Dynamic Computing Gives Security an Opportunity to Become Business Enablers
Richard Stiennon and Amrit Williams talk dynamic computing and security, and how they intersect with with business.
Join the DZone community and get the full member experience.Join For Free
Richard Stiennon of IT Harvest Interviews CloudPassage CTO Amrit Williams
In this IT-Harvest interview, CloudPassage CTO and former Gartner analyst Amrit Williams explains to Richard Stiennon how the third IT platform, dynamic computing/cloud computing, is presenting new challenges and opportunities to enterprises and security teams; how CloudPassage is enabling CSOs to easily get in front of these challenges to securely take advantage of the benefits of dynamic compute in any environment at any scale; and the different ways companies are addressing cloud security.
Williams discusses what he sees as one of the greatest transformational changes in the history of IT affecting. He explains, “That’s the adoption of cloud computing and mobility. This has been the first year on the third platform. The first platform being mainframes. The second platform being client servers and PCs. And now (the third platform is) the ability to spin up compute resources on demand through dynamic computing/cloud computing.”
“The challenge that a lot of companies are having is not in identifying the benefits and how to implement these things. It’s how to implement them securely and address compliance concerns, because the first thing that they try to do is they try to apply a lot of the legacy solutions that they’ve been using in the data center that just don’t work so well (in the cloud),” says Williams.
With this transformation, security teams once viewed as business roadblocks, are in a unique position to transform their roles into business enablers. Williams states, “There’s an opportunity for security to get in front of this. I think we started seeing this with mobility. It was probably the end of security being able to say ‘no’ and implement draconian policies. They really had to figure out a way ‘how can I enable the business, allow it to be productive and still address the concerns that the organization has around protecting the business and its IP.’”
Regarding why traditional network security tools don’t work in new dynamic compute environments, Williams points out, “The reason they’re able to do what they do in the data centers is because of hardware acceleration. You completely take hardware acceleration away in the cloud. Additionally, where is the perimeter? These things move around a lot, and you’re probably more exposed to the potential of East-West traffic or lateral movement in that environment than you are in the traditional data center.”
Published at DZone with permission of Tatiana Crawford, DZone MVB. See the original article here.
Opinions expressed by DZone contributors are their own.