More and more, the change of organizations is being transferred to hybrid cloud environments and containerization technologies. However, with this great chance, it bears the risk of new security challenges that are challenging for the traditional solutions to combat.
A joint study by Kaspersky and ISG highlights this which involved surveying 310 large company leaders, including CISOs and CTOs, responsible for strategic technology investments across a wide range of industries in 12 countries.
Almost every respondent in this research was interested in making better their cloud-native capabilities, harnessing both on-premises and cloud resources, scaling development practices up around containers.
Data points underpin the enthusiasm: 71% of organizations are already using public cloud platforms and a whopping 96% intend to adopt cloud-native technologies in the next two years. What is more, close to three-quarters of respondents are actively getting ready to take up containerization technology for managing dynamic workloads.
Security Concerns Lag Behind Cloud Adoption
As cloud adoption continues to surge, cybersecurity solutions appear to lag in their ability to pragmatically address the ever-changing security landscape of hybrid clouds and containerized environments. Most significantly, half of the organizations surveyed reported struggling to meet data security and compliance demands. As many as 54% said investment in tools to secure cloud workloads was a top priority going forward.
Proactive Security Measures Needed
It is evident the rise of importance in cloud security was noted, that three out of five respondents lay high importance on proactive monitoring and remediation of misconfigurations in cloud assets that is of critical need. Over half are looking for solutions to provide cloud workload security with continuous monitoring capabilities that automatically respond.
Containerization Security in Perspective
As containerization continues to gain traction, 51 percent of respondents said they will spend money this year on solutions for real-time tracking of breaches and alerts linked to container compliance.
Another 43 percent said they consider investments in “shift left” security protocols a priority this year. Shift-left security focuses on integrating security protocols at every stage of the development lifecycle.
Key to a Comprehensive Security Solution
The study presented an organization that was in search of a holistic security approach by moving to hybrid cloud and containerization technologies. Among other things, this will involve always-updated prediction mechanisms based on artificial intelligence and machine learning, conducting an analysis of user behaviors, and how they can spot and curb attacks to further cement data protection policies.
What is required is a unified, consistent platform securing all types of endpoints, servers, and workloads for the cloud—a centralized identity management approach and an embedded CASB—to have much better visibility into security areas and apply zero-trust security policies.
In summary, hybrid cloud services require integrated and customized threat intelligence feeds. Real-time, context-rich analysis of potential threats in cloud environments with information about their sources, tactics, and procedures. In light of the fast-evolving landscape of hybrid cloud and containerization technologies, the results of this study articulate how security solutions must change at a similar pace.
Emphasis toward preventive measures in security, widespread security solutions, and deployment will enable the organization to address this digital transition while protecting its data and infrastructure.