![]() “There’s just a staggering amount of data and processes that they need to figure out, with many of them in multicloud environments,” she stated. Therefore, it follows logically that industry clamor informs their new product decisions and innovations on existing ones.įrom a company perspective, it looks like customers are mostly dealing with data sprawl within and without their Amazon Web Services Inc. Sonrai is a security-focused solutions provider whose offerings help companies reduce risk, ensure compliance and increase operational efficiencies, according to Hayman. And so that’s when I say put identity and data security at the heart of your strategy, that’s what I’m talking about.” What the enterprise is saying That doesn’t really exist in the cloud, s o identities really have become those security boundaries. “ The other side of the coin is the identities,” Kedrosky said. “I n the data center days, we built networks and those became our security boundaries. A nd we put our tools at those boundaries, watched what went in and out, and put our controls there. To solve this, CISOs must identify where their most sensitive data resources reside, prioritize them, and wrap security and identity management resources around them. Summarily, that sharp digression from the way they’ve grown to handle data - and the need to now put security and identity at the forefront of operations - is the primary cloud security concern that’s evident across industries today, according to Kedrosky. And sometimes a lift-and-shift of your process or the way you did something before in the data center just doesn’t work in the cloud.” “One of the things I hear a lot of is that the scale and the speed at which the cloud operates and how to operationalize security within that context is a big challenge that they’re struggling with,” he explained. “ And not to mention the new paradigms and how they’ve sort of shifted from the data center into the cloud world. Thus, they’re having to acclimatize themselves to the rapid speed and scalability that is typical in cloud infrastructures - and the concomitant security challenges therefrom, according to Kedrosky. (* Disclosure below.) Scale and speed in the cloud add complexityĬompanies are moving at an unprecedented rate from conventional data centers and siloes to the cloud. They discussed how today’s CISOs are approaching cloud security threat management and attack mitigation. Hayman and Eric Kedrosky (pictured, left), chief information security officer of Sonrai Security, spoke with theCUBE industry analyst Lisa Martin at the “Cybersecurity - Detect and Protect Against Threats” event, during an exclusive broadcast on theCUBE, SiliconANGLE Media’s livestreaming studio. And m any of them are doing a really awesome job at getting their arms around it by hiring in the right people and looking at the way development has run to figure out what’s important to these people in their clouds.” ![]() “The CISOs that I speak with on the regular, there’s so much chaos out there about what they’re trying to deal with,” said Denise Hayman (pictured, right), chief revenue officer of Sonrai Security Inc. “ They’re trying to take a look at all of the operational policies and pieces that they had put together in their on-prem world and trying to figure out how those same things apply in the cloud. However, even just narrowing it to those environments, it’s evident that chief information officers, chief information security offers, and cybersecurity practitioners have their hands full in today’s threat landscape. Cybersecurity extends beyond just public and on-premises cloud infrastructures. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |