Online security

Impact of the Cloud on Cyber ​​Threat Visibility and Landscape

SINGAPORE, November 23, 2022 /PRNewswire/ — In recent times, despite initial cybersecurity concerns, the benefits of agility and scalability that cloud computing enables, especially during the pandemic lockdowns of previous years, outweigh the security and performance risks.

Vladimir M. Yordanov, Senior Director of Solutions Engineering for Gigamon Asia Pacific and Japan

A study commissioned by Gigamon and conducted by Frost & Sullivan titled “Cybersecurity, Visibility, and the Cloud” found that 53% of APAC organizations have more than half of their enterprise workloads in the cloud, with the majority preferring a hybrid approach of combining on-premises environments with cloud infrastructure.

This exacerbates visibility issues, especially because 90% of APAC organizations will use two or more cloud service providers (CSPs) for strategic reasons such as competitive pricing and avoiding vendor lock-in.

This highlights the inevitability: organizations must begin to balance the risk of having their workloads hosted in multiple environments with the productivity and agility gains that cloud computing offers.

With growing cloud acceptance, the hybrid cloud trend is expected to persist for the foreseeable future.

Even though APAC organizations prefer to retain a majority of control over their infrastructure and data to maintain as much visibility as possible, whether on-premises, hybrid or multi-cloud.

An expanding IT base and the challenge of visibility

Forty-four percent of APAC organizations surveyed have 50-81% of their workloads on an Infrastructure-as-a-Service platform. Visibility is about to become exponentially difficult given that a majority of organizations have at least two CSPs that anticipate endpoint and attack surface growth.

Additionally, 86% of APAC respondents agree that network traffic visibility from cloud security tools is important or even critically important. There is an awareness of the need to maintain data fidelity by streamlining all that cloud traffic and the platform has emerged as an approach to achieve this.

Growing cloud diversity and compliance

Organizations are now ready to make trade-offs and find a balance between cybersecurity risks and the efficient productivity that cloud computing enables.

The answer to this balance is deep visibility into network activity within an organization’s perimeter. But network monitoring and security tools, designed for an on-premises world, typically lack visibility into cloud environments, applications, and services. The same is true for agent- and log-based cloud monitoring and security tools.

This is a huge challenge to understand traffic behavior and data residing in VMs and containers.

This opaque network traffic and the haphazard proliferation of cloud security tools that 68% of CIOs surveyed by Frost & Sullivan say they refresh every 3-4 years are huge barriers to visibility.

In total, the following factors increase the agility but also the diversity and therefore the complexity of securing the cloud:

  1. Deployment architecture – on-premises, cloud, hybrid, virtual
  2. Deployment types – multi-cloud, cloud service tiers
  3. OSI layers – applications, networks, devices
  4. Number of sellers

Complete visibility, on the other hand, can allow organizations to take control of the entire network infrastructure, from core to cloud. Indeed, network, metadata and application level information provides critical context of the entire network surface for better security and performance management.

Regulatory pressure to comply by having a more detailed view of the attack surface now makes adequate visibility no longer a desirable capability, but a must-have capability and Frost & Sullivan finds that 50% of organizations will need more technological investments. to comply with this guidance.

The survey report also recommended that cloud tools and processes be flexible, again underscoring the need for a platform approach as well as a solution that can integrate seamlessly with the source of these complexities, as well as providing control.

The responsibility to secure

One thing is certain: the role of an organization’s cybersecurity operations must expand according to the degree of potential risk associated with the increasing use of the public cloud. This definitely requires addressing visibility challenges in public clouds, which Gigamon is uniquely able to solve with its Visibility and Analytics Fabric solutions.

While organizations need to protect what’s in their environment, they also need to consider where the liability of their cloud provider(s) ends and their liability begins. Cloud providers will still be responsible for securing the physical infrastructure and the virtualization platform, with the IaaS model for example. But the customer is responsible for security in the cloud.

A clear delineation of responsibilities should be established from the outset. But both parties must work together to protect on-premises apps and data as well as cloud apps and data.

This silo requires effective cloud monitoring that breaks down the “walls” between vendors and customers’ view of threat surfaces, and provides a single view of the entire enterprise IT estate.

Deep continuous visibility at scale without latency

Ninety-one percent of Frost & Sullivan respondents agree that network traffic visibility is critically important when evaluating cloud security tools. These CIOs recognize that they need to understand usage behavior and activities on the threat surface in order to effectively protect against it.

The Gigamon HawkDeep Observability Pipeline breaks down the previously mentioned silos by providing different teams (network operations, cloud operations, and information security) with a clear, comprehensive, and consistent view of what’s going on across all different environments. This cohesive view breaks down traditional silos and provides a way to get streamlined, actionable insights that proactively address performance and security risks.

Another criterion required by CIOs is also to be able to streamline all that cloud traffic without compromising data fidelity. An exemplary approach is to deploy a platform-based solution that can consolidate all of this cloud traffic to deliver a single screen.

This streamlining of many into one also allows organizations to efficiently and effectively enforce zero-trust policies.

All in all, this resoundingly ticks the checkbox of compliance with guidelines mandated by industry regulators, too.

Powerful Threat Intelligence Sharing for Business

Gigamon Hawk integrates with Gigamon’s ThreatINSIGHT for more context and insight into the data in motion on their network. ThreatINSIGHT is a cloud-based solution that is useful for the activities and processes of a security operations center (SOC).

With machine learning (ML), behavior analysis, and curated threat intelligence that can be integrated by other companies in the same industry, the result is a powerful capability to detect known, emerging, and unknown threats. This way, organizations can ensure that their incident response, handling, and investigation processes are suitable for public cloud workloads.

GigaVUE Cloud Suite is also helpful, reducing the complexity and cost of finally having tool and traffic visibility across a multi-architecture environment.

Overall, Gigamon has a suite of observability tools and solutions that help businesses comply with regulators’ guidelines while fully realizing the transformative power of public cloud computing in a way resource-efficient and cost-effective.

About Gigamon

Gigamon offers a deep observability pipeline that leverages network-level actionable intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to provide security and compliance governance, accelerate root cause analysis of performance bottlenecks, and reduce operational overhead associated with managing IT infrastructures. hybrid and multi-cloud. The result: modern enterprises are fully realizing the promise of cloud transformation. Gigamon serves more than 4,000 customers worldwide, including more than 80% of Fortune 100 companies, nine of the top 10 mobile network providers, and hundreds of governments and educational organizations around the world. To learn more about how Gigamon can help you realize the power of deep observability, please visit and follow us on Twitter and LinkedIn.

This article is published on behalf of Gigamon. For interview opportunities or more information, please contact via email, call, text or WhatsApp: