I’ve been out the last week travelling in preparation for Gartner’s US Symposium conference. I’ll be involved in multiple sessions (including interviewing Steve Ballmer). One presentation I’m giving is on how information security is evolving to become context aware and adaptive. Another presentation I am giving is on how cloud-based computing has the potential to be more secure than what we have today.
I’ve been doing quite a bit of research on how information security must evolve to support virtualization and cloud-based computing. While the fundamental principles of information security don’t change, how enterprises provision and deliver security services must change.
I’ve talked about some of these changes in previous posts – for example, the necessary switch to policies based on logical, not physical, attributes and the necessary requirement for information security infrastructure to become context aware.
I’ve just published a research note titled “From Secure Virtualization to Secure Private Clouds” for clients that outlines the changes necessary in security infrastructure to enable your organization to move from secure virtualization to secure private clouds.
I hope to see many of you next week in Orlando to discuss these ideas in person.
Read Complimentary Relevant Research
Cloud Computing Primer for 2017
Cloud has evolved from a disruption to an expected approach to traditional as well as next-generation IT. Our research helps IT leaders,...
View Relevant Webinars
La Strategia SAP: tra In-memory e Cloud Computing
SAP, uno dei più importanti fornitore di software per le organizzazioni italiane, sta attraversando un processo di trasformazione strategica...
Category: cloud cloud-security next-generation-data-center next-generation-security-infrastructure virtualization virtualization-security
Tags: adaptive-security-infrastucture cloud-security next-generation-data-center next-generation-security-infrastructure virtualization-security
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.