Issue link: https://insights.oneneck.com/i/1458399
10 Data Center & Hybrid Cloud Security For Dummies, Palo Alto Networks Special Edition These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. and new applications. As a result, although proxies understand a few protocols in depth, they typically lack the breadth of protocol support needed to control the tunnels and protocols within pro- tocols that attackers use to hide their true traffic. Defining Security Requirements Data center network teams protecting hybrid clouds with tradi- tional security approaches face a security complexity trifecta: » Limited visibility and imprecise control » An ever-expanding attack surface » Increasingly advanced cyberthreats Overcoming these challenges requires adopting a new hybrid cloud protection methodology to gain complete visibility, min- imize the attack surface, and automate threat protection (see Figure 1-3). Gain complete visibility Complete visibility — of who the users are, what applications they're accessing, and when and where they're connecting — is one of the biggest challenges for data center teams. Achieving this gives teams a comprehensive view of devices and connec- tions so they can track applications and users. Application and user insights simplify network security management functions, FIGURE 1-3: What's needed for hybrid cloud security.