Story image

In a hybrid world businesses need security to match

03 May 16

Today hybrid IT is becoming commonplace in the enterprise, but security solutions often don’t provide the extent of protection a business needs, according to a new report by Frost & Sullivan, the market and research analysts.

The report titled 'Hybrid IT Requires Hybrid Security' finds that most companies information technology (IT) environments are growing and diversifying across both cloud and private data centre environments. While there are instances of uniformity, for example, ‘born in the cloud’ companies that host and operate all of their workloads in data centres and servers owned and operated by one or more cloud providers, there are also companies that intend to retain full ownership and oversight, from the physical data centre up through their software applications. For most, however, a hybrid or mixed environment is the current; and the future as well, Frost & Sullivan finds.

With this movement to hybrid IT environments, a principal IT responsibility has become optimising workload placement along the dimensions of performance (e.g, transaction speed, reliability, and agility) and cost.

“If only performance and cost were the only dimensions to consider. In reality, they are not. The networked world is not a safe place, as hackers and cyber data thieves are all too anxious and prepared to exploit vulnerabilities wherever they exist,” Frost & Sullivan says in the report.

Consequently, IT and their information security (InfoSec) brethren have the added responsibility to ‘fit’ security technologies and practices into this dynamic morass of IT environments and deployment models.

This integration is no easy task, according to Frost & Sullivan, as the same dimensions - performance (in security terms: do not impede business operations) and cost (do not spend more than what is essential) - remain omnipresent while security efficacy is simultaneously expected.

Again, this is no simple task, especially in the context of the multiple business objectives that depend on reliable security operations, such as:

  • Meet compliance requirements 
  • Identify and remove malware and viruses from systems 
  • Reduce exposure attributable to software vulnerabilities 
  • Detect, investigate, and respond to indicators of compromise and hacker reconnaissance
  • Defeat cyber attacks aimed at undermining system uptime, responsiveness, and integrity 
  • Guide employees in their use of internal and external resources, safely and appropriately
Kiwis losing $24.7mil to scam calls every year
The losses are almost five times higher compared to the same period last year, from reported losses alone.
How to configure your firewall for maximum effectiveness
ManageEngine offers some firewall best practices that can help security admins handle the conundrum of speed vs security.
Exclusive: Why Australian enterprises are prime targets for malware attacks
"Only 14% of Australian organisations are continuously training employees to spot cyber attacks."
Exclusive: Why botnets will swarm IoT devices
“What if these nodes were able to make autonomous decisions with minimal supervision, use their collective intelligence to solve problems?”
"Is this for real?" The reality of fraud against New Zealanders
Is this for real? More often than not these days it can be hard to tell, and it’s okay to be a bit suspicious, especially when it comes to fraud.
Why you should leverage a next-gen firewall platform
Through full lifecycle-based threat detection and prevention, organisations are able to manage the entire threat lifecycle without adding additional solutions.
The quid pro quo in the IoT age
Consumer consciousness around data privacy, security and stewardship has increased tenfold in recent years, forcing businesses to make customer privacy a business imperative.
Kordia launches Women in Tech scholarship at the University of Waikato
The scholarship is established to acknowledge and support up-and-coming female talent and future technology leaders.