aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • Multi-Cloud
  • Technology

Centralized Cloud Security Is Now A Must-Have

  • aster.cloud
  • August 23, 2023
  • 3 minute read

Cloud security is largely siloed by cloud provider. Enterprises are demanding strategic approaches for complex distributed multicloud deployments.

The 2023 Cloud Security Report, sponsored by Fortinet, surveyed 752 cybersecurity professionals from around the globe and across all industries. Most respondents (90%) say having a single cloud security platform to configure and manage security consistently across their cloud deployments would be helpful. Do you think? This isn’t very surprising.


Partner with aster.cloud
for your next big idea.
Let us know here.



From our partners:

CITI.IO :: Business. Institutions. Society. Global Political Economy.
CYBERPOGO.COM :: For the Arts, Sciences, and Technology.
DADAHACKS.COM :: Parenting For The Rest Of Us.
ZEDISTA.COM :: Entertainment. Sports. Culture. Escape.
TAKUMAKU.COM :: For The Hearth And Home.
ASTER.CLOUD :: From The Cloud And Beyond.
LIWAIWAI.COM :: Intelligence, Inside and Outside.
GLOBALCLOUDPLATFORMS.COM :: For The World's Computing Needs.
FIREGULAMAN.COM :: For The Fire In The Belly Of The Coder.
ASTERCASTER.COM :: Supra Astra. Beyond The Stars.
BARTDAY.COM :: Prosperity For Everyone.

Security silos are a massive problem in cloud computing. Mostly they occur in specific cloud brands when companies only use the native security tools for that specific cloud. When you have three to five different cloud providers, as most multicloud deployments do, you have at least three to five security silos.

Security silos

I usually see even more silos since many enterprises create security domains around collections of applications, of which there can be many in a single cloud. Multiply that by the number of clouds you’re leveraging. It’s too complex, too inefficient, and too unsafe. Most breaches exploit this issue: Misconfigurations are the primary attack vector.

Centralized security is a familiar approach for distributed systems. These solutions began to appear when things got complex 20 years ago. Unfortunately, many took the least common denominator approach, attempting to provide a subset of security services that could function across most platforms. This usually meant they were lousy for all platforms as to what was needed versus what was provided. They were not used much, and native security solutions became the norm.

We have a similar problem arising now in sets of clouds that drive the creation of security silos. This complexity itself causes security issues and must be addressed as a holistic solution or centralized security that can deal with all cloud-based systems using a single abstraction and automation layer. If this sounds familiar, it’s a core component of what the industry now calls the “supercloud” or “metacloud.”

Read More  Enabling Real-Time AI With Streaming Ingestion In Vertex AI

Core benefits of centralized cloud security

Why are CIOs looking to centralize security, and will the cost of implementing these systems provide a net benefit to the business? Let’s look at the advantages:

Centralization and monitoring enable organizations to manage security measures from a single platform or abstraction. They can implement consistent security policies, configure access controls, and monitor user activities across multiple cloud environments. This consolidated approach simplifies security management, reduces complexity, and provides better visibility into potential security risks. These are 80% of the advantages you get with centralized security. That’s why I’m listing them first. 

Rapid response means that centralized cloud security allows for faster detection and response to potential threats. When security events occur, centralized security tools can quickly identify and mitigate risks across the entire cloud infrastructure. Prompt responses to security incidents can minimize impacts.

Reduced duplication and complexity are key to why you want a supercloud or metacloud to remove security silos. Centralized security eliminates the need for individual implementations for each application or service hosted on the cloud. This reduces duplication of efforts, simplifies security architectures, and leads to overall cost savings.

Scalability and agility mean that centralized cloud security solutions are designed to expand rapidly as needed. Organizations can scale their cloud infrastructure while maintaining consistent security. Also, they can more easily make changes since they’re likely only changing security systems on a single platform.

It isn’t easy

Now the bad news. For those of you with existing security solutions and silos (most of you), switching to centralized security is expensive, risky, and time-consuming. Although you can “cut over” one security silo at a time to a centralized platform, it won’t be as easy to select a single centralized platform. The likely scenario will be a collection of technologies for governance, finops, encryption, identity management, etc., to get to a more optimal solution.

Read More  Domain Name Fraud: Is The Global Internet In Danger?

Moreover, I’m not sure how many security pros understand how to do this. Perhaps they get what it is and the value it can bring (by reading this article), but can they handle the 30 to 40 steps it takes to get to a successful deployment? This is perhaps the biggest complaint of enterprises attempting to centralize their security services, cloud or not.

However, the desired end state remains. Most enterprises will have to do this at some point. Otherwise, the risk and the cost of cloud security will be too significant, and the value will be negative. Don’t let it get that bad.

By: David Linthicum
Originally published at InfoWorld

Source: cyberpogo.com


For enquiries, product placements, sponsorships, and collaborations, connect with us at [email protected]. We'd love to hear from you!

Our humans need coffee too! Your support is highly appreciated, thank you!

aster.cloud

Related Topics
  • Centralized Cloud
  • Cloud
  • Multi-Cloud
  • Security
You May Also Like
View Post
  • Computing
  • Multi-Cloud
  • Technology

Reliance on US tech providers is making IT leaders skittish

  • May 28, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

Examine the 4 types of edge computing, with examples

  • May 28, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

AI and private cloud: 2 lessons from Dell Tech World 2025

  • May 28, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

TD Synnex named as UK distributor for Cohesity

  • May 28, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

Broadcom’s ‘harsh’ VMware contracts are costing customers up to 1,500% more

  • May 28, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

Weigh these 6 enterprise advantages of storage as a service

  • May 28, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

Pulsant targets partner diversity with new IaaS solution

  • May 23, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

Growing AI workloads are causing hybrid cloud headaches

  • May 23, 2025

Stay Connected!
LATEST
  • 1
    Just make it scale: An Aurora DSQL story
    • May 29, 2025
  • 2
    Reliance on US tech providers is making IT leaders skittish
    • May 28, 2025
  • Examine the 4 types of edge computing, with examples
    • May 28, 2025
  • AI and private cloud: 2 lessons from Dell Tech World 2025
    • May 28, 2025
  • 5
    TD Synnex named as UK distributor for Cohesity
    • May 28, 2025
  • Weigh these 6 enterprise advantages of storage as a service
    • May 28, 2025
  • 7
    Broadcom’s ‘harsh’ VMware contracts are costing customers up to 1,500% more
    • May 28, 2025
  • 8
    Pulsant targets partner diversity with new IaaS solution
    • May 23, 2025
  • 9
    Growing AI workloads are causing hybrid cloud headaches
    • May 23, 2025
  • Gemma 3n 10
    Announcing Gemma 3n preview: powerful, efficient, mobile-first AI
    • May 22, 2025
about
Hello World!

We are aster.cloud. We’re created by programmers for programmers.

Our site aims to provide guides, programming tips, reviews, and interesting materials for tech people and those who want to learn in general.

We would like to hear from you.

If you have any feedback, enquiries, or sponsorship request, kindly reach out to us at:

[email protected]
Most Popular
  • Understand how Windows Server 2025 PAYG licensing works
    • May 20, 2025
  • By the numbers: How upskilling fills the IT skills gap
    • May 21, 2025
  • 3
    Cloud adoption isn’t all it’s cut out to be as enterprises report growing dissatisfaction
    • May 15, 2025
  • 4
    Hybrid cloud is complicated – Red Hat’s new AI assistant wants to solve that
    • May 20, 2025
  • 5
    Google is getting serious on cloud sovereignty
    • May 22, 2025
  • /
  • Technology
  • Tools
  • About
  • Contact Us

Input your search keywords and press Enter.