• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Elisa Lippincott
    • Mark Nunnikhoven
    • Jon Clay
  • Research
Home   »   Cloud   »   Taking charge to secure the next generation data center

Taking charge to secure the next generation data center

  • Posted on:December 9, 2013
  • Posted in:Cloud, Security
  • Posted by:
    Dawn Smeaton
0

Trend Micro will be at Gartner’s Data Center Conference 2013 in Las Vegas all this week talking about our vision around the future of securing the data center. As you know from living and breathing your job every day, data centers are evolving at a rapid pace, with organizations embracing server virtualization and the cloud as an extension of the data center. Of course, these changes are bringing IT challenges as well as huge opportunities. But with the right approach to securing these new environments, both the security and operations teams can work together to achieve their goals. The opportunity this represents is simple but hugely important: take charge of this new environment, and you can achieve better security than was possible in the past – more auditable, easier to manage and with huge operational advantages over static security architectures.

The way a data center looks is very different even today

There’s no doubt that homogenous server environments are by and large a thing of the past. According to Gartner, a staggering 71% of server workloads will be virtualized by 2016 as organizations look to tap those much-touted benefits of cost reduction, greater business efficiency, and improved agility. Customers are also clearing voting with deployments on the cloud, with organizations like Amazon Web Services (AWS) and others showing huge growth. The challenge is that traditional tools can’t simply be re-deployed into virtual or cloud environments and be expected to work. The next generation data center will require a new approach to security… let’s take a look at some additional dynamics around security.

Hackers mean business

Trend Micro has been monitoring the cyber underground for a quarter of a century now and built up what we think is a pretty accurate profile of the enemy. People who want into your data center are highly motivated, well resourced, organized and disparate. In short, cyber crime has gone professional.

Cyber crime has fundamentally become a commercial enterprise. Mimicking the world of legitimate commerce, the information, tools and resources needed to launch attack campaigns can all be bought and sold on the cyber underground. All you need is enough money and to know where to look.

Just like commercial enterprise, success has driven cyber criminals to become focused and dedicated. Just like the outliers of Malcolm Gladwell’s 2008 bestseller, they are achieving success through 10,000 hours of work. Every aspect of an attack is measured, analyzed and optimized for maximum ROI.

Where do we go from here?

So we’re faced with multiple challenges as we move to virtual and cloud environments. Operations and security need to work together more to achieve the goals of the business. Hackers are continually attempting to steal your data and wanting to disrupt the data center. So how do we respond?

By taking charge with security which looks at the next generation data center in the same way that legacy security secured the data center of the past. Security needs to work seamlessly across physical, cloud and virtual environments – at the same time; in the same interface; with the same controls. There are opportunities in the next generation data center for easier management, improved ability to audit, and to actually achieve better protection for sensitive data and applications. Interestingly, security in the next generation data center fits better – including improved boot times, CPU savings, scalability and consistent performance – that will have security and ops finally singing from the same hymn sheet.

Look out for part two where we’ll explain how a virtual-aware approach to securing the data center could reap rewards for both IT security and operations.

Related posts:

  1. Optimize Your Modern Data Center with Next Generation Technologies
  2. Extend Your Virtualized Data Center to the Cloud with Ease
  3. Your Journey to the Cloud: Securing the Modern Data Center
  4. Security, your cloud and data center environment – does it fit like a glove?

Security Intelligence Blog

  • Monero-Mining RETADUP Worm Goes Polymorphic, Gets an AutoHotKey Variant
  • XLoader Android Spyware and Banking Trojan Distributed via DNS Spoofing
  • XTRAT and DUNIHI Backdoors Bundled with Adwind in Spam Mails

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • The Role That IT Security Teams Need to Play in Connected Hospitals
Elisa Lippincott (TippingPoint Global Product Marketing)
Elisa Lippincott (TippingPoint Global Product Marketing)
  • TippingPoint Threat Intelligence and Zero-Day Coverage – Week of April 16, 2018
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Warnings and WannaCry
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Drupal Latest Platform To Be Hit With Critical Vulnerability
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • Today’s Predictions for Tomorrow’s Internet
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • The Risks of Bio-IoT

Follow Us

Trend Micro in the News

  • The connected workforce: The importance of protecting home and corporate networks
  • NIST Cybersecurity Framework Series Part 5: Recover
  • NIST Cybersecurity Framework Series Part 4: Respond

Trend Micro Blogs

  • Internet Safety for Kids
  • Countermeasures
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.