Open source integration platform standardizes multi-cloud security events The TriggerMesh team is excited to participate in our first ONUG this week. The event marks a significant milestone that caps several weeks of work by our engineering team with the Automated Cloud Governance WG on the Cloud Security Notification Framework (CSNF). Enterprises are multi-cloud, and Cloud Service Providers emit security notification data in varying formats, which can complicate analysis and remediation. CSNF aims to provide a standardized method and architecture to normalize and automate these security…
The growth of multi cloud deployments is undeniable. According to the 451 Research Voice of the Enterprise: Cloud, Hosting & Managed Services, Vendor Evaluations 2020 survey, 76% of companies are using two or more public clouds, with the average having 2.3 clouds in use. For larger organizations, these figures are even higher: those with more than $1bn in revenue are twice as likely to be using three or more clouds than smaller businesses. The top reason that enterprises use multiple clouds is to have access…
No, I’m not advocating that we jump into a new society where there are no rules; that would be catastrophic. We know what “rules” are in the network and IT operations. They are all those things we need to program to define the operational boundaries of our infrastructure. We use rules to set acceptable or non-acceptable thresholds on metrics, parse log messages, extract information from them, and do proper classification. In addition, we use rules to determine if configurations are right or wrong and define…
Network Complexity Grows Unabated All enterprise networks are growing increasingly more complex, expanding in breadth and depth from the edge to the cloud. The rapid adoption of multi-cloud architectures, Datacenter networks, SD-WAN, and other edge networking technologies have created new challenges for network operations (NetOps) teams. And all of this growth and technology change is causing a huge chasm between the available skilled NetOps resources and the litany of management tasks at hand. All said and done, this growth is proving that traditional device-centric methods…
Companies everywhere are moving to the cloud. But they struggle to ensure their security, to comply with regulatory standards, and to protect themselves and their customers from data breach or disruption. Yet the pressure to migrate to cloud continues unabated, and with little tolerance for slowing innovation to get control of cloud risk. A new approach is needed, one that automates security and compliance across the entire cloud application lifecycle, prevents breaches before they can happen and immediately identifies drift and attack in runtime environments….
To accelerate digital transformation and deliver a higher-quality customer experience, enterprises across multiple industries are attempting to shift to a “virtualized” IT and network environment. In this context, “virtualized” refers to the evolution from a hardware-centric enterprise edge to a software-centric environment. This entails replacing numerous physical network devices and application servers in each location with virtual network functions and application workloads uploaded to a single physical device. Examples include SD-WAN, Virtual Router, Virtual Firewall, Secure Access Service Edge, and others. Enterprises that make the…
Traditional security solutions still aren’t helping companies detect, recognize, and respond to rapidly changing relationships and threats. This problem is underscored by three main factors: Managers view workers as the cause of poor security. Workers make mistakes, they violate rules—they represent a problem that an organization needs to solve, instead of dealing with the underlying phenomena of security issues. Because of this, organizations intervene to try and influence workers’ behavior. Managers develop strict rules and guidelines that control what workers do, because they cannot be…
It’s no surprise that workloads are moving to the cloud in record numbers. At the same time, trends towards multi-cloud and hybrid cloud architectures are making networking far more complicated. Yet, network teams are often the last team to be brought in when organizations migrate. Why? Because cloud-provider tools were built for developers, not for the network. There’s a common theme emerging here: Tools, the organization, and the cloud infrastructure are optimized for application support and not networking. No one thinks about networks when building…
If you’re looking for a better way to build your network, everyone knows you go to ONUG. ONUG has proven that community collaboration transcends convention and myopic perspective. ONUG has been re-inventing what’s possible with the OSI stack allowing us to continue our forward progress when we were about to run out of road. Ten years ago, I remember an event where the presenter terrified everyone (who mostly showed up for a free steak) with the “fact” that we were about to exhaust the public…
It is unlikely that anyone would question the need for securing their hybrid multi-cloud estate; the number of mission-critical applications running in the public cloud nearly doubled between 2020 and 2021, and the growth is expected to continue. (Source: 451 Research’s Voice of the Enterprise: Information Security, Budgets & Outlook 2021). Cloud providers want to mitigate concerns, often saying, “The cloud is more secure than your on-prem network.” This is true, sort of. Public cloud providers have more highly trained experts focused on cloud security…