Atomized Network is an “And” not an “Or”: Driving to Cloud Transformation
By Ben Holladay, Chief Revenue Officer
Clearly, enterprises are driving to cloud transformation—that’s not new and will continue. What is relatively new are the realities and security implications as enterprises move to the cloud. From our conversations with customers, we’re finding that cloud transformation is multi-cloud in practice. While many enterprises may have one primary public cloud vendor, large enterprises in particular almost always have services in another cloud for reasons including M&A activities and other realities of doing business, such as software dependencies, data privacy policies, and the ability to spin up new instances in minutes.
However, despite the billions of dollars being spent on cloud and the 40% growth rates of major cloud providers, most enterprises we talk to are not going fully to the cloud. They will still maintain on-premise networks and data centers in some shape or form. In fact, 67% of IT professionals say hybrid cloud is their permanent destination.
In addition, there is a space between public clouds and on-prem. When we say cloud transformation, typically we’re talking about the hyper-scalers like Amazon Web Services, Google Cloud, IBM Cloud, Microsoft Azure, and Oracle Cloud. But the emergence of edge computing, private data centers, and specialized, vertical clouds are also parts of the modern network.
On top of this, the hybrid workforce, the rise of the gig economy, and new norms we can’t even imagine right now, make it hard to predict how network traffic will be impacted.
The mix of all these factors is unique to any given enterprise and creates a constant state of flux and a morphing traffic profile. At Netography, we call this the Atomized Network—where applications and data are scattered across a complex and fluid environment consisting of multi-cloud, on-premise, and legacy infrastructure, being accessed by mobile and remote workers.
The Atomized Network demands new ways of thinking about security. The long-time principles of comprehensive visibility and control were hard enough to attain when the network was owned by the customer. Today’s dispersed enterprise networks makes that much more difficult and threat actors know it. They take advantage of complexity to live in the gaps and execute damaging attacks, and now there are even more gaps.
In the current geopolitical environment, the sensitivity around communication with ITAR-prohibited countries really highlights the challenge. When a C-level executive asks if there are any communications with country X, how many places and tools do security teams need to go to answer that simple question?
Radically reimagined security for your Atomized Network
How we get visibility needs to change. How we do unified threat detection and security policy management across the environment needs to change. And how we consume these capabilities needs to change.
By using new methods and techniques with the telemetry available to us, we have reimagined security for your Atomized Network to provide:
- Real-time, pervasive visibility—including into the gaps where attackers can live
- A unified view of all your data, normalized, aggregated, and enriched with business and threat intelligence
- Threat detection models that make it easy to detect once and protect everywhere in minutes
- Super rapid deployment with no hardware, no software, and nothing to install
- Flexible licensing that maps to your changing workloads and estate
The Atomized Network is an “and,” not an “or”. As your environment morphs, Netography morphs with you to secure what your Atomized Network looks like now and how it will look over time.