Industry Guide to Cloud Workload Security in Asia-Pacific

Industry Guide to Cloud Workload Security in Asia-Pacific

Increased Adoption of Public and Hybrid Cloud Technology Creates Strong Need for Cloud Workload Protection

RELEASE DATE
06-May-2020
REGION
Asia Pacific
Research Code: PAF3-01-00-00-00
SKU: IT04074-GL-MR_24195
AvailableYesPDF Download

$3,000.00

Special Price $2,250.00 save 25 %

In stock
SKU
IT04074-GL-MR_24195

$3,000.00

$2,250.00save 25 %

DownloadLink
ENQUIRE NOW

Description

The trend of moving data storage to the cloud continued in 2019 due to the need for digital transformation among businesses. With cloud technology, businesses can shorten the time-to-market in developing products and services, optimize infrastructure, streamline and simplify processes, and thus enable overall cost reduction.

The awareness of cloud security has significantly improved among businesses, largely driven by industry regulations and in-country cybersecurity laws. Many businesses state that security and privacy are their biggest concerns when moving to the cloud.

However, misconceptions about cloud security remain, particularly regarding cloud application and cloud workload security; this leads to the misuse of cloud security protection strategies. Additionally, many businesses lack clarity about the responsibility of data security between cloud service providers and the businesses themselves. Due to the ineffectiveness of legacy security solutions (e.g., endpoint security, firewalls, application security), it is vital for businesses to have visibility in the cloud environment and fully understand what, where, and how to protect workloads. Requirements for containers, containerized applications, and serverless workload protection are soaring due to the increased adoption of public cloud and multi-cloud models. Cloud workload protection (CWP) is increasingly integrated with other cloud security management tools, such as vulnerability assessment, security information and event management, security analytics, and log management, to have the full capabilities of risk management for cloud workloads.

CWP solutions are also integrating with other cloud security solutions, such as software-defined and virtual firewalls, cloud identity access management (IAM), cloud access security broker (CASB) for data security, advanced endpoint detection and response for server workload threat detection and response, and malware protection.
These solutions will be increasingly integrated with artificial intelligence and machine learning to drive the automation and orchestration of threat detection and response with minimal or no manual intervention. Mergers and acquisitions (M&A) continue to take place among security companies. Traditional security companies will use this as one of effective strategies to strengthen their product portfolios for cloud protection.

Companies mentioned in this Asia-Pacific Cloud Workload Security Industry Guide include Amazon Web Services, Google Cloud, IBM Cloud, Microsoft Azure, Oracle, VMware, Cisco Systems, Check Point Software Technologies, Palo Alto Networks, McAfee, Symantec, Trend Micro, VMware Carbon Black, and CrowdStrike.

Author: Kenny Yeo

RESEARCH: INFOGRAPHIC

This infographic presents a brief overview of the research, and highlights the key topics discussed in it.
Click image to view it in full size

Table of Contents

Key Findings

Key Findings (continued)

What is a Cloud Workload?

The Rise of Public Cloud Workloads

Workloads in the Cloud

Typical Workloads in the Hybrid Cloud

Typical Workloads in the Hybrid Cloud (continued)

Mounting Risks to Data Security

The Shared-Responsibility Security Model

The Failure of Legacy Security Tools

The Failure of Legacy Security Tools (continued)

The Failure of Legacy Security Tools (continued)

Key Requirements for Cloud Workload Protection

Key Requirements for Cloud Workload Protection––Failure of Legacy Security Tools

Key Requirements for Cloud Workload Protection––Failure of Legacy Security Tools (continued)

What is Cloud Workload Protection (CWP)?

Cloud Workload Protection Architecture

CWP Architecture—Agent-based, Agent-less or API-based, and Hybrid

Hybrid Monitoring and Protection Model

Cloud Workload Protection Layers

Cloud Workload Protection Layers (continued)

Cloud Workload Protection Layers (continued)

Cloud Workload Protection Layers (continued)

Cloud Workload Protection by Amazon Web Services (AWS)

Cloud Workload Protection by Google Cloud

Cloud Workload Protection by Microsoft Azure

Cloud Workload Protection by IBM Cloud

Cloud Workload Protection by Oracle

Cloud Workload Protection by VMware

Cloud Service Providers Key Capability Comparison

Vendor Profiling—Cisco Systems

Vendor Profiling—Check Point Software Technologies

Vendor Profiling—McAfee

Vendor Profiling—Palo Alto Networks

Vendor Profiling—Symantec

Vendor Profiling—Trend Micro

Vendor Profiling—VMware (Carbon Black)

Vendor Profiling—Crowdstrike

Vendor Key Capability Comparison

Transformation in CWP Ecosystem

Growth Opportunity 1—Market Education Essential at Early Stage Along with Collaboration with Local CSPs

Growth Opportunity 2—Increasing Need for Managed CWP Services

Growth Opportunity 3—Foresee More Threat Intelligence Service Integration

Growth Opportunity 4—Need for DevSecOps and Security Training

Strategic Imperatives for Success and Growth

The Last Word

Legal Disclaimer

List of Exhibits

The Frost & Sullivan Story

Value Proposition: Future of Your Company & Career

Global Perspective

Industry Convergence

360º Research Perspective

Implementation Excellence

Our Blue Ocean Strategy

The trend of moving data storage to the cloud continued in 2019 due to the need for digital transformation among businesses. With cloud technology, businesses can shorten the time-to-market in developing products and services, optimize infrastructure, streamline and simplify processes, and thus enable overall cost reduction. The awareness of cloud security has significantly improved among businesses, largely driven by industry regulations and in-country cybersecurity laws. Many businesses state that security and privacy are their biggest concerns when moving to the cloud. However, misconceptions about cloud security remain, particularly regarding cloud application and cloud workload security; this leads to the misuse of cloud security protection strategies. Additionally, many businesses lack clarity about the responsibility of data security between cloud service providers and the businesses themselves. Due to the ineffectiveness of legacy security solutions (e.g., endpoint security, firewalls, application security), it is vital for businesses to have visibility in the cloud environment and fully understand what, where, and how to protect workloads. Requirements for containers, containerized applications, and serverless workload protection are soaring due to the increased adoption of public cloud and multi-cloud models. Cloud workload protection (CWP) is increasingly integrated with other cloud security management tools, such as vulnerability assessment, security information and event management, security analytics, and log management, to have the full capabilities of risk management for cloud workloads. CWP solutions are also integrating with other cloud security solutions, such as software-defined and virtual firewalls, cloud identity access management (IAM), cloud access security broker (CASB) for data security, advanced endpoint detection and response for server workload threat detection and response, and malware protection. These solutions will be increasingly integrated with artificial intelligence and machine learning to drive the automation and orchestration of threat detection and response with minimal or no manual intervention. Mergers and acquisitions (M&A) continue to take place among security companies. Traditional security companies will use this as one of effective strategies to strengthen their product portfolios for cloud protection. Companies mentioned in this Asia-Pacific Cloud Workload Security Industry Guide include Amazon Web Services, Google Cloud, IBM Cloud, Microsoft Azure, Oracle, VMware, Cisco Systems, Check Point Software Technologies, Palo Alto Networks, McAfee, Symantec, Trend Micro, VMware Carbon Black, and CrowdStrike. Author: Kenny Yeo
More Information
No Index No
Podcast No
Author Kenny Yeo
Industries Information Technology
WIP Number PAF3-01-00-00-00
Is Prebook No
GPS Codes 9532-C1,9659