Once upon a time, you could lock the door to the datacenter and call it secure. Those times are long gone, replaced with the dissolving perimeter: employees on the move, connecting to the network from wherever they happen to be, and using their own devices. At the same time, customers and partners have gained more access to company applications and data than ever before.
Adoption of virtualization and cloud is creating workloads that may shift dynamically and in real-time between physical, virtual, and cloud resources.
Add in the deployment of other new technologies and applications, and you begin to see the rapidly growing diversity that is the heart of today’s datacenter environment. Security boundaries are stretching and flexing in ways we never imagined.
The inability for the IT organization to keep up from a security perspective is preventing many CIOs from moving to new technologies despite the gains to be had in efficiency, speed, performance, and agility, not to mention business innovation. For other IT leaders, the tradeoff is to move forward with a new deployment despite potential security gaps and live with the risk until the security team can catch up. Neither option lets a CIO sleep at night.
Security spending on the rise According to a report for Enterprise Strategy Group2
2. “Good News and Bad News on Cybersecurity Priorities and Spending in 2014,” Jon Oltsik, The Enterprise Strategy Group, February 10, 2014.