Public and private clouds are getting a big boost as new innovations in network security extend what was once only available in the physical world, to the virtual. With the recent string of targeted attacks it's never been more critical that you build an effective strategy that extends the same levels of security used on your physical network to your virtual network.
The use of SaaS (software as a service) applications is creating new risks and gaps in security visibility for malware propagation, data leakage and regulatory non-compliance. Aperture delivers complete visibility and granular enforcement across all user, folder and file activity within sanctioned SaaS applications, providing detailed analysis and analytics on usage without requiring any additional hardware, software or network changes.
An insatiable appetite for compute and storage resources, combined with cloud-first development initiatives to support your business, is driving a data center transformation that incorporates the public cloud as a means of more rapidly addressing your growing data center demands. Commonly referred to as a hybrid data center, the use of the public cloud not only helps address your growing data center demands but provides you with the added benefits of agility, scalability and global reach.
From a security perspective, the responsibility for protecting your public cloud is shared between both the provider and the user – you. It is up to you to ensure satisfaction with the steps a provider has taken to protect the public cloud environment. It is also up to you to make sure you take the necessary steps to protect your applications and data in the public cloud.
Regardless of where your applications and data reside, they are an attacker's target and protecting them in the cloud introduces the same security challenges you face present in your on-premises data center. To that end, your public cloud security solution should be consistent with what is deployed in your data center so that, no matter where the application and data reside, security is the same.
Making the challenge of protecting your data a bit more difficult is the fact that many of the principles that make cloud computing attractive are counter to network security best practices.