The New Cyber Protection Space = Data Protection + Cybersecurity
This article discusses the new cyber protection space and the forces shaping a new shared space of business data continuity.
Join the DZone community and get the full member experience.Join For Free
What Is Cyber Protection?
Cyber Protection is an IT industry solution category that merges the existing spaces of data protection and cybersecurity, with an objective of securing the safety and resiliency of application and business data, whether in flight or in storage, across hybrid cloud and distributed device environments against a globally connected attack surface.
Dev and Ops. Containers and Cloud Computing
Some things just go great together. We’re on the cusp of another great combination, as the tectonic forces of market dynamics and modern threats are fusing together two well-established information technology sectors: data protection and cybersecurity -- into a bigger, broader category of solutions for Cyber Protection.
What is driving this sea-change in how we protect our entire IT estate, including data, applications, and infrastructure, from critical threats and interruptions that can bring the entire business to a halt? What are the implications of cyber protection for the enterprise?
Data and Security Teams and Silos Coming Together
Not long ago, any mid-to-large-sized enterprise would have data wranglers working to archive, replicate and promote data redundancy and recovery in their own management silos, while a security team would be off in their SoC, scanning for vulnerabilities and preventing threats in their own sets of tools. There was little need for these two teams to collaborate.
Now as enterprises move applications and data to hybrid IT environments, including multiple cloud infrastructure options, mobile and IoT devices, and edge computing resources, there’s far more threat surface, and many more data exploits for these once-separate teams to deal with.
An existential risk is creating a phenomenon of market consolidation around cyber protection, a category we could express as a boolean of the two overlapping spaces of cybersecurity and data protection using our Intellyx Market Mindmap™ diagram.
Don’t let the fact that these two market sectors are considered mature and contain many familiar-looking solutions fool you. An incredible amount of innovation and investment is being pushed into this new combined space by competitive vendors, as keeping up with malware threats and vulnerabilities have become an increasingly difficult endeavor for business customers.
Market Development and Consolidation
In a word, we’d rate the cyber protection market as frothy. We are seeing new specialized tool vendors emerging into this market from both sides, whether for cloud-native data backup, or IoT device-level security management.
In addition, several leading vendors have made big moves in this space, both in terms of further organic software development and re-platforming for SaaS and cloud use cases, and strategic partnerships and acquisitions.
Some recent moves of note:
- Acronis acquired DeviceLock to add endpoint data loss prevention to its suite of data protection and cybersecurity tools.
- Arcserve expanded its partnership with Sophos to add ransomware protection to its cloud backup service offerings.
- Datto acquired BitDam to give MSPs a combined cloud application suite security and data protection solution.
- ESET partners with Xopero to give security customers global backup and disaster recovery options.
- Cloud data protection vendor Druva integrated with FireEye for advanced threat detection and data breach response capabilities.
- Cyber resilience firm OpenText acquired Webroot and Carbonite Mozy/Carbonite for threat detection and data protection after Carbonite acquired Mozy from Dell.
- Veeam acquired Kasten to combine cloud-native backup and data protection for microservices workloads.
All of this cross-platform cyber protection activity isn’t even scratching the surface of similar footprint growth efforts for both security and data protection product suites in major technology platform vendors such as IBM, Broadcom, Microsoft, and VMware, and within leading cloud IaaS providers like AWS, Azure and Google Cloud Services.
Three Novel Trends Driving the Need for Cyber Protection
Ransomware. While technology markets naturally expand and merge, the increased frequency of ransomware attacks, especially the WannaCry attack of 2017, forms much of the origin story of this current conflagration.
Both state actors and opportunistic cyber criminals are now using dark web exploits and coming after data itself, not just to exfiltrate IP or steal account information to resell for nefarious purposes, but to encrypt data stores and lock them away from use. These data-nappers demand bitcoin or more untraceable cryptocurrencies like Monero to then ransom the unlocked data back to its original owner.
While most companies refused to pay the hackers, given the dishonorable nature of such a contract, such extortion became a lucrative enough enterprise to demand an industrial-strength response. The best minds in cyberattack prevention and data protection and recovery are coming together to fight ransomware.
Cloud and Hybrid IT Development
The presence of elastic cloud infrastructure led to workloads running ephemeral containers, with REST API calls and event-based services to support applications. Now, we’re seeing new decoupled microservices architectures with Kubernetes clusters and serverless functions that are designed to operate in a ‘stateless’ mode.
The problem? Even a cleverly constructed application that separates the process from the state means that all of the real-time secrets passed between services, and their resulting transactional data, must still be stored in both ‘hot’ data queues and ‘warm’ or ‘cold’ systems of record somewhere.
The reduced cost of data archival, data lakes, and grids across on-premises data centers and multiple cloud services means companies are finding clever ways to optimize cost, improve responsiveness and reduce latency in how data assets are routed and accessed. This complexity also greatly expands the ability for ‘lost data’ that gets improperly routed or stored and increases the threat surface of potential data attack vectors.
Service Provider Expertise
Consultancies that want to differentiate themselves and add strategic value for their clients want to get ahead of this market by building cyber protection practices as repeatable centers of excellence.
In many cases, SI partners can bridge the gap between established data and security organizational silos for their clients, as they are often engaged in auditing IT practices for data compliance, modernizing legacy systems, and building new applications atop systems of record that rely on both data integrity and security.
At the same time, service providers are well-positioned with expertise to help companies negotiate to find the best-of-breed cyber protection solutions for the job, rather than simply leaving this mission-critical task up to the default selections offered by the enterprise’s incumbent platform and cloud providers.
The Intellyx Take
Where does cyber protection go from here?
Cyber protection is more than just the blending of two established technology sectors, so it’s a safe bet that we’ll see accelerated development budgets and acquisition activity between data protection vendors, cybersecurity firms, and new players flowing into this space for the next 3-5 years.
IT operations management, IT service management, and incident management companies will soon be seeking to add data layer visibility to their dashboards, as the industry demand for a single view of data operations and data risk will become important for compliance reviews.
DevSecOps teams with a mandate to deliver new application functionality to market in hybrid IT infrastructure will seek to ‘shift security left’ and embed safer and more resilient data structures underneath resilient applications that can progressively roll out and roll back and recover in an instant if something goes wrong at deployment time.
And don’t get me started on the proliferation of high-speed 5G networks, IoT devices, and edge infrastructure. With data streaming from billions of unique sensors, cameras, and sources, and coexisting with compute workloads on server clusters atop every telephone pole and inside every office closet, the future requirements of this space are limitless.
Published at DZone with permission of Jason English. See the original article here.
Opinions expressed by DZone contributors are their own.