One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 2068133
Date de publication 2020-11-30 18:03:00 (vue: 2020-11-30 20:05:44)
Titre ​​​​​​​The perfect storm: How digital transformation is reshaping security and networking
Texte Think back to the end of 2019. Enterprises were evolving IT infrastructure at a moderate pace to reduce costs, be more competitive, and improve their ability to adapt to an increasingly digitized world. Whether migrating workloads to the cloud, virtualizing network functions, diversifying mobility, or moving applications and services closer to the edge, digital transformation was steadily evolving the business landscape. Then came COVID, and in less than 12 months, digital transformation went from that steady evolution to an absolute imperative, accelerated by a suddenly remote workforce and realization that the network (especially user access to data, services, and applications) and its security are the lifeblood of business. Conversations in the C-Suite quickly changed in tone, focusing on one crucial question: How quickly can we pivot and securely update or even rebuild our network to provide for  future business continuity and remain competitive? Even as businesses continue to traverse the challenges of the pandemic and remote working, they are building on digital transformation strategies and investments so they can rebound to recovery. According to IDC, investment in digital transformation has been accelerated by the events of the last year, and it will continue to grow at  compound annual growth rate (CAGR) of 15.5% from 2020 to 2023, approaching $6.8 trillion. AT&T Cybersecurity also has seen a significant uptick in and acceleration of enterprises embarking on digital transformation. Typically, these initiatives involve wireless access network (WAN) virtualization (a push to SD-WAN) and cloud migration paired with cybersecurity evolution. And they are being set in motion by both the network and security teams, depending on the organization’s priorities. Regardless of who is leading these initiatives, it’s the leadership of the organization that is pushing for change as they come to terms with the challenges of managing and protecting  today’s highly complex networks and the connections that support them. With data, users, applications, and devices spread across hybrid environments, connecting to the network from hugely diverse locations, managing and controlling access —  authentication and authorization — has taken on unprecedented priority and urgency. In the new reality of remote working, for example, employees must be able to access the applications and data needed to perform their jobs. Without that, the business is at a clear disadvantage. However, security teams are struggling not only to control who and what devices have access, but to also consider when, why, and for which purpose. This has brought the conversation about security to the forefront. Gone are the days of security as an afterthought. Today, a security-first mindset is driving the conversation. Because of this, security approaches like Zero Trust have become mainstream. To this point, a global survey of 1,000 enterprises conducted by AT&T in September 2020 revealed that 95% of enterprises are researching, implementing, or have completed implementation of a Zero Trust initiative in their network. In addition, as the mobility of the workforce continues to expand, IoT data consumption explodes with edge computing , and the attack surface continues to become more complex. Security leaders will be looking for ways to consolidate security tools and decrease the number of vendors they’re working with. However, they also need complete visibility of their complex environment (still yet-to-be-realized for many), to automate processes and in some cases  preemptively orchestrate them using advanced analytics, and to improve response times for known threats and
Envoyé Oui
Condensat “single “transitioning — has   security  alliances  authentication  based  compound  full  future  today’s  with 000 2019 2020 2023 365 ability able about absolute accelerated acceleration acceptable access according accurate acquisition acquisitions across action actualize adapt add addition adds advanced afterthought aggressively alerts alike all allowed allows also always amid among analytics annual application applications approach approaches approaching appropriate are ask asking at&t attack authorization automate available aware back based because become been begun being benefits best better between blocking both breed broker brokers brought building built business businesses but cagr call calling came can capabilities casb cases  centralized centrally certainly challenges chance change changed changes cited claims clear closer cloud cloud” combined come competitive complete completed complex complexity compliance components compromised computing concepts conducted connected connecting connection connections consider consistently consolidate consumption context continue continues continuity continuously control controlling controls conversation conversations core corporate cost costs could covid creating criticality crucial customer customer’s customers cybersecurity data days ddos debated decentralized decrease definition deliver delivered depending design despite detection device devices dial digital digitized direction disadvantage disparate distributed diverse diversifying dlp drivers driving dynamic dynamically each edge embarking embraces emerging employees end enforce enforced enforces enterprise enterprises entire entity environment environments esg especially essential even events everything evolution evolve evolving example expand explodes extra factors firewall firewalls first focused focusing forefront form forward friction from fully function functionality functions fwaas gartner gateway gateways generation give global gone granular group grow growth half has have help highly hotly how however hugely hybrid idc identifiable identity impacts imperative implementation implementing improve include: included inconsistent increased increases increasingly incumbent industry inefficiency information infrastructure initiative initiatives innovate innovation inspection intelligence internet investigating investment investments involve iot it’s its jobs key known landscape large last layer leaders leadership leading least leg less lifeblood like locations looking loss main mainstream make making malicious managed management managing many market marketing matter maturity migrating migration migrations mindset misconfigurations mobility moderate months more motion move moving msp msps mssps multi multiple must native natively navigate necessitates need needed negative network networking networks new next ngwf not nothing number offer offering office one ones only opposed optimize orchestrate organization organization’s organizational other others out overlap overlapping pace packets paired pairing panacea pandemic part particular passing per perfect perform performance performs personally pii pivot platforms point points policies pops positioned potentially practices pre preemptively premise presence prevention priorities priority privilege problem processes promise protect protecting protection provide provider providers provides purpose push pushing question: quickly rate reality realization realized rebound rebuild recovery reduce reduction regardless relevant remain remote reported request researching reshaping resilient respective respondents response result resulting revealed roadmap routed routing safer same sase scale secure securely security seek seeking seen selected selecting sensitive september service services set significant significantly silos simplification single site sites solution solutions some specific sports spread starting stating steadily steady steps storm: strategic strategies s
Tags Vulnerability Threat Guideline
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: