Virtualization Technology News and Information
Article
RSS
DH2i 2019 Predictions: We Bid Farewell to VPNs, and Welcome to Micro-Perimeters for Unrivaled Application Performance and Data Security

Industry executives and experts share their predictions for 2019.  Read them in this 11th annual VMblog.com series exclusive.

Contributed by Don Boxley, CEO and Co-Founder, DH2i

We Bid Farewell to VPNs, and Welcome to Micro-Perimeters for Unrivaled Application Performance and Data Security

The pursuit of a hybrid IT strategy that leverages on-premises IT assets, as well as off-premises cloud/hosted resources has become today's data management paradigm.  Unfortunately, while the benefits are numerous and impossible to ignore, there are drawbacks to be considered and dealt with as well - such as the application performance and security issues that are introduced when leveraging the public cloud and public Internet. 

For enterprises the public cloud is both a boon and a danger. The public cloud's global reach offers an easy and cost-effective means for engaging large numbers of customers, regardless of location. However, using the public cloud to connect users with business-critical workloads brings risks.

Customers don't like to wait, and each moment waiting has real revenue implications. Which is why it is commonly said, "businesses survive on speed." Organizations investing heavily in hybrid data management strategies around enterprise applications are making these investments to gain an edge, but will only be able to enjoy a positive return, if the applications are able to run at maximum performance allowed.  As an access path to the cloud, the performance of the public Internet can be limited by traffic and throughput obstacles, which can impact the effectiveness of workloads right at peak load times. If enterprise applications struggle to deal with peak loads, this can result in the business suffering revenue loss, damage to their reputation and failing to meet the objectives of moving to a hybrid cloud strategy.

And, while the use of traditional virtual private networks (VPNs) are still routinely turned to in order to add secure connectivity and reduce security exposure, VPNs now in fact further exacerbate performance and security issues.  They have become obsolete for the new IT reality of hybrid and multi-cloud. They just weren't designed for them. VPNs are complex to configure, not performant, and they give users a "slice of the network," creating a lateral network attack surface. 

A new class of purpose-built security software is emerging that eliminates these issues and disrupts the cloud VPN market. This new security software will allow organizations to deploy lightweight dynamic micro-perimeters to secure their application- and workload-centric connections between on-premises and cloud/hosted environments, with virtually no attack surface and without the performance issues of VPNs.

Because of the simplicity of use this new and innovative class of security software, organizations will utilize at 1-2-3-100+ deployment strategy. That is, they'll deploy micro-perimeters for workload #1. Satisfied it meets the performance and security requirements, they'll deploy micro-perimeters for workload #2, and then deploy for workload #3. At that point, the organization will require micro-perimeters for every application, which could be hundreds of workloads with thousands of users. This is the point organizations will turn to artificial intelligence (AI). This is where organizations will leverage their learnings in AI to find products that can automate, manage and simplify the machine learning (ML) for each enterprise application's unique connectivity network to map out the optimal deployment of micro-perimeters.  This deployment methodology will allow organizations to aggressively implement micro-perimeters with the ultimate goal of the AI engine deploying and updating micro-perimeters completely automatically, for unrivaled application performance and data security fortification.

##

About the Author

 

Don Boxley Jr. is a DH2i co-founder and CEO. Prior to DH2i, Don held senior marketing roles at Hewlett-Packard where he was instrumental in sales and marketing strategies that resulted in significant revenue growth in the scale-out NAS business. Don spent more than 20 years in management positions for leading technology companies, including Hewlett-Packard, CoCreate Software, Iomega, TapeWorks Data Storage Systems and Colorado Memory Systems.  Don earned his MBA from the Johnson School of Management, Cornell University.

Published Tuesday, February 05, 2019 7:29 AM by David Marshall
Comments
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
Calendar
<February 2019>
SuMoTuWeThFrSa
272829303112
3456789
10111213141516
17181920212223
242526272812
3456789