Welcome!

Microservices Expo Authors: Lori MacVittie, Elizabeth White, Daniel Khan, Liz McMillan, Pat Romanski

Related Topics: @CloudExpo, Industrial IoT, Microservices Expo, Containers Expo Blog, Agile Computing, Cloud Security, SDN Journal

@CloudExpo: Article

How Cloud Security Balances Risk Versus Reward

Moving beyond the concept of security as a cost center

I spend a great deal of my day thinking about security. How it affects the enterprise; how to best position and protect assets. How it shapes risk management and how it delivers potential benefits through smoother operations, enhanced trust and loss prevention.

At its core, security is about risk versus reward. It’s no great secret that many executives look at security as a cost center. Compounded by the requirements of compliance, the expansion of technology, and the nature of the modern enterprise, no one doubts the need to secure the enterprise…but to what degree? Securing your IT environment is not free, but there are best practices and technology options designed to mitigate costs while still providing a strong, manageable and proactive defense. While many companies still would rather spend capital on commodity assets, many CIOs recognize that information security is an important business driver. Many more still are looking to the cloud for security solutions to further reduce resource reliance.

In the end, it is a question each company must answer on its own. I can talk until I am blue in the face about the bogeymen of hacking, slipshod employees opening suspect emails, the exposure of a company’s most precious data, but the needs of the company—how it interacts with customers, the access it provides third parties, employee productivity processes, compliance requirements and all the other moving parts of an active organization--must create and prioritize the roadmap based on understood vulnerabilities and available resources.

However, therein lies the problem…understood vulnerabilities. This decision is based on assumptions, resource limitations and previous experience. But security issues are a moving target...it's more about knowing what you don't know. Obviously a bank or medical management facility is at more risk than a local dog grooming company, but that doesn’t mean it is any less vulnerable. In fact, the modest company might be at greater risk because even a small breach of customer data can devastate a company. A large company may be able to absorb (although painful) the fines, lawsuits and the loss of proprietary assets, but the impact on a small or mid-sized company is magnified. The damage to the trust factor alone could put them out of business.

This is not meant to be some sort of scare tactic, but the reality of doing business in the 21st century means every company must take some level of action to protect itself beyond filtering emails. However understanding investments in CapEx, resource and personnel expenditures, hardware and software management, this might be untenable for every company. This is where the CIO earns his keep. How much time and capital is necessary to invest versus the real threats to the network/assets (is a barking dog enough to chase away robbers, or do you need bolt locks, motion sensors, round-the-clock-sentries, gun turrets, etc…)

This is why cloud security (security managed from the cloud) provides the necessary balance in the risk versus reward quotient. Not only does it support a unified platform (PaaS or REACT), but eliminates many of the costs that throw the equation out of balance. A smaller company no longer has to decide to invest in virus sweepers OR access management, identity credentialing OR intrusion detection. A larger organization can reallocate important resources towards key revenue drivers and core competencies. A unified/centralized approach from the cloud provides all the capabilities with no additional capital expenditures. In the fact that it centralizes all the activity under a centralized pane of glass not only makes an organization response ready, but also automates a great deal of what compliance regulators are demanding.

What about the risk? Are organizations exposing or ceding control of their data in order to save a few bucks? Is a Pandora’s Box opening because functionality and reporting is virtualized? Of course not. Yet, with all business initiatives, there are risks. However, by applying such best practices as 24/7/365 monitoring, event correlation across multiple silos, and fostering interactive communication between functions closes the vulnerability gap significantly. But to harness all those capabilities a company would need to invest in SIEM, Access Management, Log Management, IDM and other security solutions. Before the cloud, this combined initiative was only an option available to Fortune 500 enterprises. Even applying some cloud-based tools, each of the referenced solutions typically works in parallel. What is needed is the ability to centralize and have each of the solutions leverage one another.

Now cloud security solutions and applications are two different animals when it comes to the all important data ownership and information liability. Security manages the data wherever it is stored-cloud or some locked server room in the basement of a fortified campus. It is the fence, not the animals held within. If there is a break in the fence, or the rancher hires irresponsible cowboys, then the herd is at risk. But if the foreman is vigilant about riding the perimeter and managing his employees, then there should be as many cows in the barn as there were the day before.

This is not to say data is unassailable every time the sales guy accesses the product demo site to present to a prospect via online third party collaboration software, but if the tools are in place, properly automated and integrated and the policies (access rules, credentialing, web authorization, monitoring etc…) are sound, risk goes down and reward goes up.

On Wall Street there is a “measurement” called the Sharpe Index. Essentially it characterizes how well the return of an asset compensates the investor for the risk taken. Part of the complex equation analyzes the variables to get to a positive return. Applied to finance the axiom typically means the greater the risk, the greater the return. When applied to security, and more pointedly, cloud-based security, the variables line up so that there doesn’t have to be a high trade off of risk and return Considering the lower investment, the faster deployment, the reduction of personnel and computing resources against an expanded enterprise toolset, improved capabilities, continuous and centralized alerts, security-as-a-service support and enhanced visibility across the organization, the path to realize rewards and ROI point to the cloud.

Bottom line, cloud-based security functionality is as trustworthy, as powerful and as comprehensive as any on-premise deployment. Because it is infinitely more affordable, flexible and manageable, it allows you to increase the layers of security around your enterprise for a fraction of the hard and soft costs. It allows you to concentrate on priorities, policies and core competencies to ensure your perimeters are safe and the cattle can always come in from the fields. Each company is unique in terms of its needs and security comfort level and its concept in determining risk versus reward. Yet biggest risk, in terms of security, is standing still.

More Stories By Kevin Nikkhoo

With more than 32 years of experience in information technology, and an extensive and successful entrepreneurial background, Kevin Nikkhoo is the CEO of the dynamic security-as-a-service startup Cloud Access. CloudAccess is at the forefront of the latest evolution of IT asset protection--the cloud.

Kevin holds a Bachelor of Science in Computer Engineering from McGill University, Master of Computer Engineering at California State University, Los Angeles, and an MBA from the University of Southern California with emphasis in entrepreneurial studies.

@MicroservicesExpo Stories
There's a lot of things we do to improve the performance of web and mobile applications. We use caching. We use compression. We offload security (SSL and TLS) to a proxy with greater compute capacity. We apply image optimization and minification to content. We do all that because performance is king. Failure to perform can be, for many businesses, equivalent to an outage with increased abandonment rates and angry customers taking to the Internet to express their extreme displeasure.
Ovum, a leading technology analyst firm, has published an in-depth report, Ovum Decision Matrix: Selecting a DevOps Release Management Solution, 2016–17. The report focuses on the automation aspects of DevOps, Release Management and compares solutions from the leading vendors.
No matter how well-built your applications are, countless issues can cause performance problems, putting the platforms they are running on under scrutiny. If you've moved to Node.js to power your applications, you may be at risk of these issues calling your choice into question. How do you identify vulnerabilities and mitigate risk to take the focus off troubleshooting the technology and back where it belongs, on innovation? There is no doubt that Node.js is one of today's leading platforms of ...
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...
SYS-CON Events announced today that LeaseWeb USA, a cloud Infrastructure-as-a-Service (IaaS) provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LeaseWeb is one of the world's largest hosting brands. The company helps customers define, develop and deploy IT infrastructure tailored to their exact business needs, by combining various kinds cloud solutions.
SYS-CON Events announced today that Venafi, the Immune System for the Internet™ and the leading provider of Next Generation Trust Protection, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Venafi is the Immune System for the Internet™ that protects the foundation of all cybersecurity – cryptographic keys and digital certificates – so they can’t be misused by bad guys in attacks...
DevOps at Cloud Expo – being held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's largest enterprises – and delivering real results. Am...

Let's just nip the conflation of these terms in the bud, shall we?

"MIcro" is big these days. Both microservices and microsegmentation are having and will continue to have an impact on data center architecture, but not necessarily for the same reasons. There's a growing trend in which folks - particularly those with a network background - conflate the two and use them to mean the same thing.

They are not.

One is about the application. The other, the network. T...

The 19th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Digital Transformation, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportuni...
If you are within a stones throw of the DevOps marketplace you have undoubtably noticed the growing trend in Microservices. Whether you have been staying up to date with the latest articles and blogs or you just read the definition for the first time, these 5 Microservices Resources You Need In Your Life will guide you through the ins and outs of Microservices in today’s world.
Before becoming a developer, I was in the high school band. I played several brass instruments - including French horn and cornet - as well as keyboards in the jazz stage band. A musician and a nerd, what can I say? I even dabbled in writing music for the band. Okay, mostly I wrote arrangements of pop music, so the band could keep the crowd entertained during Friday night football games. What struck me then was that, to write parts for all the instruments - brass, woodwind, percussion, even k...
This digest provides an overview of good resources that are well worth reading. We’ll be updating this page as new content becomes available, so I suggest you bookmark it. Also, expect more digests to come on different topics that make all of our IT-hearts go boom!
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor – all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...
SYS-CON Events announced today that Isomorphic Software will exhibit at DevOps Summit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Isomorphic Software provides the SmartClient HTML5/AJAX platform, the most advanced technology for building rich, cutting-edge enterprise web applications for desktop and mobile. SmartClient combines the productivity and performance of traditional desktop software with the simp...
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open.
Right off the bat, Newman advises that we should "think of microservices as a specific approach for SOA in the same way that XP or Scrum are specific approaches for Agile Software development". These analogies are very interesting because my expectation was that microservices is a pattern. So I might infer that microservices is a set of process techniques as opposed to an architectural approach. Yet in the book, Newman clearly includes some elements of concept model and architecture as well as p...
This is a no-hype, pragmatic post about why I think you should consider architecting your next project the way SOA and/or microservices suggest. No matter if it’s a greenfield approach or if you’re in dire need of refactoring. Please note: considering still keeps open the option of not taking that approach. After reading this, you will have a better idea about whether building multiple small components instead of a single, large component makes sense for your project. This post assumes that you...
In his session at @DevOpsSummit at 19th Cloud Expo, Yoseph Reuveni, Director of Software Engineering at Jet.com, will discuss Jet.com's journey into containerizing Microsoft-based technologies like C# and F# into Docker. He will talk about lessons learned and challenges faced, the Mono framework tryout and how they deployed everything into Azure cloud. Yoseph Reuveni is a technology leader with unique experience developing and running high throughput (over 1M tps) distributed systems with extre...
Sharding has become a popular means of achieving scalability in application architectures in which read/write data separation is not only possible, but desirable to achieve new heights of concurrency. The premise is that by splitting up read and write duties, it is possible to get better overall performance at the cost of a slight delay in consistency. That is, it takes a bit of time to replicate changes initiated by a "write" to the read-only master database. It's eventually consistent, and it'...
Node.js and io.js are increasingly being used to run JavaScript on the server side for many types of applications, such as websites, real-time messaging and controllers for small devices with limited resources. For DevOps it is crucial to monitor the whole application stack and Node.js is rapidly becoming an important part of the stack in many organizations. Sematext has historically had a strong support for monitoring big data applications such as Elastic (aka Elasticsearch), Cassandra, Solr, S...