• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Cloud   »   Your Journey to the Cloud: Securing the Modern Data Center

Your Journey to the Cloud: Securing the Modern Data Center

  • Posted on:July 30, 2014
  • Posted in:Cloud, Cloud Security, Private Cloud, Public Cloud, Security
  • Posted by:
    Mike Smith
0

Cloud Journey

 

 

 

 

 

 

 

Speak to any IT manager today, and they’ll tell you they’re on a journey: a journey from a physical environment to virtualized and cloud environments. With no two IT environments the same, they’ll all be at a different stage of this journey, but the stats speak for themselves. A few years back, Gartner predicted that three-quarters of x86 server workloads would be virtualized by 2015. That same report in 2011 also forecast the number of virtual machines (VMs) to grow five-fold at a CAGR of 38% from 2010-2015.

It’s a no-brainer for most IT leaders, under pressure to cut hardware costs and run systems in a more efficient, environmentally-friendly and agile manner. Across the globe, organizations are virtualizing their physical servers and also tapping into the power of public and private clouds and all the flexibility, scalability and ease-of-management that comes with this. Yet, while virtualization and cloud computing simplifies on the one hand, it complicates on the other. Organizations usually end up running hybrid environments of physical, virtualized and cloud environments in their modern data center.

Shoehorning legacy physical security into these complex, mixed environments will not work. Instead, a new approach is necessary.

A brave new world

Virtual environments present a whole new set of security risks, and cybercriminals have already proven to be more than capable of exploiting these new vulnerabilities.

Virtual machines by their very nature are dynamic. IT managers are forever provisioning and de-provisioning them as needed, providing rapid computing resources wherever it is needed, for however long it is needed. It is difficult to consistently keep these VMs up-to-date with the latest security patches as one would in a traditional IT environment. This can mean that if VMs that have lain dormant for some time are then powered on they can introduce serious security vulnerabilities. These are called “instant-on gaps.”

Another by-product of the dynamic virtual environment is that VMs of different trust levels often end up being housed alongside each other, opening up the risk of inter-VM attacks. This is especially true of multi-tenancy public cloud environments where organizations often have little or no say over where their VMs will end up and who they’ll share infrastructure with. Traditional appliance-based IDS/IPS solutions can’t monitor this inter-VM traffic, potentially leaving the organization exposed to such attacks.

A final major issue with virtual environments involves resource contention and performance. VM densities can sometimes grow into the hundreds, so if a traditional security product is used, AV scans or other scheduled updates kick in on all machines at once. The resulting “storm” can severely impact performance, while also undermining security and compliance efforts.

A modern solution

The answer is to invest in modern data center security. That is, security tools and products that have been designed specifically with virtual and cloud environments in mind. Look for an agentless architecture which means resource-intensive tasks are handed off to a virtual appliance, combatting the risk of security “storms.” Modern data center solutions will also ensure each VM is provisioned in a fully secure state thanks to virtual patching capabilities, addressing the problem of instant-on gaps. Finally, look for a provider who can promise that each of your VMs will be wrapped in a secure perimeter wherever they go – preventing inter-VM attacks as they travel from one hypervisor to the next and out into the public cloud.

The Deep Security difference

Trend Micro Deep Security is an industry-leading security solution designed to protect organizations across physical, virtual and cloud servers. It features anti-malware, web reputation, integrity monitoring, intrusion detection and prevention, firewall and log inspection – available agentless for virtual environments.

Here are a few more benefits:

  • Optimized for leading virtualization and cloud architectures including AWS, Microsoft Azure, VMware vCloud Hybrid Services.
  • Deployed at hypervisor level for improved visibility, easier compliance
  • Creates self-defending VMs to counter inter-VM attacks
  • Virtual patching to close off instant-on gaps
  • One platform for all environments eases management, lowers TCO
  • Backed by threat intelligence from industry-leading Smart Protection Network

 

Related posts:

  1. Security, your cloud and data center environment – does it fit like a glove?
  2. Optimize Your Modern Data Center with Next Generation Technologies
  3. Uncomplicating PCI Compliance in the Modern Data Center & Cloud
  4. 10 Steps to Securing Your Journey to the Cloud

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Detected Cyber Threats Rose 20% to Exceed 62.6 Billion in 2020
  • Trend Micro Recognized on CRN Security 100 List
  • Trend Micro Reports Solid Results for Q4 and Fiscal Year 2020
  • Connected Cars Technology Vulnerable to Cyber Attacks
  • Trend Micro Asks Students How Their Relationship to the Internet Has Changed During COVID-19
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.