Industry Guide to Cloud Workload Security in Asia-Pacific
Increased Adoption of Public and Hybrid Cloud Technology Creates Strong Need for Cloud Workload Protection
06-May-2020
Asia Pacific
Market Research
The trend of moving data storage to the cloud continued in 2019 due to the need for digital transformation among businesses. With cloud technology, businesses can shorten the time-to-market in developing products and services, optimize infrastructure, streamline and simplify processes, and thus enable overall cost reduction.
The awareness of cloud security has significantly improved among businesses, largely driven by industry regulations and in-country cybersecurity laws. Many businesses state that security and privacy are their biggest concerns when moving to the cloud.
However, misconceptions about cloud security remain, particularly regarding cloud application and cloud workload security; this leads to the misuse of cloud security protection strategies. Additionally, many businesses lack clarity about the responsibility of data security between cloud service providers and the businesses themselves. Due to the ineffectiveness of legacy security solutions (e.g., endpoint security, firewalls, application security), it is vital for businesses to have visibility in the cloud environment and fully understand what, where, and how to protect workloads. Requirements for containers, containerized applications, and serverless workload protection are soaring due to the increased adoption of public cloud and multi-cloud models. Cloud workload protection (CWP) is increasingly integrated with other cloud security management tools, such as vulnerability assessment, security information and event management, security analytics, and log management, to have the full capabilities of risk management for cloud workloads.
CWP solutions are also integrating with other cloud security solutions, such as software-defined and virtual firewalls, cloud identity access management (IAM), cloud access security broker (CASB) for data security, advanced endpoint detection and response for server workload threat detection and response, and malware protection.
These solutions will be increasingly integrated with artificial intelligence and machine learning to drive the automation and orchestration of threat detection and response with minimal or no manual intervention. Mergers and acquisitions (M&A) continue to take place among security companies. Traditional security companies will use this as one of effective strategies to strengthen their product portfolios for cloud protection.
Companies mentioned in this Asia-Pacific Cloud Workload Security Industry Guide include Amazon Web Services, Google Cloud, IBM Cloud, Microsoft Azure, Oracle, VMware, Cisco Systems, Check Point Software Technologies, Palo Alto Networks, McAfee, Symantec, Trend Micro, VMware Carbon Black, and CrowdStrike.
Author: Kenny Yeo

Key Findings
Key Findings (continued)
What is a Cloud Workload?
The Rise of Public Cloud Workloads
Workloads in the Cloud
Typical Workloads in the Hybrid Cloud
Typical Workloads in the Hybrid Cloud (continued)
Mounting Risks to Data Security
The Shared-Responsibility Security Model
The Failure of Legacy Security Tools
The Failure of Legacy Security Tools (continued)
The Failure of Legacy Security Tools (continued)
Key Requirements for Cloud Workload Protection
Key Requirements for Cloud Workload Protection––Failure of Legacy Security Tools
Key Requirements for Cloud Workload Protection––Failure of Legacy Security Tools (continued)
What is Cloud Workload Protection (CWP)?
Cloud Workload Protection Architecture
CWP Architecture—Agent-based, Agent-less or API-based, and Hybrid
Hybrid Monitoring and Protection Model
Cloud Workload Protection Layers
Cloud Workload Protection Layers (continued)
Cloud Workload Protection Layers (continued)
Cloud Workload Protection Layers (continued)
Market Landscape
Cloud Workload Protection by Amazon Web Services (AWS)
Cloud Workload Protection by Google Cloud
Cloud Workload Protection by Microsoft Azure
Cloud Workload Protection by IBM Cloud
Cloud Workload Protection by Oracle
Cloud Workload Protection by VMware
Cloud Service Providers Key Capability Comparison
Vendor Profiling—Cisco Systems
Vendor Profiling—Check Point Software Technologies
Vendor Profiling—McAfee
Vendor Profiling—Palo Alto Networks
Vendor Profiling—Symantec
Vendor Profiling—Trend Micro
Vendor Profiling—VMware (Carbon Black)
Vendor Profiling—Crowdstrike
Vendor Key Capability Comparison
Transformation in CWP Ecosystem
Growth Opportunity 1—Market Education Essential at Early Stage Along with Collaboration with Local CSPs
Growth Opportunity 2—Increasing Need for Managed CWP Services
Growth Opportunity 3—Foresee More Threat Intelligence Service Integration
Growth Opportunity 4—Need for DevSecOps and Security Training
Strategic Imperatives for Success and Growth
The Last Word
Legal Disclaimer
List of Exhibits
The Frost & Sullivan Story
Value Proposition: Future of Your Company & Career
Global Perspective
Industry Convergence
360º Research Perspective
Implementation Excellence
Our Blue Ocean Strategy
Purchase includes:
- Report download
- Growth Dialog™ with our experts
Growth Dialog™
A tailored session with you where we identify the:- Strategic Imperatives
- Growth Opportunities
- Best Practices
- Companies to Action
Impacting your company's future growth potential.
Deliverable Type | Market Research |
---|---|
No Index | No |
Podcast | No |
Author | Kenny Yeo |
Industries | Information Technology |
WIP Number | PAF3-01-00-00-00 |
Is Prebook | No |
GPS Codes | 9532-C1,9659 |