Why and How Your Approach to IT Security Needs to Change

by | Sep 18, 2017

Security, Cybersecurity trends

Here’s how security vendors like Trend Micro have adapted their solutions to protect customers in hybrid cloud environments.

An organisation’s IT infrastructure has expanded beyond the corporate firewall and perimeter. It is on the cloud and on mobile devices. Servers have become virtualised. There are thousands of IoT devices joining the network. Users work from anywhere and with their own devices. Applications reside on premise, in the cloud or on user devices. In a hybrid environment of this kind, it becomes difficult to have a centralised view of security. The old way of doing security is no longer adequate since the threat landscape has changed.

Nilesh Jain, Country Manager- (India and SAARC), Trend Micro

Nilesh Jain, Country Manager- (India and SAARC), Trend Micro

Nilesh Jain, Country Manager- (India and SAARC), Trend Micro said traditional security solutions like IPS and firewall are no longer that effective. He believes organisations need to redefine their IT security policies and put new security procedures in place.

“The security procedures should provide for governance in the cloud, since the applications are now in the cloud. Users will not go back to the IT team and ask for permission to use resources (like Office 365) on the cloud or on their mobile devices. We are no longer in the denial mode with a big list of don’ts. It is now a bigger list of do’s.”

With IT infrastructure getting more dispersed, organisations need to ensure visibility of security, no matter where the IT assets are located. It was easy to do this earlier, when the IT infrastructure was behind a firewall.

“Earlier, you had good visibility of the perimeter and into how data was flowing in or out of the organisation. But now things are different and the approach to security needs to change, said Jain.

The new generation of security tools are designed to handle hybrid environments. These security tools can integrate with clouds applications that are commonly used by enterprises. These tools are centralised and can give you a complete 360 overview of the security status of your IT infrastructure, whether it is on premise, on cloud or on mobile.

“You can’t outsource security. Security is owned by the organisation,” said Jain.

Security vendors have adapted their solutions for hybrid environments with new technology and partnerships with cloud service providers.

“Around four years ago, we at Trend Micro saw our customers moving to the cloud, so we collaborated with Amazon, and later with Microsoft, to secure their infrastructure on AWS and Azure cloud environments,” said Jain.

The challenge for security vendors like Trend Micro is hybrid environments. As more organisations adopt hybrid cloud infrastructure the big challenge is really synchronisation and common visibility for security, informs Jain.

“Our Deep Security solution can protect customers on physical and virtual servers. Protection is available on AWS and on Azure environments. It offers centralised visibility and centralised policy management,” he said.

Customers do not want multiple security products to secure their hybrid infrastructure. This is another challenge that security vendors need to address.

Share This Article!

Brian Pereira
Brian Pereira
Brian Pereira is an Indian journalist and editor based in Mumbai. He founded Digital Creed in 2015. A technology buff, former computer instructor, and software developer, Brian has 29 years of journalism experience (since 1994). Brian is the former Editor of CHIP India, InformationWeek India and CISO Mag. He has served India's leading newspaper groups: The Times of India and The Indian Express. Presently, he serves the Information Security Media Group, as Sr. Director, Editorial. You'll find his most current work on CIO Inc. During his career he wrote (and continues to write) 5000+ technology articles. He conducted more than 450 industry interviews. Brian writes on aviation, drones, cybersecurity, tech startups, cloud, data center, AI/ML/Gen AI, IoT, Blockchain etc. He achieved certifications from the EC-Council (Certified Secure Computer User) and from IBM (Basics of Cloud Computing). Apart from those, he has successfully completed many courses on Content Marketing and Business Writing. He recently achieved a Certificate in Cybersecurity (CC) from the international certification body ISC2. Follow Brian on Twitter (@creed_digital) and LinkedIn. Email Brian at: [email protected]
Recommended Posts
The First 90 Days Are Crucial for the CISO and CIO

This book arms you with insights into crafting a robust 90-day plan, and you’ll be well-equipped to catapult into CIO or CISO roles successfully. Beyond technical proficiency, the book instills survival skills, ensuring longevity and helping you prevent burnout in these pivotal positions.

Similar Articles

Return to Business as Unusual
Return to Business as Unusual

Remote working is no longer a benefit, luxury or convenience. It’s also more than a current make-do for organizations looking to conduct business as usual.