One Article Review

Accueil - L'article:
Source NetworkWorld.webp Network World
Identifiant 357818
Date de publication 2017-04-20 05:57:00 (vue: 2017-04-20 05:57:00)
Titre IDG Contributor Network: Finding and protecting the crown jewels
Texte Visibility and security controls for internet-based applications such as social media, file sharing and email have been widely adopted at the perimeter. As we transition from the legacy perimeter security model to a cloud security model, there is a need to ensure we don't forget the principles we have established. Virtualization has changed how applications are built, deployed and used. It has also created challenges to how security is applied and deployed for these environments. That isn't necessarily a bad thing; the result of these challenges has driven new innovation in the cloud security space.+ Also on Network World: The tricky, personal politics of cloud security + Discovering and mapping application communications and dependencies is one of the first steps in defining and creating security policies for east-west data center traffic. Unfortunately, there is often a lack of understanding about these relationships, making east-west security policies difficult to implement and often prone to misconfiguration. As a result, we still see an abundance of successful attacks and the loss of critical data, even with traditional perimeter security models in place.To read this article in full or to leave a comment, please click here
Envoyé Oui
Condensat about abundance adopted also application applications applied are article attacks bad based been built center challenges changed click cloud comment communications contributor controls created creating critical crown data defining dependencies deployed difficult discovering don driven east email ensure environments established even file finding first forget from full has have here how idg implement innovation internet isn jewels lack leave legacy loss making mapping media misconfiguration model models necessarily need network network: new often one perimeter personal place please policies politics principles prone protecting read relationships result security see sharing social space steps successful such these thing; traditional traffic transition tricky understanding unfortunately used visibility west widely world:â the â virtualization
Tags
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: