SINGAPORE, Nov. 23, 2022 /PRNewswire/ — In recent times, despite initial cybersecurity concerns, the agility and scalability benefits that cloud computing enables, especially during the pandemic-related lockdowns of previous years, outweigh the security risks and performance.
Vladimir M. Yordanov, Senior Director of Solution Engineering for Gigamon Asia Pacific and Japan
A study commissioned by Gigamon and conducted by Frost & Sullivan titled “Cybersecurity, Visibility, and the Cloud” revealed that 53% of APAC organizations have more than half of their business workloads in the cloud, with the majority preferring a hybrid approach of combining on-premise environments with cloud infrastructure.
This exacerbates visibility issues, especially since 90% of APAC organizations will use a minimum of two cloud service providers (CSPs) for strategic reasons such as competitive pricing and avoiding vendor lock-in.
These points to the inevitable – organizations need to begin balancing the risk of having their workloads hosted in multiple environments with the productivity and agility gains offered by cloud computing.
With the growing acceptance of the cloud, the hybrid cloud trend is likely to persist for the foreseeable future.
Although APAC organizations prefer to maintain majority control over their infrastructure and data to maintain the greatest possible visibility, whether on-premises, hybrid or multi-cloud.
An expanding IT heritage and the challenge of visibility
44% of APAC organizations surveyed have 50 to 81% of their workloads on an Infrastructure-as-a-Service platform. Visibility is set to become exponentially difficult as most organizations have at least two CSPs that anticipate growth in device endpoints and attack surfaces.
Additionally, 86% of APAC respondents agree that visibility into network traffic from cloud security tools is important if not critically important. There is an awareness of the need to maintain data fidelity by streamlining all this cloud traffic and the platform has proven to be one approach to achieve this.
Growing cloud diversity and compliance
Organizations are now willing to compromise and fine-tune a balance between cybersecurity risks and the efficient productivity that cloud computing enables.
The answer to this balance is deep visibility into network activity within an organization’s perimeter. But network security and monitoring tools designed for an on-premises world typically lack visibility into cloud environments, applications, and services. The same goes for agent- and log-based cloud security and monitoring tools.
This is a major challenge in understanding traffic behavior and data residing in virtual machines and containers.
This opaque network traffic and the messy proliferation of cloud security tools that 68% of CIOs Frost & Sullivan surveyed say they update every 3 to 4 years are huge barriers to visibility.
Collectively, the following factors increase the agility but also the diversity and thus complexity in cloud protection:
- Deployment architecture: on-premise, cloud, hybrid, virtual
- Deployment types: multi-cloud, cloud service tiers
- OSI layers: applications, networks, devices
- Number of suppliers
Complete visibility, on the other hand, can enable organizations to take control of their entire network infrastructure from core to cloud. That’s because network, metadata, and application layer insights provide critical context of the entire network surface for better security and performance management.
Regulatory pressure to comply with a more detailed view of the attack surface now makes adequate visibility no longer a useful capability, but a must-have capability, and Frost & Sullivan believes 50% of organizations will need increased technology investments to comply with this guide.
The survey report also recommended that cloud tools and processes be flexible, again indicating the need for a platform-based approach and a solution that can integrate seamlessly with the source of these complexities, as well as provide the check.
The responsibility to ensure
One thing is certain: the role of an organization’s cybersecurity operations must expand in proportion to the degree of potential risk from increased use of the public cloud. This certainly requires addressing visibility challenges in public clouds, which Gigamon is uniquely able to solve with its Visibility and Analytics Fabric solutions.
As organizations struggle to protect what is within their environment, they also must contend with where their cloud provider’s liability ends and their own accountability begins. Cloud service providers will always be responsible for securing the physical infrastructure and virtualization platform, for example with the IaaS model. But it is the customer who is responsible for security in the cloud.
A clear delimitation of responsibilities must be established from the outset. But both parties must work together to protect on-premises applications and data, as well as applications and data in the cloud.
This silo calls for effective cloud monitoring that melts the “walls” between vendors’ and customers’ views of threat surfaces and provides a single pane of glass to view the entire IT asset of the enterprise.
Deep and continuous visibility at scale with no latency
91% of Frost & Sullivan respondents admit that visibility into network traffic is of paramount importance when evaluating cloud security tools. These CIOs recognize that they need to understand the behavior and usage activities on the surface of the threat to effectively protect it.
The Gigamon HawkDeep Observability Pipeline it breaks down the silos mentioned earlier by giving different teams – network operations, cloud operations and information security – a clear, complete and consistent view of what is happening across all different environments. This consistent vision breaks down traditional silos and provides a way to streamlined, actionable insights that proactively address performance and security risks.
Another criterion also required by CIOs is the ability to streamline all cloud traffic without compromising data fidelity. A best practice approach is to implement a platform-based solution that consolidates all of this cloud traffic to provide a single pane of glass.
This streamlining of many into one also allows organizations to effectively and efficiently enforce zero trust policies.
Overall, this also resoundingly ticks the checkbox of compliance with guidelines imposed by industry regulators.
Powerful business threat intelligence sharing
Gigamon Hawk integrates with Gigamon’s ThreatINSIGHT for more context and insights into data moving across their network. ThreatINSIGHT is a cloud-based solution useful for the activities and processes of a Security Operations Center (SOC).
With machine learning (ML), behavior analytics, and curated threat intelligence that can be connected from other companies in the same industry, the result is the powerful ability to detect known, emerging, and unknown threats. In this way, organizations can ensure that their incident response, delivery and investigation processes are adapted to public cloud workloads.
Also useful GigaVUE Cloud Suite, which reduces the complexity and cost of finally having visibility of tools and traffic on a multi-architecture environment.
Overall, Gigamon has a suite of observability tools and solutions that help enterprises comply with regulatory authority guidelines while fully realizing the transformative power of public cloud computing in a resource-efficient and cost-effective manner.
Gigamon offers a deep observability pipeline that leverages actionable network layer intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to ensure security and compliance governance, accelerate root cause analysis of performance bottlenecks, and reduce operational costs associated with managing hybrid and multi-cloud IT infrastructures. The result: Modern businesses realize the full transformative promise of the cloud. Gigamon serves over 4,000 customers worldwide, including more than 80% of Fortune 100 companies, nine of the top 10 mobile network providers, and hundreds of government and educational organizations worldwide. For the full story on how Gigamon can help you realize the power of deep observability, visit https://www.gigamon.com/ and follow us Chirping And LinkedIn.
This article is published on behalf of Gigamon. For interview opportunities or further information, please contact via email, call, text or whatsapp: