The enterprise data environment is more complex; so is protecting it - ISH Technology

Enterprises' data environment is more complex; so is protecting it

More and more enterprises are moving their server, data and workload infrastructures to virtual environments, mainly in the cloud. Secure and private clouds, and public ones too. So if the enterprise data environment is more complex, so is protecting it.

This heterogeneous landscape, which uses a mix of on premises technologies, often with an orchestration layer between private and public clouds, is what we call a hybrid cloud.

Each piece of that gear has its own characteristics that need a specialised solution. A tool that works on Amazon, may not be compatible with Azure, or Google. Something that solves your problem on VMware, might not see Hyper-v or another virtualisation platform.

Complexity

Virtualisation, despite bringing enormous benefits to the business - simplifying the activities involved in the availability and scalability of environments - has also brought more complexity to the management of the infrastructure below it. Thus, with more complexity, the number of vulnerabilities that need to be addressed also increases.

Risks

For a hacker, any open door will do, no matter which cloud, on which hypervisor, in which country. If attacking a production server directly is too complicated because the target company has focused all its efforts on protecting it, the attacker can turn to a development machine or a workstation to achieve his goal. After all, a hacker doesn't mind using a, shall we say, less noble port, as long as it facilitates his action.

This is because, although this infrastructure has parts in different locations, using different technologies, it works together and the systems talk to each other.

No wonder we are moving towards integral security models, where solutions need to have total visibility of the environment. Exclusive and miraculous protections that only work for part of the components sometimes work against the security of the environment. In addition to reducing visibility, they create a false sense of security, which is very dangerous.

So how to protect?

You may be asking yourself: is there a solution that, alone, can connect to all environments and thus enable a full view of the infrastructure?

There is no magic, no shortcut. There is no solution that does it all by itself. There is only one way to protect an environment that is spread across multiple clouds, using different hypervisors, containers, legacy physical servers, and all sorts of other possible components.

Through advanced services that integrate different tools into a unified vision. At ISH Tecnologia, we have named this service Vision.

ISH Vision was created based on the demand of companies that need to protect complex structures and needed to invest in hundreds of different solutions. Thus, we simplified the lives of managers seeking advanced compliance and data security services aimed at providing visibility, management and protection of their information technology infrastructure. As a suite of solutions managed by a highly specialized team, Vision was formatted to go from cybersecurity operations, to data and infrastructure protection, to access and identity management, to GRC programs, which have gained more relevance due to LGPD.

People's behaviour has changed. Today, we consume data on multiple devices, from everywhere. Therefore, protection can also have no borders.

By Leonardo Camata