• About
  • Subscribe
  • Contact
Monday, May 12, 2025
    Login
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
No Result
View All Result
Home Technology Security

The challenges of securing complex hybrid cloud setups

Allan Tan by Allan Tan
July 27, 2021
Photo by Tima Miroshnichenko from Pexels

Photo by Tima Miroshnichenko from Pexels

“By 2025, 85% of infrastructure strategies will integrate on-premises, colocation, cloud and edge delivery options, compared with 20% in 2020,” said David Cappuccio, distinguished VP analyst; Henrique Cecci, senior director, Gartner Research Report – “Your Data Center May Not Be Dead, but It’s Morphing,” September 17, 2020.

If today, organizations are struggling to secure on-premises, private clouds or public clouds as separate infrastructure setups, what more will it be like for them as they move to this multi-hybrid future? Employers may have successfully moved everyone to remote work but the haste with which the move was done may have left some exposed to cyber threats.

What can CISOs do to ensure their organisation is protected?

FutureCIO spoke to Gary Gardiner, head of security engineering, APAC & Japan at Check Point Software Technologies, on how security measures are evolving in the hybrid environment post-COVID-19.

What's new in the hybrid data centre?

Gary Gardiner: We are seeing innovations around the ability of a hybrid data centre to provide runtime as well as Application Program Interface (API) security. This means that the hybrid data centre secures what is already within legacy systems with the new agile and extended environment.

Security is “shifting left”, where the codebase is to be designed as secure from the start with a thorough examination of all communications, rather than just scrutinising the data in transit and at rest inside the cloud.

We need to pore deep into the code and all API calls powering all the services in the cloud, to ensure that nothing malicious or remotely suspicious is taking place in these environments.

What are the pain points when it comes to securing the hybrid data centre?

Gary Gardiner: Check Point Software has seen organisations spend a long time developing the systems they have in place to provide the visibility and security that they need in their legacy data centres.

One major pain point businesses face in securing the hybrid data centre is trying to achieve the security parity between what they expected in their legacy on-premise data centre with that of their cloud and virtualised environments, as these environments are radically different.

Another major challenge is the migration of services to the cloud. The cloud environment is radically different from on-premise legacy systems, and have nuanced and specific demands to implementation and security, and additional hurdles to achieve security and operational parity between integrated legacy data centres with the cloud.

How do you provide cybersecurity assurance when you operate in a hybrid work environment - remote-office work in a combination of hybrid DC environments?

Gary Gardiner: We must first understand that no network, however obscure, is immune from cyberattacks.

There are 2 fundamental things we must look at in a hybrid data centre environment. First, we must have visibility across both environments. Legacy data centres are fairly static and easy to achieve security visibility. However, in a hybrid environment, we need to ensure we have the same visibility in any change, however difficult to discern, can be isolated and examined in the cloud as well as the legacy data centre.

Second, we must have cybersecurity resilience uniformly across both the legacy data centre and the cloud, where a holistic security approach provides the overarching strategy, and battle-tested tactical implementation of digital and cybersecurity systems provides the resilience to bounce back to operational readiness for the hybrid environment, given that any part of the environment, whether on-premise or in the cloud, will face intrusions frequently.

What are the 3 most common issues Check Point sees among ASEAN enterprises?

Gary Gardiner: The first most common issue we see in ASEAN enterprises is the complexity and difficulty in migrating services to the cloud. Many organisations believe that they can migrate all services very quickly to the cloud, which invariably create a less resilient environment for the short term.

The second most common issue is that organisations must realise that they are still responsible for the data stored in the cloud, and not that of cloud providers.

While cloud providers may provide some degree of security and have performance agreements offering some shared culpability, at the end of the day, organisations are still responsible for the data, and cannot be absolved from legal or other ramifications should cybersecurity incidents occur.

The third most common issue is that some organisations are unaware of the dynamic and transient nature of the cloud, and how even a minute change made by the provider, or the client organisation can have an effect on its security posture, ranging from minor to drastic.

For example, a business can create a database server instance on the cloud, that would have direct access to the Internet. Such a server would put the data at risk of exposure.

Understanding that any data stored on the cloud should be treated as public and therefore insecure, with a security framework that encapsulates as many security layers as humanly possible, to reduce the possible attack or intrusion surfaces from threat actors, and to afford effective resilience actions whenever security policies are breached.

Related:  The technology sector, the most impersonated industry in brand phishing
Tags: Check Point Software Technologiescyber securitycyber threatshybrid environmenthybrid working
Allan Tan

Allan Tan

Allan is Group Editor-in-Chief for CXOCIETY writing for FutureIoT, FutureCIO and FutureCFO. He supports content marketing engagements for CXOCIETY clients, as well as moderates senior-level discussions and speaks at events. Previous Roles He served as Group Editor-in-Chief for Questex Asia concurrent to the Regional Content and Strategy Director role. He was the Director of Technology Practice at Hill+Knowlton in Hong Kong and Director of Client Services at EBA Communications. He also served as Marketing Director for Asia at Hitachi Data Systems and served as Country Sales Manager for HDS’ Philippines. Other sales roles include Encore Computer and First International Computer. He was a Senior Industry Analyst at Dataquest (Gartner Group) covering IT Professional Services for Asia-Pacific. He moved to Hong Kong as a Network Specialist and later MIS Manager at Imagineering/Tech Pacific. He holds a Bachelor of Science in Electronics and Communications Engineering degree and is a certified PICK programmer.

No Result
View All Result

Recent Posts

  • APAC CIOs rethink cybersecurity investments amid expanding threat landscape
  • Study finds almost half of businesses bank on AI-enabled cybersecurity for EDR and XDR
  • AI drives cloud market growth in Q1
  • ARTHALAND chooses OutSystems to advance real estate sustainability
  • Experts warn against AI-powered deepfake impersonation scams

Live Poll

Categories

  • Big Data, Analytics & Intelligence
  • Business Applications & Databases
  • Business-IT Alignment
  • Careers
  • Case Studies
  • CISO
  • CISO strategies
  • Cloud, Virtualization, Operating Environments and Middleware
  • Computer, Storage, Networks, Connectivity
  • Corporate Social Responsibility
  • Customer Experience / Engagement
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity operations
  • Education
  • Education
  • Finance
  • Finance & Insurance
  • FutureCISO
  • General
  • Governance, Risk and Compliance
  • Government and Public Services
  • Growth Strategies
  • Hospitality & Tourism
  • HR, education and Training
  • Industry Verticals
  • Infrastructure & Platforms
  • Insider threats
  • Latest Stories
  • Logistics & Transportation
  • Management Leadership
  • Manufacturing
  • Media and Telecommunications
  • News Stories
  • Operations
  • Opinion
  • Opinions
  • People
  • Process
  • Remote work
  • Retail & Wholesale
  • Sales & Marketing
  • Security
  • Tactics and Strategies
  • Technology
  • Utilities
  • Videos
  • Vulnerabilities and threats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.

Quick Links

  • Videos
  • Resources
  • Subscribe
  • Contact

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe