Over a million developers have joined DZone.

Dynamic Computing Gives Security an Opportunity to Become Business Enablers

DZone's Guide to

Dynamic Computing Gives Security an Opportunity to Become Business Enablers

Richard Stiennon and Amrit Williams talk dynamic computing and security, and how they intersect with with business.

Free Resource

Evolve your approach to Application Performance Monitoring by adopting five best practices that are outlined and explored in this e-book, brought to you in partnership with BMC.

Richard Stiennon of IT Harvest Interviews CloudPassage CTO Amrit Williams

In this IT-Harvest interview, CloudPassage CTO and former Gartner analyst Amrit Williams explains to Richard Stiennon how the third IT platform, dynamic computing/cloud computing, is presenting new challenges and opportunities to enterprises and security teams; how CloudPassage is enabling CSOs to easily get in front of these challenges to securely take advantage of the benefits of dynamic compute in any environment at any scale; and the different ways companies are addressing cloud security.

Williams discusses what he sees as one of the greatest transformational changes in the history of IT affecting. He explains, “That’s the adoption of cloud computing and mobility. This has been the first year on the third platform.  The first platform being mainframes. The second platform being client servers and PCs. And now (the third platform is) the ability to spin up compute resources on demand through dynamic computing/cloud computing.”

“The challenge that a lot of companies are having is not in identifying the benefits and how to implement these things. It’s how to implement them securely and address compliance concerns, because the first thing that they try to do is they try to apply a lot of the legacy solutions that they’ve been using in the data center that just don’t work so well (in the cloud),” says Williams.

With this transformation, security teams once viewed as business roadblocks, are in a unique position to transform their roles into business enablers.  Williams states, “There’s an opportunity for security to get in front of this. I think we started seeing this with mobility. It was probably the end of security being able to say ‘no’ and implement draconian policies. They really had to figure out a way ‘how can I enable the business, allow it to be productive and still address the concerns that the organization has around protecting the business and its IP.’”

Regarding why traditional network security tools don’t work in new dynamic compute environments, Williams points out, “The reason they’re able to do what they do in the data centers is because of hardware acceleration. You completely take hardware acceleration away in the cloud.  Additionally, where is the perimeter? These things move around a lot, and you’re probably more exposed to the potential of East-West traffic or lateral movement in that environment than you are in the traditional data center.”

Learn tips and best practices for optimizing your capacity management strategy with the Market Guide for Capacity Management, brought to you in partnership with BMC.

security ,performance

Published at DZone with permission of Tatiana Crawford, DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.


Dev Resources & Solutions Straight to Your Inbox

Thanks for subscribing!

Awesome! Check your inbox to verify your email so you can start receiving the latest in tech news and resources.


{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}