Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Applications
    • Applications
    • Cloud
    • Networking

    3 Key Components of Secure Workload Access For Multi-Cloud

    This three-pronged approach delivers security controls as software to distributed workloads, along with a centralized network services platform.

    Written by

    eWEEK EDITORS
    Published March 29, 2022
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      The acceleration of digital transformation over the past two years has radically shifted the way enterprises need to protect themselves from today’s modern cybersecurity threats. In particular, the move from monolithic applications to a highly distributed modern application architecture is causing the number of workloads and communications within and across clouds to explode.

      In fact, nearly two-thirds of global organizations have adopted the microservices model over the past two years. The ensuing shift in traffic patterns is giving resourceful cybercriminals the ability to target workloads to exploit security policy and control gaps to compromise applications. From there, they can move laterally from one application to the rest of the network.

      Zero Trust is quickly gaining momentum among enterprises as a counter to these modern threats, providing a far more robust security posture that supports digital transformation instead of hindering it. Based on the principle of “never trusting, always verifying” before allowing access to applications and resources, Zero Trust removes the assumption of trust, limits access, and authenticates based on identity and context.

      Also see: Top Cloud Companies

      Limitations to a Legacy Approach to Zero Trust

      Zero Trust is often used only for securing user access to enterprise networks rather than securing workload-to-workload communication. To protect these increasingly sophisticated, highly distributed applications, enterprise security teams need to secure the workloads themselves completely, without any security gaps or blind spots.

      The problem is that traditional firewall solutions are primarily built for the perimeter, and require internal traffic to be backhauled to an appliance in the data center where security policies can be applied—a process that increases latency, saps bandwidth, and adds complexity to network infrastructure. This complexity forces security teams to select what traffic should be monitored and secured.

      In a world where an enterprise’s security posture is only as good as its weakest link, this is an unacceptable choice.

      Operationalizing Secure Workload Access

      Enterprises need a way to operationalize secure workload access at cloud scale. This requires the simplifying of Zero Trust architecture through a software-based, distributed approach that delivers security directly into the hypervisor.

      Being able to secure workload-to-workload communication accelerates the adoption of Zero Trust principles, reduces the attack surface, mitigates lateral movement by attackers, prevents advanced threats against applications and, ultimately, unleashes the full power of the multi-cloud, microservices world.

      Also see: Top Edge Companies 

      3 Techniques to Operationalize Secure Workload Access at Cloud Scale

      1) Deliver East-West Controls Inside the Workload 

      Instead of backhauling traffic to the data center where it is hair-pinned through appliances, enterprises need to take a distributed, software-based approach to security.

      This allows security teams to create and manage application-aware policies from a central control point and automatically apply them to distributed workloads based on tags. Other security services can be delivered as well—including network traffic analysis (NTA), intrusion detection and prevention (IDS/IPS) and malware analysis with comprehensive network detection and response (NDR) capabilities.

      In addition, this provides continuous visibility, security, and compliance for containerized applications from development to production in any private or public cloud environment.

      2) Secure Cloud Boundaries and Environments 

      This software-based, distributed approach to secure workload access also requires the ability to inspect all incoming and outgoing traffic at the cloud edge. This provides comprehensive protection against threats, including signature-based detection, behavior-based detection, network sandboxing and URL filtering as well as Transport Layer Security (TLS) decryption.

      When deployed with a load balancer, a gateway firewall can provide multi-cloud load balancing, web application firewall (WAF) functionality, application analytics, and container ingress services. This allows enterprises to erect defenses at the boundary of each cloud deployment.

      Also see: Secure Access Service Edge: Big Benefits, Big Challenges

      3) Provide Authoritative Context for Secure Workload Access

      Orchestrating all this requires a centralized network services platform that provides unified visibility, control, and governance of network identifiers to simplify management of network identities and provide a framework to implement secure workload access. This creates a complete inventory of all workloads that need to be secured using identifiers such as Internet Protocol (IP) address, Domain Name System (DNS), labels or certificates.

      In addition to workload identity, authoritative context may include information about the workload such as the operating system, workload type, software version, known vulnerabilities and misconfigurations and anomalous workload behavior.

      The IT stack is rapidly changing, and security needs to keep up. Protecting the digital enterprise from today’s highly sophisticated threat actors requires more than just endpoint or perimeter security. In the never-ending game of cat and mouse with cybercriminals, it is impossible to stay one step ahead all the time. A Zero Trust architecture that includes secure workload access is the only way to root out and stop these attacks.

      This three-pronged approach requires the ability to deliver security controls as software to distributed workloads, the ability to erect defenses at the edge of each cloud environment, and a centralized network services platform that provides unified visibility and control of network identifiers.

      Also see: Tech Predictions for 2022: Cloud, Data, Cybersecurity, AI and More

      About the Author: 

      Vivek Bhandari, Sr. Director, Product Marketing, VMware

      eWEEK EDITORS
      eWEEK EDITORS
      eWeek editors publish top thought leaders and leading experts in emerging technology across a wide variety of Enterprise B2B sectors. Our focus is providing actionable information for today’s technology decision makers.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×