Integrated cloud-native security platforms can overcome limitations of traditional security products
To close security gaps caused by rapidly changing digital ecosystems, organizations must adopt an integrated cloud-native security platform that incorporates artificial intelligence, automation, intelligence, threat detection and data analytics capabilities, according to 451 Research.
Cloud-native security platforms are essential
The report clearly defines how to create a scalable, adaptable, and agile security posture built for today’s diverse and disparate IT ecosystems. And it warns that legacy approaches and MSSPs cannot keep up with the speed of digital transformation.
- Massive change is occurring. Over 97 percent of organizations reported they are underway with, or expecting, digital transformation progress in the next 24 months, and over 41 percent are allocating more than 50 percent of their IT budgets to projects that grow and transform the business.
- Security platforms enable automation and orchestration capabilities across the entire IT stack, streamlining and optimizing security operations, improving productivity, enabling higher utilization of assets, increasing the ROI of security investments and helping address interoperability challenges created by isolated, multi-vendor point products.
- Threat-driven and outcome-based security platforms address the full attack continuum, compared with legacy approaches that generally focus on defensive blocking of a single vector.
- Modern security platforms leverage AI and ML to solve some of the most prevalent challenges for security teams, including expertise shortages, alert fatigue, fraud detection, behavioral analysis, risk scoring, correlating threat intelligence, detecting advanced persistent threats, and finding patterns in increasing volumes of data.
- Modern security platforms are positioned to deliver real-time, high-definition visibility with an unobstructed view of the entire IT ecosystem, providing insights into the company’s assets, attack surface, risks and potential threats and enabling rapid response and threat containment.
451 Senior Analyst Aaron Sherrill noted, “The impact of an ever-evolving IT ecosystem combined with an ever-evolving threat landscape can be overwhelming to even the largest, most well-funded security teams, including those at traditional MSSPs.
“Unfortunately, a web of disparate and siloed security tools, a growing expertise gap and an overwhelming volume of security events and alerts continue to plague internal and service provider security teams of every size.
“The consequences of these challenges are vast, preventing security teams from gaining visibility, scaling effectively, responding rapidly and adapting quickly. Today’s threat and business landscape demands new approaches and new technologies.”
How to deliver effective cybersecurity today
“Delivering effective cybersecurity today requires being able to consume a growing stream of telemetry and events from a wide range of signal sources,” said Dustin Hillard, CTO, eSentire.
“It requires being able to process that data to identify attacks while avoiding false positives and negatives. It requires equipping a team of expert analysts and threat hunters with the tools they need to investigate incidents and research advanced, evasive attacks.
“Most importantly, it requires the ability to continuously upgrade detection and defenses. These requirements demand changing the technology foundations upon which cybersecurity solutions are built—moving from traditional security products and legacy MSSP services to modern cloud-native platforms.”
Sherrill further noted, “Cloud-native security platforms optimize the efficiency and effectiveness of security operations by hiding complexity and bringing together disparate data, tools, processes, workflows and policies into a unified experience.
“Infused with automation and orchestration, artificial intelligence and machine learning, big data analytics, multi-vector threat detection, threat intelligence, and machine and human collaboration, cloud-native security platforms can provide the vehicle for scalable, adaptable and agile threat detection, hunting, and response. And when combined with managed detection and response services, organizations are able to quickly bridge expertise and resource gaps and attain a more comprehensive and impactful approach to cybersecurity.”
Veeam Software announced the general availability of NEW Veeam Availability Suite 10, ushering in the next generation of data protection capabilities that increase data availability, portability, and extensibility.
First introduced in 2008 as Veeam Backup & Replication, Veeam Availability Suite – now delivers modern file data protection for Networked Attached Storage (NAS), Multi-VM Instant Recovery to automate disaster recovery (DR) and enhanced ransomware protection. With greater platform extensibility, data mining through APIs, and more than 150 major enhancements, Veeam has launched the industry’s most robust solution for complete data management and protection for hybrid-cloud environments.
As organizations adopt hybrid cloud strategies to fuel rapid Digital Transformation, data is becoming critical to business success. With this laser focus on data innovation to drive business acceleration, new challenges have emerged in ensuring all data is agile, available, and connected. According to the 2019 Veeam Cloud Data Management Report, 73% of organizations are failing to meet users’ demands for uninterrupted access to applications and data; many companies are now looking to embrace Cloud Data Management to better meet protection needs and leverage the power of their data.
Veeam has extended the solution to be both broader and deeper with more platform support and advanced capabilities enabling organizations to be in better control of their data so they can meet their most important business objectives.
Veeam Availability Suite 10 protects modern workloads at scale with broader backup capabilities, achieves increased security via immutable backups with S3 Object Lock, and empowers deeper ecosystem API integration options, enabling organizations to save time, reduce costs and exceed recovery objectives.
“Cloud-based data protection is a growing need for many of the organizations I speak with, both large and small, which are all in various stages of cloud adoption,” said Henry Baltazar, research vice president at 451 Research. “Solutions like Veeam’s latest v10 release provide organizations with the scalability needed for today and tomorrow’s workloads, with new Cloud Data Management capabilities which include faster, automated copies to object storage and the use of S3 Object Lock to ensure that data is protected against threats such as ransomware, insider threats and malicious admins.”
Veeam Availability Suite 10 extends Veeam’s leadership in comprehensive Cloud Data Management, providing advanced protection for any application, any data, across any cloud. V10 delivers new capabilities that bring simplicity, flexibility and reliability, enabling businesses to achieve the following:
- Modernize and simplify the protection of large file shares and file servers with powerful NAS backup.
- Keep business running with the next-generation Instant Recovery engine, and Multi-VM Instant Recovery for disaster recovery from massive datacenter outages.
- Simplify off-site backup and get 100% bulletproof protection from ransomware and insider threats with enhanced S3 object storage integration and immutable backups.
- Reuse backup data to find new insights and put backups to work with greater platform extensibility and simplified third-party data analysis software integration with the NEW Veeam Data Integration API.
- Broader platform and ecosystem support including new, advanced capabilities for Linux, HPE Primera and HPE StoreOnce, Nutanix AHV, PostgreSQL, MySQL and more.
“HPE is redefining storage for our customers and we need partners who understand the journey toward digital transformation depends on data and intelligence,” said Jim Jackson, Chief Marketing Officer, Hewlett Packard Enterprise. “With Veeam, we ensure the critical data needed to accelerate business is safe and readily available to customers at all times. We are thrilled that Veeam now supports HPE Primera and offers enhancements for HPE StoreOnce so customers’ data is always available, recoverable and protected.”
How are enterprises coping with the security challenges brought on by digital transformation initiatives?
451 Research has polled IT decision makers at 400 larger companies about the current state of cybersecurity in their organizations, the security initiatives they have planned, the challenges they face, and how they are accommodating emerging technologies and digital transformation initiatives.
The survey, performed on behalf of eSentire, revealed several interesting things, including some unexpected contradictions.
For example: 97 percent of the respondents believe their sensitive information is well-protected and 92 percent believe their organization has the tools and expertise to protect an increasingly diverse and disparate infrastructure, despite 56 percent saying their organizations had experienced a significant security incident, cyberattack, or data breach in the past 12 months.
“SMEs are reporting higher levels of confidence compared to that of their larger peers that often have more resources, staff, tools and specialized expertise. This high level of confidence, or overconfidence, is not backed by risk assessment data and seems to stem from comparison to the organizations’ abilities and cybersecurity posture of the past and not in light of the present or future,” infosec analyst Aaron Sherrill pointed out.
“Considering the increasing volume and sophistication of malicious attacks, the increase in regulatory requirements, the rapid adoption of new technologies and the ever-increasing complexity of a rapidly expanding hybrid IT ecosystem organizations should remain skeptical about their cybersecurity posture.”
Companies are opting for hybrid IT environments
Previous 451 Research surveys revealed that, nowadays, most organizations have dedicated security budgets and that 87 percent of organizations are increasing security budgets by an average of 22 percent for the coming year.
Personnel costs amount to over one-third of those budgets and the wedge continue to expand. Money allocated for the purchase of security tools amounts to 43 percent of security budgets, but that percentage is trending down as there is an increasing shift toward managed services and personnel costs.
Most companies (57%) are also shifting their primary workload environments from on-premises resources and infrastructure to a hybrid IT environment that leverages both on-premises systems and off-premises cloud/hosted resources in an integrated fashion. 19% are shifting to a completely off-premises public cloud environment composed of IaaS, PaaS and/or SaaS.
The overwhelming majority of organizations have at least five dedicated security professionals on staff and most employ more:
But while the majority (87%) say that they have enough information security personnel on staff to support their organization, most are also looking to add specialized security experts to their teams as they are facing an expertise or skills gap in several key areas (network security, IoT security, risk analysis, threat detection and hunting, etc.)
“The greatest skills gaps for many security teams is around public cloud security expertise. This gap is increasing the probability that workloads will be improperly deployed and secured, especially as cloud platforms continue to introduce new capabilities and features at record speed,” Sherrill noted.
He also pointed out that while data security, governance and privacy are the top pains for most organizations, hybrid or multi-cloud security and securing emerging technologies are quickly becoming the most pressing challenges for many organizations.
“Digital transformation and the distribution of the workforce not only scatters resources and assets, but continues to drive a divide between corporate confidence and actual ability to protect their interests in a transformed workplace and economy,” says Mark Sangster, Vice President and Industry Security Strategist at eSentire.
“An example drill-down exposes that having satisfactory staffing levels does not ensure that the firm is equipped with critical expertise and competencies to detect threats across a perimeter less environment, nor is prepared to manage those threats once discovered. Cyber adversaries are as prepared to embrace digital transformation, and exploit the lag between the time organizations adopt emerging technology, and then retrofit security programs and staff to properly protect their assets in this new, self-inflicted risk paradigm.”