aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • Multi-Cloud
  • Technology

Centralized Cloud Security Is Now A Must-Have

  • aster.cloud
  • August 23, 2023
  • 3 minute read

Cloud security is largely siloed by cloud provider. Enterprises are demanding strategic approaches for complex distributed multicloud deployments.

The 2023 Cloud Security Report, sponsored by Fortinet, surveyed 752 cybersecurity professionals from around the globe and across all industries. Most respondents (90%) say having a single cloud security platform to configure and manage security consistently across their cloud deployments would be helpful. Do you think? This isn’t very surprising.


Partner with aster.cloud
for your next big idea.
Let us know here.



From our partners:

CITI.IO :: Business. Institutions. Society. Global Political Economy.
CYBERPOGO.COM :: For the Arts, Sciences, and Technology.
DADAHACKS.COM :: Parenting For The Rest Of Us.
ZEDISTA.COM :: Entertainment. Sports. Culture. Escape.
TAKUMAKU.COM :: For The Hearth And Home.
ASTER.CLOUD :: From The Cloud And Beyond.
LIWAIWAI.COM :: Intelligence, Inside and Outside.
GLOBALCLOUDPLATFORMS.COM :: For The World's Computing Needs.
FIREGULAMAN.COM :: For The Fire In The Belly Of The Coder.
ASTERCASTER.COM :: Supra Astra. Beyond The Stars.
BARTDAY.COM :: Prosperity For Everyone.

Security silos are a massive problem in cloud computing. Mostly they occur in specific cloud brands when companies only use the native security tools for that specific cloud. When you have three to five different cloud providers, as most multicloud deployments do, you have at least three to five security silos.

Security silos

I usually see even more silos since many enterprises create security domains around collections of applications, of which there can be many in a single cloud. Multiply that by the number of clouds you’re leveraging. It’s too complex, too inefficient, and too unsafe. Most breaches exploit this issue: Misconfigurations are the primary attack vector.

Centralized security is a familiar approach for distributed systems. These solutions began to appear when things got complex 20 years ago. Unfortunately, many took the least common denominator approach, attempting to provide a subset of security services that could function across most platforms. This usually meant they were lousy for all platforms as to what was needed versus what was provided. They were not used much, and native security solutions became the norm.

We have a similar problem arising now in sets of clouds that drive the creation of security silos. This complexity itself causes security issues and must be addressed as a holistic solution or centralized security that can deal with all cloud-based systems using a single abstraction and automation layer. If this sounds familiar, it’s a core component of what the industry now calls the “supercloud” or “metacloud.”

Read More  Singapore And Google Partner On Web Risk To Protect Citizens From Online Scams And Phishing

Core benefits of centralized cloud security

Why are CIOs looking to centralize security, and will the cost of implementing these systems provide a net benefit to the business? Let’s look at the advantages:

Centralization and monitoring enable organizations to manage security measures from a single platform or abstraction. They can implement consistent security policies, configure access controls, and monitor user activities across multiple cloud environments. This consolidated approach simplifies security management, reduces complexity, and provides better visibility into potential security risks. These are 80% of the advantages you get with centralized security. That’s why I’m listing them first. 

Rapid response means that centralized cloud security allows for faster detection and response to potential threats. When security events occur, centralized security tools can quickly identify and mitigate risks across the entire cloud infrastructure. Prompt responses to security incidents can minimize impacts.

Reduced duplication and complexity are key to why you want a supercloud or metacloud to remove security silos. Centralized security eliminates the need for individual implementations for each application or service hosted on the cloud. This reduces duplication of efforts, simplifies security architectures, and leads to overall cost savings.

Scalability and agility mean that centralized cloud security solutions are designed to expand rapidly as needed. Organizations can scale their cloud infrastructure while maintaining consistent security. Also, they can more easily make changes since they’re likely only changing security systems on a single platform.

It isn’t easy

Now the bad news. For those of you with existing security solutions and silos (most of you), switching to centralized security is expensive, risky, and time-consuming. Although you can “cut over” one security silo at a time to a centralized platform, it won’t be as easy to select a single centralized platform. The likely scenario will be a collection of technologies for governance, finops, encryption, identity management, etc., to get to a more optimal solution.

Read More  Google Cloud Completes Korea Financial Security Institute Audit

Moreover, I’m not sure how many security pros understand how to do this. Perhaps they get what it is and the value it can bring (by reading this article), but can they handle the 30 to 40 steps it takes to get to a successful deployment? This is perhaps the biggest complaint of enterprises attempting to centralize their security services, cloud or not.

However, the desired end state remains. Most enterprises will have to do this at some point. Otherwise, the risk and the cost of cloud security will be too significant, and the value will be negative. Don’t let it get that bad.

By: David Linthicum
Originally published at InfoWorld

Source: cyberpogo.com


For enquiries, product placements, sponsorships, and collaborations, connect with us at [email protected]. We'd love to hear from you!

Our humans need coffee too! Your support is highly appreciated, thank you!

aster.cloud

Related Topics
  • Centralized Cloud
  • Cloud
  • Multi-Cloud
  • Security
You May Also Like
View Post
  • People
  • Technology

AI is automating our jobs – but values need to change if we are to be liberated by it

  • April 17, 2025
View Post
  • Computing
  • Public Cloud
  • Technology

United States Army Enterprise Cloud Management Agency Expands its Oracle Defense Cloud Services

  • April 15, 2025
View Post
  • Technology

Tokyo Electron and IBM Renew Collaboration for Advanced Semiconductor Technology

  • April 2, 2025
View Post
  • Software
  • Technology

IBM Accelerates Momentum in the as a Service Space with Growing Portfolio of Tools Simplifying Infrastructure Management

  • March 27, 2025
View Post
  • Technology

IBM contributes key open-source projects to Linux Foundation to advance AI community participation

  • March 22, 2025
View Post
  • Technology

Co-op mode: New partners driving the future of gaming with AI

  • March 22, 2025
View Post
  • Technology

Mitsubishi Motors Canada Launches AI-Powered “Intelligent Companion” to Transform the 2025 Outlander Buying Experience

  • March 10, 2025
View Post
  • Engineering
  • Technology

Guide: Our top four AI Hypercomputer use cases, reference architectures and tutorials

  • March 9, 2025

Stay Connected!
LATEST
  • 1
    AI is automating our jobs – but values need to change if we are to be liberated by it
    • April 17, 2025
  • 2
    United States Army Enterprise Cloud Management Agency Expands its Oracle Defense Cloud Services
    • April 15, 2025
  • 3
    Tokyo Electron and IBM Renew Collaboration for Advanced Semiconductor Technology
    • April 2, 2025
  • 4
    IBM Accelerates Momentum in the as a Service Space with Growing Portfolio of Tools Simplifying Infrastructure Management
    • March 27, 2025
  • 5
    Tariffs, Trump, and Other Things That Start With T – They’re Not The Problem, It’s How We Use Them
    • March 25, 2025
  • 6
    IBM contributes key open-source projects to Linux Foundation to advance AI community participation
    • March 22, 2025
  • 7
    Co-op mode: New partners driving the future of gaming with AI
    • March 22, 2025
  • PiPiPi 8
    The Unexpected Pi-Fect Deals This March 14
    • March 13, 2025
  • 9
    Mitsubishi Motors Canada Launches AI-Powered “Intelligent Companion” to Transform the 2025 Outlander Buying Experience
    • March 10, 2025
  • Nintendo Switch Deals on Amazon 10
    10 Physical Nintendo Switch Game Deals on MAR10 Day!
    • March 9, 2025
about
Hello World!

We are aster.cloud. We’re created by programmers for programmers.

Our site aims to provide guides, programming tips, reviews, and interesting materials for tech people and those who want to learn in general.

We would like to hear from you.

If you have any feedback, enquiries, or sponsorship request, kindly reach out to us at:

[email protected]
Most Popular
  • 1
    New Meta for Education Offering is Now Generally Available
    • February 26, 2025
  • 2
    Guide: Our top four AI Hypercomputer use cases, reference architectures and tutorials
    • March 9, 2025
  • 3
    Canonical announces 12 year Kubernetes LTS
    • February 11, 2025
  • 4
    IBM Completes Acquisition of HashiCorp, Creates Comprehensive, End-to-End Hybrid Cloud Platform
    • February 27, 2025
  • 5
    Claude 3.7 Sonnet and Claude Code
    • February 25, 2025
  • /
  • Technology
  • Tools
  • About
  • Contact Us

Input your search keywords and press Enter.