Asia-Pacific Cloud Workload Security Industry Guide
The Need for a Cloud-native, Automated, and Scalable Approach toward Cloud Workload Protection
12-Apr-2019
Asia Pacific
Market Research
Businesses are increasingly adopting cloud services as the imperative way to embrace their digital transformation journey. By using cloud services, they are able to leverage on the latest technologies to increase productivity, reduce significant costs in terms of product ownership, operation and maintenance.
Though most businesses know the benefits that cloud services can bring, awareness around security for the cloud or cloud protection remains low due to the misconceptions surrounding it. These are usually about the security responsibility between cloud service providers and businesses themselves.
The misconception is also about the way businesses use technologies to protect cloud workloads. While protecting cloud requires a new approach, many businesses are still using legacy technologies deployed on-premises in the bid to protect their cloud assets. This is no longer effective due to the rapid changing cloud app workloads.
As cloud workloads are increasing in number and getting more complex, businesses need to have visibility into the cloud environment and fully understand what, where, and how to protect these workloads.
Increase in the number of cloud workloads indicates willingness of businesses to use cloud services. The shift from on-premise and private cloud deployment to IaaS, PaaS, or even SaaS service models gives greater flexibility and benefits to companies to focus more on their core business operations. By deploying business workloads in the cloud, companies are given the flexibility and room to adapt to the fast-changing business environments, which ultimately requires frequent changes to workloads.
A cloud workload protection (CWP) solution can be deployed in two different ways, as an agent or an API-based/ Agentless solution. Each deployment can offer advantages and disadvantages to protect workloads in the cloud. Businesses need to evaluate and prioritize needs and requirements in order to make the right decision in choosing the right deployment model for their organizations.
A powerful CWP solution is feature-rich and is able to provide multiple protection capabilities, which include but not limited to the likes of server/ instance discovery, configuration management, workload microservicization/ segmentation and tagging, hypervisor monitoring, app container protection, file integrity monitoring, malware protection, firewalling, intrusion prevention, etc. Not every CWP solution in the market right now offers a full set of these features. Some solutions are designed to manage cloud workloads configuration and monitor cloud workload activity, whereas others focus on compliance monitoring and control, monitoring network assets, identity theft protection, etc.
Author: Anh Tien Vu
Key Findings
Understanding the Cloud Infrastructure
The Rise of Public Cloud Workloads
The Cloud Workloads Landscape
Typical Workloads in the Cloud
Typical Workloads in the Cloud (continued)
Mounting Risks
The Shared-responsibility Security Model
The Failure of Legacy Security Tools
The Failure of Legacy Security Tools (continued)
New Requirements for Cloud Workload Protection
CWP Architecture—Agent-based, Agent-less/API-based and Hybrid
Cloud Workload Protection Architecture
Hybrid Monitoring and Protection Model
Key Features
Key Features (continued)
Key Features (Continued)
Market Landscape
Vendor Profiling—Cisco Systems
Vendor Profiling—Check Point Software Technologies
Vendor Profiling—McAfee
Vendor Profiling—Palo Alto Networks
Vendor Profiling—Symantec
Vendor Profiling—Trend Micro
Vendor Key Capability Comparison
Transformation in CWP Ecosystem
Growth Opportunity—The need for Market Education and Collaborations with Local CSPs
Strategic Imperatives for Success and Growth
Legal Disclaimer
Final Words
The Frost & Sullivan Story
Value Proposition—Future of Your Company & Career
Global Perspective
Industry Convergence
360º Research Perspective
Implementation Excellence
Our Blue Ocean Strategy
Purchase includes:
- Report download
- Growth Dialog™ with our experts
Growth Dialog™
A tailored session with you where we identify the:- Strategic Imperatives
- Growth Opportunities
- Best Practices
- Companies to Action
Impacting your company's future growth potential.
Deliverable Type | Market Research |
---|---|
No Index | No |
Podcast | No |
Author | Vu Anh Tien |
Industries | Information Technology |
WIP Number | PA59-01-00-00-00 |
Is Prebook | No |
GPS Codes | 9532-C1,9702-C1,9705-C1,9659,9887-C1 |