Sorry, the language specified is not available for this page

    Cartoon: What IT professionals see when they look at clouds

    April 4, 2019

    Some folks see trees when they look up at clouds. For others, clouds may take the form of a rabbit. But when IT professionals stare at clouds, they can’t help but picture a hosted private cloud with micro-segmentation. And for good reason.

    What IT professionals see when they look at clouds

    An increasing number of organisations are moving to the cloud for its obvious benefits. But along with this transition comes a greater need for more advanced cloud security measures. Micro-segmentation is one of these measures.

    Unlike traditional security defense strategies like firewalls and edge devices that protect the flow of north-south data by focusing on the perimeter, micro-segmentation focuses on the inside, isolating individual workloads to protect traffic that’s traveling east-west within a data center. So even if a bad actor manages to get past your perimeter security measures, micro-segmentation will prevent the attack from spreading.

    Failing to adapt security to meet the growing needs of increasingly complex IT environments can be catastrophic.

    With cloud security top of mind for IT professionals, it’s no wonder they’re seeing it everywhere they look.

    Other Posts You Might Be Interested In

    When IT Comes to IT Migrations and Infrastructure Resilience, Teamwork Counts

    When you think of great teamwork, what comes to mind? Perhaps The Beatles (John, Paul, George & Ringo are pretty hard to beat)? Or the Miracle on Ice (the 1980... Learn More

    Why sovereign public cloud is a game changer for the UK public sector and the citizens it serves

    By Chris Huggett Spending £100m an hour or £28,000/second, is an immense responsibility for the public sector. How it chooses to distribute an approximately £817... Learn More

    Container Security Cartoon: What’s in Your Containers?

    If you’re using container technologies, ask yourself this: Do you actually know what’s inside your containers? Do they contain any malicious software libraries? Are... Learn More