eBooks/eGuides

Data Center and Hybrid Cloud for Dummies

Issue link: https://insights.oneneck.com/i/1458399

Contents of this Issue

Navigation

Page 68 of 82

64 Data Center & Hybrid Cloud Security For Dummies, Palo Alto Networks Special Edition These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. often through public networks and devices that are open to advanced threats. Users simply expect to be able to connect and work from any location, whether at an airport, in a coffee shop, in a hotel room, or at home. Employees, partners, contractors, and supply chains are all accessing data center and cloud resources from beyond the traditional perimeter of the enterprise. This increases risk when users are off-premises because there is no network firewall to stop attacks. The issue becomes even more complex when considering the effects of cloud and bring-your-own-device (BYOD) practices. In addition, remote locations and small branch offices often lack consistent security because it is operationally inefficient and costly to ship firewalls to them or backhaul traffic to headquarters. The mobile workforce and remote locations need access to appli- cations from places far beyond your network. The requirement to protect these mobile and remote users is a way to enable the same application, user, and content protections they receive while on premises. They also need protection from targeted cyberattacks, malicious applications and websites, phishing, C2 traffic, and other unknown threats. This requires consistent security. Your network security platform must enable and adapt to the required levels of visibility, threat prevention, and security policy enforce- ment required to protect distributed users and locations by deliv- ering network security capabilities from the cloud across physical and virtualized workloads spanning hybrid cloud, securing them with either physical hardware or virtualized appliances. Network security solutions for the hybrid data center must deliver secure access for mobile and remote users to the data center and cloud, in addition to addressing the use of endpoint devices other than standard corporate-issued equipment. One Comprehensive Policy, One Management Platform Individual security products typically come with their own man- agement applications. To configure security for each one, secu- rity operators must work with different management systems. These products are often disconnected and cannot share insights. Organizations also find it challenging to scale firewall onboard- ing, maintain consistent security policies, and deploy emergency changes across thousands of firewalls. This makes security com- plex and stretches IT teams to the limit.

Articles in this issue

Archives of this issue

view archives of eBooks/eGuides - Data Center and Hybrid Cloud for Dummies