By Mike Barmonde
As you read this, you could be on a plane to a new continent, or a serene lake recharging your mental batteries; you could be on a smartphone, a tablet, a laptop, or even a watch. The fact is, applications and data can now be consumed anywhere. The challenge for an enterprise becomes how to secure access and visibility without compromising user experience. There’s no magic wand to magically create a holistic security posture, or have the best security engineers. Your applications and data are as unique as your business, and not a single cloud infrastructure understands them. You must use the tools your cloud provides to ensure a strong security posture.
The short answer: No. They are both very secure and, at the same time, very vulnerable. We can also look at a hybrid approach, which uses a combination of, or new tools in private and public clouds. Overall, your security depends on the workload running. Rephrasing this question provides further insight: What does my application or data set need/require for secure access? Each of these cloud-types provides a unique set of tools, challenges, and expertise required for secure operations.
As a business, the decision to run new workloads/move workloads into a certain cloud-type comes down to a possible set of simple questions to ask yourself to create a security posture specific to that cloud:
Understanding your enterprise’s current cloud mindset will help drive the security conversation of how to secure those workloads.
Cloud choice requires a singular focus on the workload being run to help understand where it should live. Let’s break down each of the cloud types (private, public, and hybrid cloud) into advantages and disadvantages for running secure workloads.
As companies migrate to the public cloud, their security mindsets, talent pool, and risk strategies must change:
Advantages:
Disadvantages:
The most familiar concept for many companies, private cloud ensures control but sacrifices cost and potential access to new workloads users demand:
Advantages:
Disadvantages:
The holy grail of IT includes the ability to control workloads and cost anywhere, but requires new security tools to run in both public and private clouds:
Advantages:
Disadvantages:
Below is a sample of other suggestions to consider when choosing a cloud-type for your apps and data:
That is a small subset of things to consider. Overwhelming? Start somewhere, today. Focusing on well-known, highly critical apps and data can provide the best bang for your planning and provide peace of mind to executives.
As we’ve read, choosing which cloud is an intensive process of research and expectations, especially as you begin to align security requirements. Public cloud security and security risks are issues as present as in a private cloud. Private clouds can be more secure than public clouds, but can increase cost while leaving flexibility aside. Hybrid cloud, whilst attractive, requires additional investment in further solutions.
Bottom line, the control and security of your applications and data is up to you. There is no silver bullet for workload placement. To summarize a good plan on where to begin:
At Nutanix, we specialize in helping you understand your workloads and securing and optimizing their performance. Our cloud story allows us to help you run these workloads on any cloud, aligning to your business goals. The security tools and mindset we offer ensure a true-defense-in-depth strategy working with your current tools to offer a more complete security posture.
Find out more about cloud security.
© 2022 Nutanix, Inc. All rights reserved. Nutanix, the Nutanix logo and all Nutanix product, feature and service names mentioned herein are registered trademarks or trademarks of Nutanix, Inc. in the United States and other countries. All other brand names mentioned herein are for identification purposes only and may be the trademarks of their respective holder(s). This post may contain links to external websites that are not part of Nutanix.com. Nutanix does not control these sites and disclaims all responsibility for the content or accuracy of any external site. Our decision to link to an external site should not be considered an endorsement of any content on such a site. Certain information contained in this post may relate to or be based on studies, publications, surveys and other data obtained from third-party sources and our own internal estimates and research. While we believe these third-party studies, publications, surveys and other data are reliable as of the date of this post, they have not independently verified, and we make no representation as to the adequacy, fairness, accuracy, or completeness of any information obtained from third-party sources.