This is the first in a series of blog posts examining the Cloud-based Enterprise. In this post we’ll introduce how a Secure Enclave can help enterprises migrate to a pure cloud-based operational model.
Over the last few years there has been significant security improvements in public clouds. For example, AWS now offers transparent data encryption, key management and secure compute features. Unfortunately, even with the advances in public cloud computing, organizations like financial institutions have been unable to leverage these services because many analysts work in secure facilities that have no Internet access.
PrecisionAccess can be a force multiplier for your security team by future proofing your existing infrastructure against advanced attacks, including credential theft, predatory malware and man-in-the-middle. Software Defined Perimeter and Trust Assessment technology combine to obfuscate servers until user and device trust is established and access is granted to a single application or groups of applications.
One of the most significant new opportunities for public cloud is the processing and storage of regulated data. Until recently the idea was deemed heretical, mainly due to regulatory, compliance costs and the difficulty in interlocking physical and virtual security controls. That has changed due to a recent Vidder project for a public financial services firm with more than $10B in assets.
Here’s Why It MattersIn a “tip of the hat” to how polluted devices and networks have become, VMware and Verizon announced new service offerings to protect applications from cyber attacks. VMware announced App Defense at VMworld a few weeks ago. Vidder announced yesterday that its technology is being integrated into a new Verizon Software Defined Perimeter managed service for protecting high value apps from advanced threats.
On my personal blog I wrote about the recent AWS VMware partnership and how it threatens traditional IT vendors, practices and roles. The week before I talked about exploding security processes eroding protection at a Fortune 100 leader, based on a recent interview with a security architect.
Topics: software defined perimeter
Security breaches are now a fact of life for almost all organizations. New attacks don’t respect traditional boundaries and perimeters, from a country’s borders to enterprise firewalls and intrusion prevention systems. This means that the definition of national security within a cyber context is limited to government institutions, not organizations with operations within a nation’s borders.