Contact Us




Change Locale

Is your hybrid cloud security agile?

Security | Posted on July 21, 2016 by Softchoice Advisor

Hybrid cloud environments are the new norm for many enterprises, but are they being secured in the best way possible?

Are hybrid cloud deployments secure?

Security is always top of mind when it comes to using the public cloud. Still, organizations with some of the most demanding data integrity, privacy and compliance requirements are taking the plunge and adopting cloud services from Amazon Web Services (AWS) and others to meet their business goals. In fact, according to Gartner, 36 percent of healthcare, 27 percent of insurance providers and 25 percent of governments will have a hybrid cloud model by 2017.

Securing the use of public cloud infrastructure isn’t like traditional computer security. Amazon, of course, secures its datacenters, network, and physical infrastructure, but the responsibility to secure applications in the public cloud is shared with users.

Traditionally the best way to protect hybrid deployments has been through security solutions installed in the datacenter. Workloads need to be protected with anti-virus and anti-malware, firewall protection and deep packet inspection, such as that from intrusion detection (IDS) and protection (IPS) systems. They also must meet regulatory demands, such as those of PCI compliance or other standards, using file integrity monitoring and log inspections.

Trend Micro’s Deep Security provides all of these security elements under a single pane of glass, protecting against intrusions like Shellshock and Heartbleed, blocking malware and watching for indicators of compromise through integrity monitoring and log inspection. So, with one solution in place, your hybrid environment can be secured.

But is it optimized? Is it truly agile and cost-effective? What about extending the benefits of your hybrid cloud deployment to the security protecting it?

A revolution in hybrid cloud security

With many more organizations moving the bulk of their workloads to AWS, it was time for a change. Recognizing this, Trend Micro has developed the Deep Security AMI (Amazon Machine Image), a virtual appliance version of its solution that protects physical, virtual and cloud resources all with the elasticity of the cloud. It protects instances in AWS and virtual machines on other clouds—even virtual machines running VMware in the datacenter—only with consumption-based, per-hour-per-server pricing that is added directly to the AWS bill.

trend micro deep security for AWS and softchoice

This simplifies your security management by centralizing it across assets while making it highly scalable and taking advantage of the cloud model. Security deployment is suddenly streamlined to taking minutes, allowing for resources to be secured as quickly as they are brought online and supporting burst in traffic and workload. Say a new web campaign becomes hugely successful, as new resources are brought online, Deep Security auto-scales, instantly applying to new virtual machines based on security rules set specific to the workload and costs are based on only the resources secured. It’s pay-as-you-go computing, only applied to security!

Thanks to this new approach, you can have complete cloud protection and continuous compliance coupled with scalability and pricing that matches modern elastic workloads.

Secure your hybrid cloud journey

More information on using Trend Micro Deep Security with AWS and a free trial can be found here. Or learn more by scheduling a consultation with a Softchoice Cloud Services for AWS architect. We can help you to design an effective strategy that optimizes your IaaS deployment to increase agility, and reduce costs and time to market, while defended by powerful security.

To learn more about Softchoice’s security offerings, visit our Ultimate Security Hub.

Related Articles

Collaboration | March 26, 2020 by Softchoice Advisor

The situation surrounding COVID-19 has required many organizations to adjust their way of working. Cybercriminals are doing the same.  The need to shift many workforces to all-remote work creates new challenges, complicating an already complex cybersecurity landscape.   Across the globe, malicious actors are leveraging confusion and uncertainty around this unprecedented scenario to target individuals, businesses and their users.  With many or all end users working […]

Cloud | December 20, 2019 by Ryan Demelo

The stakes surrounding data security and risk mitigation rise with each passing year. Data breach costs continue to increase and potential threats grow more sophisticated.  According to IBM, the average total cost of a data breach – after accounting for remediation, reputational damage and regulatory issues – has reached $3.92 million. While smaller organizations may […]

Cloud | December 11, 2019 by Karly Pierce

IT organizations have seen too much of their time consumed by non-strategic tasks. This comes at great cost to their bottom lines and cloud transition strategies.  In fact, a 2018 Stripe survey found that between dealing with bad code, technical debt and various refactors or modifications, most of the typical developer workweek was wasted.   That […]