sb-nz logo
Story image

A10 Networks’ four cloud security predictions for 2019

11 Jan 2019

Article by A10 Networks EMEA partner director Stephen Dallas

The cloud is a vital part of any enterprise infrastructure.

The convenience of having a database that can be accessed from any location has dramatically improved efficiency within workforces.

While many companies had previously been afraid of making the move, as the open nature of the cloud makes it less secure than on-premise solutions, new advances in cloud security have vastly reduced the number of successful attacks.

With 2019 approaching, it is time to look towards the New Year and predict where the cloud is heading.

Increased enterprise spending will make the biggest public cloud providers even bigger

While there are numerous public cloud providers out there, six stand above the rest.

Microsoft Azure, Google Cloud, Amazon Web Services (AWS), IBM, Alibaba and Oracle are the alphas in the cloud provider space and they will only get stronger throughout 2019.

The growth of these providers will come primarily from increased revenue in their business services and SaaS services, as well as from new and powerful third-party apps being brought to their respective market stores.

Their growth will have the adverse effect of making them a bigger target for malicious attacks and at least one of them will suffer a major breach because of this.

However, it will not be enough to slow down momentum.

A10 Networks predict that by the end of 2019, all six will see an increase in profits.

Cloud-based applications will be changed by open-source containers

2018 saw the rise of enterprise container adoption with Kubernetes leading the charge. Twelve months ago, Microsoft stated that adoption of Kubernetes on its Azure service had increased by 10 times compared to the year before, matching similar reports in 2017 from Google that showed a nine-time increase.

The open-source nature of containers provides companies with a lot of freedom to develop secure, scalable and enterprise-ready applications, such as application load balancing and traffic monitoring tools.

There will be a rise in cloud security vendors embracing Kubernetes and other containers for their new solutions in 2019; this will help push containers into the mainstream for any cloud-based application in the future.

DDoS threats will only continue to increase as companies begin adopting multi-cloud

As the cloud becomes a bigger requirement for companies, we will begin to see many adopt multi-cloud strategies.

Unfortunately, in doing so, more entry points for hackers to enter the network will become available.

As we have seen in recent years, those with malicious intent will continue to evolve their DDoS threats in order to bring down companies and accomplish their end-goals, whether it be ransomware, crypto mining or something else.

This is to be expected.

To counter these, many enterprises will adopt next-gen cloud security tools like convergent firewalls and secure service meshes.

As the tools of hackers evolve, so must the tools of the industry.

Cloud load balancing to become the glue that keeps the cloud together

Load balancing technology is not new, but as more companies move to both the public and private cloud it has become increasingly vital.

Cloud load balancing is more agile, offers greater efficiency and can be easily used with multi-cloud offerings.

As the cloud becomes more complex, companies will be forced to rely more on cloud load balancing until it becomes the most important cloud security tool within a company’s SOC.

A big reason why cloud load balancing is a great tool is that it offers wide visibility of the cloud and allows for greater analytics and insights.

In addition, it easily integrates with containers and utilises automation to offer instant security.

It also integrates easily with the big service providers like Microsoft Azure and AWS, which makes it available to many.

2018 saw the cloud become a vital part of enterprise infrastructure and 2019 will continue to see it become increasingly mainstream.

Many of the fears businesses had around the cloud have slowly subsided as next-gen security tools have become more available, with proven track records of preventing DDoS and other malicious attacks.

But just as the hackers will continue to evolve, so must the companies who need to keep their data safe.

Having customised, open-source tools and containers will become more important, along with a reliance on cloud load balancing to offer full protection of a company’s cloud offerings, whether it be single, hybrid or multi-cloud.

Story image
How to secure your business against DDoS Attacks
With the upward trend of DDoS attacks this year, and an increased dependency on online channels across all industries, businesses need to be prepared, so they don’t suffer any disruption. More
Story image
Protegrity rolls out updates to data protection platform
Protegrity has updated its Protegrity Data Protection Platform to better secure sensitive data in hybrid-cloud, multi-cloud and SaaS environments.More
Story image
The business case for an in-house ethical hacker
Ethical hackers, also known as penetration testers or white-hat hackers, mimic the techniques used by malicious hackers to try and break into computer systems and discover vulnerabilities before the bad guys can exploit them.More
Story image
The rising threat of human-controlled ransomware
Until recently, most ransomware attacks have been automated affairs. But things are changing, writes Attivo Networks regional director for A/NZ Jim Cook.More
Story image
New project development inhibited by cybersecurity, Kaspersky research states
"There are still some practical steps that can be taken to make sure that an emerging technology or a product reaches its launch. Cybersecurity doesn’t have to be another corporate barrier, but it should be on an integral part of the project all long."More
Story image
Revealed: Imperva publishes research on decade old botnet, responsible for millions of attacks
Imperva Research Labs has revealed findings of a six-month intensive investigation into a botnet that has been exploiting CMS vulnerabilities.More