021

      The Journey from Tech Side Project to Return on Investment

      April 19, 2021

      How to Deploy Managed IT Services in a Mixed Mac and Windows Environment

    • Security
      Featured
      March 7, 20211

      Pandemic Unmasks Vulnerability to Automated Bot Attacks

      Recent
      April 13, 2021

      Shashi Prakash Chats about Cryptocurrency and NFT Fraud

      March 30, 2021

      Exploiting Embedded Linux Devices Through the JTAG Interface

      March 28, 2021

      Zero Trust for Data

    • Microsoft
      Featured
      September 12, 20201

      The Microsoft Surface Duo: The Communications Device for Those That Think Different

      Recent
      September 12, 2020

      The Microsoft Surface Duo: The Communications Device for Those That Think Different

      July 13, 2020

      Learning from the Microsoft Store Failure

      May 15, 2020

      The Microsoft Surface Earbuds: How Many Ways Can You Say “Awesome!”?

    • Podcasts
    • Technology
      Featured
      March 1, 20212

      Could Home Study Be Better for Education? Using Technology to Craft a Better Tomorrow

      Recent
      April 21, 2021

      Top 3 Best Tech Advancements to Help You De-Stress

      April 20, 2021

      Advancements in Car Technologies Affecting Infrastructure Development

      April 19, 2021

      Audi and the Massive Automotive Changes Between 2025 and 2030

    • Reviews
      Featured
      March 4, 20210

      Dell’s UltraSharp 40 – Improving Work and Workplaces with Monitor Innovations

      Recent
      8.0
      March 29, 2021

      Review: Peril Protect

      10.0
      March 15, 2021

      Review: Tesla Puddle Lights

      9.0
      March 13, 2021

      Review: Ubiquiti UniFi Dream Machine Pro

    TechSpective
    You are at:Home»Cloud»Cloud Takes Center Stage at RSA Conference, Yet Still a Long Way to Go
    Binary Cloud Security
    Image credit DevOps.com

    Cloud Takes Center Stage at RSA Conference, Yet Still a Long Way to Go

    0
    By Tony Bradley on March 9, 2016 Cloud, Cloud Apps, Cloud Data, Containers, DevOps, Hybrid Cloud, Private Cloud, Public Cloud

    I spent last week in San Francisco at the RSA Conference. The annual event is the biggest event for the security industry and takes over the Moscone Center and surrounding area. Throughout the week I walked the show floor, visited vendor booths, and listened to pitches from companies. This is the first in a series of articles summing up my thoughts from this year’s RSA Conference.

    Let’s start with the cloud. There is certainly no shortage of vendors using the word “cloud”, as it continues to be one of the prevailing buzzwords driving IT security—and IT in general. Although cloud seems to play a starring role, though, it seems to be missing in the ways that it would provide the most value—namely the ability for companies to secure and protect assets and data in the cloud.

    Tenable Network Security put together a montage of interviews of Tenable experts—myself included—sharing what they saw at RSA. If you watch the video, you’ll see that almost all of us mention the cloud in some way.

    The cloud is not new, but it is still gaining steam and more of our computing is being done in the cloud. The vast majority of the booths on the floor at RSA, however, are companies pitching tools that seem ill-equipped for cloud and instead focus on the legacy desktop / server model. In general, it seems like there are more cloud-based security solutions, but few solutions for securing the cloud itself. It seems like we need more cloud-focused solutions, or—more importantly—solutions that span legacy and cloud and can protect applications and data no matter where they are.

    “I noticed the same thing on the floor, and it’s a symptom of two things,” explains Grant Shirk, senior director of product marketing for Vera. “First, it’s an evolving response to threat management—a race. But, you can’t ever overtake a speeding train if you’re chasing it on the same track, no matter how fast you go. You need a different track. And second, cloud adoption is providing new fuel and new fears to more established organizations.”

    Shirk adds, “The benefit here is that I’m seeing a new crop of security companies—like Vera, Illumio, Menlo Security, and Skyport Systems—that are using the flexibility and availability of the cloud to bridge the gap between legacy infrastructure and cloud. While cloud adoption is at its peak, there’s still a lengthy transition for companies to work though, and that may take more than a few years.”

    Klaus Gheri, VP of network security for Barracuda, says, “We found that going cloud or in other terms becoming increasingly dispersed as an organization also adds new operational challenges. The threats don’t actually change very much but many vendors have a hard time adjusting both their products and sales or support models to cloud.”

    As evidence, Gheri describes an example that providing high quality cloud service access to your workforce may conflict with the concept of backhauling traffic for centralized inspection at a single breakout point to the Internet. Doing this from almost any location will require many more security devices. This can add a policy management challenge as well as a need for an overly large infrastructure investment if the wrong products are used. “The good news is that there are proven alternatives for the hybrid world available but it may mean you have to ditch your favorite suppliers.”

    One of the primary benefits of migrating to the cloud is scalability and the ability to fluidly modify the entire infrastructure to meet demand. Virtual servers can be created and destroyed at the push of a button. The entire cloud infrastructure can change from minute to minute. With DevOps and container platforms that volatility can become exponentially greater—making it that much more difficult to even know what assets and data are on your network at any given point in time—never mind trying to effectively secure and defend them.

    Next year—and in the years to come—I expect to continue to hear the word “cloud” at the RSA Conference. My hope, however, is that it will be less about just moving existing security solutions to the cloud, and more about adapting and evolving security solutions to address the unique challenges of securing a cloud infrastructure.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleSocial is the New BYOD: Managing the Risks of Social Media Communications
    Next Article Apple vs FBI Battle Casts Shadow Over RSA Conference
    Tony Bradley
    • Website
    • Facebook
    • Twitter
    • LinkedIn

    I have a passion for technology and gadgets--with a focus on Microsoft and security--and a desire to help others understand how technology can affect or improve their lives. I also love spending time with my wife, 7 kids, 2 dogs, 5 cats, 1 rabbit, 2 ferrets, a pot-bellied pig, and sulcata tortoise, and I like to think I enjoy reading and golf even though I never find time for either. You can contact me directly at tony@xpective.net. For more from me, you can follow me on Twitter, Facebook, Instagram and LinkedIn.

    Related Posts

    The Journey from Tech Side Project to Return on Investment

    METACO Validates IBM’s Hierarchal Ultra-Secure Cloud Strategy

    How RHCOS Can Help You Secure Your Cluster’s Node Images

    Comments are closed.

    Site Sponsors
    Qualys
    Intel
    Adobe
    PopSpective
    Coffee and Politics
    DevOps.com
    • Technology
    • Popular
    • Top Reviews
    April 21, 2021

    Top 3 Best Tech Advancements to Help You De-Stress

    April 20, 2021

    Advancements in Car Technologies Affecting Infrastructure Development

    April 19, 2021

    Audi and the Massive Automotive Changes Between 2025 and 2030

    9.0
    July 14, 2016

    Review: Lenovo Yoga 900S

    9.5
    March 2, 2015

    Review: Asus Zenbook UX305 ultrabook

    8.0
    February 9, 2015

    Review: Burg 12 smartwatch

    9.7
    November 16, 2018

    Review: BlackVue DR900S-2CH Vehicle Dash Cam

    9.5
    September 2, 2015

    Review: Microsoft Band

    May 27, 2014

    Protect your family photos with ScanMyPhotos

    PopSpective
    Popular Posts
    9.0
    July 14, 2016

    Review: Lenovo Yoga 900S

    9.5
    March 2, 2015

    Review: Asus Zenbook UX305 ultrabook

    8.0
    February 9, 2015

    Review: Burg 12 smartwatch

    Adobe
    Adobe
    Coffee and Politics
    About

    TechSpective covers technology trends and breaking news in a meaningful way that brings value to the story, and provides you with information that is relevant to you. We offer in-depth reporting and long-form feature stories, as well as breaking news coverage, product reviews, and community content in plain English terms, and with a unique perspective on technology.

    Qualys
    © 2020 Xpective, Inc.
    • About
    • Privacy
    • Advertise
    • Subscribe
    • Contact

    Type above and press Enter to search. Press Esc to cancel.