Posted by: Greg Ness | July 26, 2017

The Big Shift to Software-Defined IT is Now Underway

A week ago I wrote about the recent AWS VMware partnership and how it threatens traditional IT vendors, practices and roles. The week before I talked about exploding security processes eroding protection at a Fortune 100 leader, based on a recent interview with a security architect.

In May I said the cloud will crush the hardware-bound security (and infrastructure players) as traditional IT shifts into more software and service-centric roles.

The emerging pattern is easily apparent: increasing demands upon larger enterprise networks are forcing IT, security and networking teams from hardware to more agile, software and service-centric operating models and solutions.

AWS and VMware Partnership= the Beginning of the End of Traditional IT

The AWS and VMware partnership is particularly notable because cooperation betweenSpeedometer these two former rivals signals a big shift in AWS strategy from cloud native to hybrid cloud and makes cloud migration a strategic enterprise requirement.

This alliance will force hardware-centric IT vendors, channels and buyers (including third party data center operators) into a deep, profound transformation from ongoing LAN-based maintenance and updates into faster, more powerful, scalable and flexible software and service-enabled solutions.

When you combine this transformation with the rising tide of cyber attacks rippling through increasingly connected networks you can understand increasing enterprise interest in software-defined perimeter technology, an advanced architecture with notable advantages over traditional access control technologies. Software-defined IT will leverage software-defined networking and perimeter technologies. (Note: you can read more about software-defined perimeters in Gartner’s just released Hype Cycle for Cloud Security, 2017 and at Vidder’s software-defined perimeter resource page.)

For example: as one organization struggles with updating dozens (if not hundreds) of distributed hardware appliances the other has software-defined perimeter integrated with trust assessment technology, which is quickly updated across internal and external networks by a service provider then tested by agile security and networking teams.

Verizon’s new Convergent Response offering demonstrated in June is noteworthy because it represents this new thinking, which could enhance Verizon’s leadership in managed security service offerings.

Looking forward you can expect to see the shift start in organizations with high security, compliance and operating demands as they will be among the biggest benefactors. Organizations now under siege with attacks and exploding security processes can shift from reaction fatigue to strategic advantage.

Posted by: Greg Ness | July 20, 2017

Can Clouds become Malware Super Spreaders?

In many ways and for most organizations the cloud is more secure than premises-bound security.  It’s easy to understand why: The most widely deployed IaaS architectures are more advanced than their traditional stack counterparts, many of which have been architected over decades based on changing priorities and user demands.

Yet a recent and timely blog from Junaid Islam raises a fair point. Clouds can become malware super spreaders:

The increasing number of personal compute devices and supply chain partnersSuper Spreaders connecting to enterprise clouds makes universal endpoint protection impossible. Subsequently, malware can find and propagate from infected compute devices to cloud-based applications. Once infected, hosted apps can become malware super spreaders. However as bad as the risk of malware is to enterprises, the risk to IoT systems is even greater.

The new generation of IoT devices has the ability to autonomously communicate locally and globally.  As IoT devices come in hundreds of different variations with specialized software modules, patching IoT systems is far more difficult than personal compute devices.

Infected IoT devices can spread malware from autonomous vehicles and energy management systems to consumer products and cloud computers – and then back again.  A malware attack on billons of networked IoT devices would take months or years to correct.

You can read the entire blog here: Malware Will Cripple Cloud and IoT Infrastructure if not Contained

blindfolded senior business man walking through social media data

A recent interview with a security architect at a Fortune 100 firm with a network of hundreds of thousands of corporate and partner users brought out the explosion of complexity as networks scale and encompass remote users and partners:

When a certain level of scale is attained, incremental growth can cause exponential increases in complexity and required management processes. That point of scale will vary from company to company, often based on the nature of the security and networking solutions they are using.

Yet it gets worse as you bring in hybrid clouds:

As networks embrace partners and clouds, process creep erodes security further by requiring more procedures to maintain an existing and increasingly obsolete security posture. The net effect is a security paradox: more security processes can translate into weakened protection.

You can read the rest of the story at my Vidder blog on security creep at a F100 enterprise.

Posted by: Greg Ness | July 19, 2017

Amazon goes Hybrid with VMware

Roller coaster loops against evening sky

The Wild Ride is Getting Wilder for Tech Infrastructure Vendors

Notice is Served to More than a Dozen Tech Leaders by Once Unlikely Alliance

Recent talks between Amazon and VMware could ignite a second wave of cloud adoption, this time focused on brownfield cloud migration. A recent report covered by CNBC raises the specter of a massive shift of workloads from premises to clouds, something of notable concern to at least a dozen premises-bound tech leaders and perhaps a couple dozen third party data center players managing traditional stacks.

See my Vidder blog The Cloud is about to Crush the Hardware-based Security Industry.

This development represents a fundamental shift for Amazon and VMware, and each has their own distinct reasons for this once unlikely alliance.  Amazon finally recognizes the value of the hybrid cloud model, which it has dismissed for years. This could be as much about Amazon growth as countering Azure’s massive inroads into cloud. See a few highlights from my blog Amazon, AWS and the Public Cloud Paradox from early 2013:

As discussed previously, the total addressable market for VMware server virtualization and private cloud is about $50B dollars, per a VMware presentation made late in 2012.  Amazon’s AWS revenues, representing an estimated 90% of the public cloud market, were under $3B.  This suggests a wide gulf between the public cloud and private cloud market and an even larger $60B hybrid cloud market that is available to the victors.Kitty Hawk

That public cloud myopia on the part of Amazon, which was so prevalent at last year’s AWS reInvent Conference, is an albatross around the neck of what has otherwise been perhaps one of the most successful and revolutionary launches since… online bookselling.  Amazon’s future success may depend more upon its ability to lead the cloud market versus being a former first mover.

Amazon clearly understands that public IaaS is too limiting, and has made a series of smart improvements to its cloud offerings that align them more closely to enterprise requirements.  It is possible and reasonable to suggest that Amazon’s enhancements (along with Azure’s coming grand entrance) may have forced VMware’s hand into its own IaaS offering, much to the unease of some key VMware partners.  Yet Amazon today is still stuck in the public cloud mindset.

Then there is Amazon and the Amazing Enterprise IT Monoculture Myth:

Without denying cloud computing’s massive impact on enterprise IT, I think it isclouddisconnectimageblog still easy to get lost in the vendor haze of massive switches to any self-serving single standard or model -beyond core networking and communications stacks, which are often economically too powerful to resist, and the dynamic, pulsating world of IT services and solutions.  Innovation and conformity are not often mentioned in the same sentence as allies.

For VMware this represents a shift from its earlier cloud initiative. For background see my previous post based on a recent Cisco study and Cloud is Bigger than you Think, based on a Future in Review panel in late 2015.

==> If you are an executive at a hardware-bound company selling gear exclusively for premises deployment this is a very big yellow light at best. And it grows the TAM for AWS by several-fold.  Stay tuned.

 

 

 

My recent Vidder blog on security in the new cyber world explains why security will become more important to business success in the digital age and why CISOs will become as important to CMOs in most consumer and B2B companies.

The world’s cyber future looks more like Ukraine, the emerging frontline of a growing conflict between entrepreneurial hackers, nation states interacting in a virtual marketplaces of exploits, tools, identities marketplaces and a shrinking population of cyber security experts defending critical and increasingly complex systems.

If you think the cyber war in Ukraine will stay within its borders think again. We may already be embroiled in a stealth, undeclared cyber war.

With larger populations of devices accessing more complex, shared infrastructures attached to increasing exposed systems you have a market of growing opportunity for fast growing populations of cybercriminals and their sponsors living beyond the reach of domestic law enforcement and perhaps even international treaties.

That’s why I’m putting together a cyber war panel for Future in Review this October in Park City. Stay tuned!

Posted by: Greg Ness | July 2, 2017

Digitalization Winners and Losers as of 2017

A new Morgan Stanley CIO Report is out with a revised list of digitalization winners and losers.  The shift to the cloud is increasing and creating a painful new reality for traditional IT vendors, except Cisco.

Roller coaster loops against evening sky

IT vendors will navigate the clouds with varying levels of success.  Cisco appears to be making inroads based on a new CIO survey.

Check it out here.

From Becky Peterson, Business Insider, July 1 2017:

The two technology vendors are set to lose out considerably in IT budgets over the next three years as the result of the shift to cloud, according to the June AlphaWise/Morgan Stanley CIO report. CIOs expect that 46% of their workloads will be in the cloud by the end of 2020, while only 34% will be on-premise.

 

Between now and then, the 100 US and European CIOs surveyed expect to decrease spending on IBM by 13%, and to decrease spending on Oracle by 11%. 

 

Note how Cisco is positioned as a top benefactor of digitalization, after Salesforce.  That’s an impressive shift for a legacy networking vendor.  This could be at least indirect acknowledgement that the giant is successfully re-positioning itself as a new kind of software-centric cloud player.

Posted by: Greg Ness | June 24, 2017

#Cyberwar #Cloud #Migration

This week the Washington Post published a bombshell story on the recent attacks on the US election infrastructure ironically under their motto “Democracy dies in darkness.”

On the Vidder blog Thursday I said that we were at cyberwar.  My case was simple:

  • Cyber warfare is by nature stealth;
  • There are no cyber-specific treaties;
  • The migration of attacks from economic targets to political suggests direct nation state complicity; and
  • Now our intel agencies have proven direct Russian intel agency involvement.

Then a recent Reuters report broke that made things even more bleak: Russian officialsclouddisconnectimageblog are demanding source code from US tech companies, even code for security products.

Reports are now emerging of a hack attack against UK’s parliament, another political target.

A pattern of increasing attacks against servers and devices and politically motivated targets is emerging and Russia named as the common source.

See this recent Wired piece on Ukraine: How an Entire Nation Became Russia’s Test Lab for Cyberwar.

For years many security experts have attacked cloud adoption, calling it a security risk. Yet recent events might accelerate cloud adoption, especially for legacy workloads protected by US tech giants flirting with releasing source code to have (ironically) greater access to the Russian market.

Even the perception of a source code sharing risk could dampen enthusiasm for traditional security products and get more CISOs considering protection by AWS, Azure or Google, who are investing billions in advanced infrastructure and might have enough market power to resist Russian demands.

Some of these companies are under tremendous operating pressures and having to fight off innovative startups and IaaS offerings that are catching up if not surpassing (in terms of security) for most enterprises. Some are struggling with layoffs designed to right the ship.

Now there is a source code risk that could give Russian hackers enhanced access to enterprise systems increasingly exposed by digitalization and growing populations of endpoints with network access.

Time will tell.  IMHO cyberwar could be a significant new driver for the growth of cloud for existing, premises workloads.

Posted by: Greg Ness | May 15, 2017

NAC versus Trusted Access Control

After my Goodbye NAC (network access control) blog the Vidder team created a very useful chart comparing key characteristics of NAC with Vidder’s Trusted Access Control.

NAC vs TAC

Posted by: Greg Ness | May 1, 2017

The Cloud will Crush Network Security HW Industry

Because Complexity Doesn’t Scale Very Well…

Last week Amazon announced another stellar quarter, with AWS again being the main headliner for the ecommerce high flyer. Yet I’m convinced AWS growth and profitability has even deeper implications for traditional hardware-bound network security vendors.

Two weeks ago I spoke with a CISO at a forward-thinking IT shop. It was one of the most encouraging and thought-provoking IT discussions I’ve had in a while. He said they were betting on the cloud to “transform” their security posture by enhancing security and scale and reducing costs and complexity.blindfolded senior business man walking through social media data

The Cloud as a Driver of Security Transformation

This is a substantial shift in thinking from just a few years ago when the cloud was seen as being less secure by most CISOs. While I’ve certainly seen the enterprise cloud shift firsthand, most of the drivers were operations-driven.  IT wanted more agility and scale or some cost savings for unpredictable or seasonal workloads. Security concerns were seen by many as obstacles to cloud migration.  That has clearly changed.

The cloud is now seen as transformational versus as a potential security posture tradeoff. This is a big deal than a stellar AWS quarter.

It threatens the future growth and margin potential of today’s powerful security hardware and infrastructure players, those who have benefited from rising cyber threats and growing, increasingly connected networks. Several seemed to have peaked in 2014/2015 when cloud enterprise workloads were mere outliers. It looks uphill from here onwards for all security vendors tied to hardware for critical enforcement capabilities.

If he is right (and I think he is) the cloud will be the wheelhouse of security transformation. And many vendors are ill-prepared for such a software, service and IaaS-based disruption.

Why? Here is a list of factors that will drive the cloud software security transformation.

  • Consolidation of Buyers; Commoditization of Hardware

Cloud providers are usually building their own infrastructure, around new management, scale and security requirements, well beyond what most organizations can afford or even consider.  If needed, they can go to traditional hardware vendors and negotiate from a position of great volume / influence over terms, margins and specifications in ways that few enterprises and service providers ever could.

The long term effects of this shift will be dramatic, decisive and in some cases devastating to vendor models tied to specialized hardware and skill sets. Many will be pushed aside as enterprises look for single layers of enforcement and more granular access tunnels to address more sophisticated attacks aimed at increasingly connected systems.

  • Security with Scale is becoming Strategic

Cloud infrastructure is being architected for new, emerging demands, especially related to horizontal and vertical scale and security.  Cloud environments will increasingly adopt software and service-centric solutions that can scale globally and seamlessly, without location-specific constraints.

Digitalization will add to cloud delivery pressures and force IT into more software and services and away from hardware-defined tradeoffs.  This, combined with buyer consolidation and commoditization, will make IaaS and managed service providers (and best practice enterprise shops) powered by software-defined capabilities much more influential than the traditional hardware vendors.

  • Software and Services are Strategic to Security and Scale

After decades of innovation aimed at hardware differentiation and specialization as a means of growth and profitability the tables have turned and vendor operating models will need to shift to survive.  The virtualization, software and cloud-defined benefits of scale and agility will embrace security in ways that simple weren’t possible in complex networks of devices architected for simpler, slower times, manageable security demands and single vendor networks.

The cloud won’t compromise security; it will transform it.

Posted by: Greg Ness | April 6, 2017

Goodbye NAC, Hello Vidder!

The question that many IT security pros are asking is: Why hasn’t network access control (NAC) lived up to its promise?
I certainly did. And what I discovered helped me to make a career move.

I’ll explain, starting with what NAC does. Then I’ll get to the personal part.

NAC provides enterprises the ability to authenticate devices as they enter the network, monitor those devices, and deal with those devices that do not meet security requirements.

That all makes sense. Yet the history of NAC adoption has been less than stellar, even in recent years. Why? I think it’s because NAC still doesn’t meet the needs of today’s enterprises. NAC products are complex to deploy, scale, and manage. They’re also not able to stop an attack from an outsider who has compromised an internal device.  Once you are in, you’re in.

The NAC value proposition is a victim of its own self-inflicted shortcomings, from access control list fatigue to obsolete posture check parameters. NAC complexity combined with technical constraints, contribute to a very challenging business case for most enterprises. Substantial upfront hardware investments are typically required, followed by high ongoing operating expenses.

These investments are the high table stakes to get the weak outcomes promised by network security hardware architected for simpler days and more primitive attacks. Today, things get even worse for hardware-bound solutions facing agile, dynamic software-based attacks.

Those medieval fortresses and walls scattered around the world are now only being used to lure tourists. No one uses them anymore for protection because they’ve become anachronisms, symbols of fixed defenses that worked in their day. Today we live in fast-moving times, where the spirit of entrepreneurship sometimes takes the form of cybercrime. Network defense schemes from more than a decade ago are already starting to resemble their tourist trap predecessors.

Unlike the rise of WLANS (and internet worms), which helped NAC solutions establish a foothold in enterprise security, cloud and digitalization initiatives are destroying the last remnants of the NAC payoff by magnifying the negative impacts of existing NAC technical and operational shortcomings.

NAC Boulder

The NAC security challenge: increasing complexity degrades scarce resources

 

NAC solutions only protect internal servers. Any hybrid or cloud-centric network would need a different approach to access control.  With digitalization, business-critical servers and databases will be more accessible to other servers and often larger populations of users.

Adequate protection would require even bigger initial investments and likely infrastructure upgrades. Then you’ll need more highly-skilled people to manage the complex weave of devices and permissions and access points. As your network grows sequentially your costs and complexities grow exponentially.

The problem: NAC’s lack of granular access controls requires security teams to create and manage hundreds of ACLs with thousands of potential rules, even for smaller networks.  Existing security teams might have to double or triple in size to simply keep up with the management overhead of these new initiatives, after those substantial initial hardware investments.

This explains why a host of companies are now talking about the Software Defined Perimeter, or the use of a single layer of software to protect large, complex networks. Its ability to scale up or extend enforcement across dynamic infrastructure is far superior than any approach requiring dedicated hardware, specialized skills and manually-driven lists.

So… after four-plus great years at CloudVelox I joined Vidder.  I met Vidder’s CEO Mark Hoover more than ten years ago.  Before I joined CloudVelox we discussed working together again as well as the new enterprise security demands taking shape. Vidder was on the way to re-inventing access control by blending trust metrics with the Software Defined Perimeter.

So here I am, years later at Vidder in the midst of a new asymmetric cyber war between nation states, hacktivists and societies dependent upon trust for their very way of life.  Goodbye NAC! Hello Vidder!

Older Posts »

Categories