LONDON, May 2, 2016 /PRNewswire/ -- Hybrid IT Requires Hybrid Security : Time for a Security Remodel
For most companies, their information technology (IT) environments are growing and diversifying across both cloud and private data center environments. While there are instances of uniformity, for example, "born in the cloud" companies that host and operate all of their workloads in data centers and servers owned and operated by one or more cloud providers, there are also companies that intend to retain full ownership and oversight, from the physical data center up through their software applications.
For most, however, a hybrid or mixed environment is the current; and, as our survey data points out in Figure 1, the future as well. With this movement to hybrid IT environments, a principal IT responsibility has become optimizing workload placement along the dimensions of performance (e.g., transaction speed, reliability, and agility) and cost.
If only performance and cost were the only dimensions to consider. In reality, they are not. The networked world is not a safe place, as hackers and cyber data thieves are all too anxious and prepared to exploit vulnerabilities wherever they exist.
Consequently, IT and their information security (InfoSec) brethren have the added responsibility to "fit" security technologies and practices into this dynamic morass of IT environments and deployment models. This integration is no easy task, as the same dimensions—performance (in security terms: do not impede business operations) and cost (do not spend more than what is essential)—remain omnipresent while security efficacy is simultaneously expected. Again, this is no simple task, especially in the context of the multiple business objectives that depend on reliable security operations, such as:
- Meet compliance requirements
- Identify and remove malware and viruses from systems
- Reduce exposure attributable to software vulnerabilities
- Detect, investigate, and respond to indicators of compromise and hacker reconnaissance
- Defeat cyberattacks aimed at undermining system uptime, responsiveness, and integrity
- Guide employees in their use of internal and external resources, safely and appropriately
In this insight, we further outline the operational challenges that a hybrid IT environment presents to security; and we review the merits of Trend Micro's Hybrid Cloud Security in addressing these challenges.
Download the full report: https://www.reportbuyer.com/product/3807867/
Reportbuyer is a leading industry intelligence solution that provides all market research reports from top publishers
To view the original version on PR Newswire, visit:http://www.prnewswire.com/news-releases/hybrid-it-requires-hybrid-security-300261144.html