eBooks/eGuides

Data Center and Hybrid Cloud for Dummies

Issue link: https://insights.oneneck.com/i/1458399

Contents of this Issue

Navigation

Page 52 of 82

48 Data Center & Hybrid Cloud Security For Dummies, Palo Alto Networks Special Edition These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. may move automatically from an on-premises data center to a public cloud to provide business continuity in the event of an out- age, or they may expand on-demand from a single VM (or con- tainer) to dozens of VMs or hundreds of containers) in a VM scale set (or in a Kubernetes cluster) during periods of peak demand. Thus, modern security solutions for hybrid clouds must be able to move and scale dynamically with the resources they are deployed to protect. They cannot be constrained to physical or logical boundaries, such as an on-premises data center or IP subnet, respectively. Threat Protection Components Adversaries have become highly targeted, leveraging sophisti- cated playbooks to breach an organization, move laterally, and extract valuable data, all while remaining invisible to traditional defenses. Threat protection automatically stops vulnerability exploits with intrusion prevention capabilities, offers in-line malware protection, and blocks outbound command-and control- traffic. When combined with cloud-based malware analysis and Uniform Resource Locator (URL) filtering, organizations are pro- tected at every stage of the attack lifecycle, including both known and zero-day threats. Effective threat protection against sophisticated modern threats requires a suite of security components working together including: » Endpoint protection » Security Orchestration Automation and Response (SOAR) » Cloud-based threat intelligence Endpoint protection For decades, traditional antivirus has been the de facto solution for protecting endpoints. Antivirus checks all the boxes for regula- tory, governance, and compliance audits, but it provides minimal real security benefits. Although antivirus solutions protect nearly every endpoint and server in the world, security breaches continue at an alarming rate. This is largely because traditional antivirus

Articles in this issue

Archives of this issue

view archives of eBooks/eGuides - Data Center and Hybrid Cloud for Dummies