Safety teams have a variety of options when it comes to the safety of the network for cloud environments. Cloud service providers offer capabilities such as safety groups to impose traffic policies and work as a basic protection wall in addition to separate products for additional protection. While CSP security options historically were not as safe as third -party tools, the perception changes.
Let's take a look at how to improve CSPS network safety tools and began to achieve parity with third -party sellers.
The cloud service provider for the safety of the third -party sellers network
Besides safety groups, CSPS has provided products, such as Azure Firewall and Aws Network Network, which provides additional capabilities to prevent threat. Meanwhile, third -party security sellers, such as Cisco, Fortinet, and Palo Alto Networks, offer options ranging from VMS to the original cloud protection walls to protect cloud environments.
Historically, the choice of the protection wall for use depends on how to give organizations priority for easy use. The belief was that the CSP tools were easy to spread, form, expand and manage, but have provided weaker protection than threat. On the contrary, the third-party tools-VMS in particular-require more work for publication, but provided a strong event supported by global threat intelligence networks and years of security experience.
CSPS and sellers broke the gap in both directions. The introduction of the original cloud protection walls by third -party sellers, in close cooperation with CSP Partners, addresses publishing and formation concerns expressed about VMS.
On the other hand, CSPS continues to invest in security in all fields, and it seems to pay profits. Research from the Foundation's Strategy Strategy Group, which is now part of OMDIA, found that among the institutions that use the network security tools from CSPS, 60 % said that the most common cause is better effective. This was also the highest reason why organizations that use third -party tools said they did so, but the important point is that many of them feel the protection they get from CSP tools now more than “good enough”.
How do companies choose the safety of the network from CSPS or sellers?
Third -party sellers are still an advantage from the perspective of effectiveness. The fact that CSps cooperates to add the prevention of the third party storming is one example. So, the question becomes: How should you choose security teams between the two options?
More and more, it comes to enabling consistency of hybrid and multi -missed environments. Security teams are martyred with a variety of challenges when it comes to the protection of public cloud infrastructure. One of the areas where many organizations are still struggling with is the guarantee of consistency through cloud infrastructure and local data centers.
Enterprise Strategy Group research found that although the respondents included a long list of challenges, 35 % said that ensuring that the security policies of their entire environment were a problem, and 29 % said that maintaining a fixed vision across their entire environment represents a challenge. More than that, 44 % of the organizations that have witnessed an attack on public cloud infrastructure in the past 24 months said that this is due to the movement of harmful programs in a side.
Security teams want to simplify their infrastructure. Nine out of 10 said they prefer to use the same network sellers for the original cloud application environment like the rest of their environment, while 80 % of the unification of the sellers of the protection wall is a critical or important priority. For institutions that maintain local data centers, sub -offices and other non -black sites that require a wall of protection, this may become the main logical basis for choosing third -party tools.
The sellers must play their role to enhance parity. Simple unified administration to ensure the consistency of policy through the walls of virtual protection and cloud citizenship; Integration with cloud automation tools; Both artificial intelligence to detect threats and operations; Of course, the advanced threat protection is just some of the main capacity security difference that should give priority.
Each different institution, so there is no correct or wrong answer here. CSPS tools and will continue to make many organizations and use cases. However, attackers continue to take advantage of non -fatal mistakes. Poor formations, vulnerabilities in vision and incorrect policies that enable all side parties are examples. For complicated, hybrid or multi -missile environments, the uniform wall of the third -party protection wall is likely to be more logical.
John Jaradi is a major analyst for the Enterprise Strategy Group collection, which is now part of OMDIA, which covers the security of the network. Grady has more than 15 years of the experience of the IT seller and analyst.
The Foundation Strategy Group is part of OMDIA. Analysts have commercial relationships with technology sellers.