흔치 않은 클라우드 전반의 단순성
경영진의 91%가 "퍼블릭 클라우드 환경 전반에서 일관성"을 개선하고자 합니다.
현대화가 필요한 애플리케이션
개발자의 68%가 최신 애플리케이션 프레임워크, API 및 서비스 사용을 확장하고자 합니다.
일상화된 분산된 업무 모델
기업 직원의 72%가 기존과 다른 환경에서 업무를 수행합니다.
하향식 우려 사항인 보안
보안, 데이터 및 개인 정보 보호 문제와 관련된 리스크는 여전히 멀티 클라우드의 최우선 당면 과제로 남아 있습니다.
더 빠른 제품 생산
모든 퍼블릭 클라우드 또는 온프레미스 Kubernetes 클러스터에서 빠르고 안전하게 구축하고 배포할 수 있습니다.
Kubernetes 운영 간소화
안전한 멀티 클라우드 컨테이너 인프라를 대규모로 구축하고 운영할 수 있습니다.
애플리케이션 개발 전문가와 연결
기존 애플리케이션을 현대화하고 혁신적인 신제품을 구축하여 가치를 실현할 수 있습니다.
매력적인 경험 제공
기기 선택권, 유연성과 더불어 원활하고 지속적이며 수준 높은 환경을 통해 직원을 우선시합니다.
오늘날의 Anywhere Workspace 보호
상황 인텔리전스 및 연결된 제어 지점을 통해 간편하게 제로 트러스트로 전환합니다.
업무 공간 자동화
지능적 규정 준수, 워크플로우 및 성능 관리를 통해 업무가 아닌 성과를 관리합니다.
워크로드 보호 및 연결
VMware 툴에 내장된 투명성을 통해 애플리케이션, 사용자 및 엔터티 전반에서 일관된 보안 및 네트워킹 운영 환경을 구현할 수 있습니다.
API 보호 - 새로운 엔드포인트
애플리케이션 속도를 높이고 위치에 관계없이 중앙에서 클러스터를 관리, 보안, 연결 및 통제할 수 있습니다.
사용자, 엔드포인트 및 네트워크에 기본 제공되는 위협 인텔리전스를 통해 동적 환경에서 보호 기능을 강화할 수 있습니다.
Businesses are juggling a lot at the moment, but there are two non-negotiables which they can’t faulter on, whatever the circumstances. One is to deliver consistently exceptional experiences to users, whether internal or external. And the other is securing the applications, devices and infrastructure on which these experiences are founded and built.
Yet, with the consequences of a breach so high, companies are struggling to prevent one priority from offsetting the other. In fact, 61% of IT teams and 52% of developers say that security policies are proving a barrier to innovation, and by extension, differentiated experiences. Years of bolting on new solutions and products to protect against an evolving threat landscape - a trend accelerated with the rise in hybrid working – have rendered many organisations’ IT estates a vulnerable mess of platforms, systems, and solutions. It’s not a pretty picture, and certainly not conducive to an iterative and collaborative approach to innovation.
Many organizations are rightly enlisting the help of trusted partners to combat this challenge. Their ability to objectively assess a company’s IT environment, alongside its immediate business priorities, means they’re best placed to help develop a plan that will achieve the all-important balance of security solutions (and perspectives), and inform an intrinsic defence that facilitates both security and innovation.
It’s this holistic view that makes partners inherently valuable. But as I touched on in my conversation below with my colleague Scott McKinnon, Principal Security Architect, EMEA at VMware, it requires an in-depth understanding of how security should look across each business.
As McKinnon said, “Security needs to be like electricity in a building – when you need it, you plug into a socket and you consume what you need. This isn’t happening at the moment, and this is the opportunity for partners.” As is the case with any successful partnership, working hand-in-hand with organizations is key to understand their internal parameters and business drivers, and how security can deliver against them.
“There are three key areas at stake,” McKinnon continued, “What it means for the user, what it means for workloads, apps and data, and what it means for security operations.”
Those three buckets can be boiled down as follows:
Underpinning it all is the concept of zero trust. Organization everywhere are talking about this approach, but as McKinnon rightly asks: “are they actually implementing it?”
In today’s world of apps, data and constant sharing of networks and information, enterprises are turning to zero trust to deliver dynamic security.
Apps are the key driver in this process. They’ve gone from being simple things in one location to decomposed apps distributed across multiple clouds. Right now, we’re seeing an explosion in the volume of SaaS-based apps and apps running on hyperscaler infrastructure. Many companies think they have deployed zero trust effectively to cater for all this, but the true implementation requires the introduction of a huge number of controls, across apps, endpoints and users. Truthfully, they’re likely some way off.
Partners have a big role to play in bringing together disparate, siloed parts of businesses that struggle to connect with each other if this vision for intrinsic, zero trust security is to be realized.
In our conversation McKinnon advised that, “We keep hearing of the gap between IT, developers and security. Partners are the bridge that brings all that together. They can talk to the different teams in the right languages; they can bring the outside perspective on how a policy can be implemented; they can audit and identify the gaps in protection”. Ultimately it’s partners that can take a holistic view, using their informed yet detached position, to help solve the problems of organizations, so they can drive the coordination that’s needed between the different parties.
Partners seeking to have that level of impact need to understand what the business’ current IT landscape looks like first. It’s about assessing the ‘As Is’: what the business wants (strategically) and what it needs from its security, where vulnerabilities lie, and which consolidated or optimization opportunities might exist.
And it’s that last part that is so valuable. It’s simply not feasible or efficient for businesses to throw away current investments and technology. Instead these assessments should highlight which existing solutions are being underutilized and could be better used, alongside which vendors offer complementary tools. It’s part of the process of going beyond being a transactional supplier, and instead positioning you and your organization as a strategic partner and advisor.
Partners provide the opportunity for businesses to transform chaos, complexity and restriction transformed into order, innovation and dynamism, without compromising the security of their users, workloads and operations. Security no longer needs to be viewed as a barrier to change. In fact, quite the opposite. Security is now a vital tool for realigning business priorities and delivering great user experiences, the number one priority of modern business.
For more on the topic, visit here.