Expanding new views on security with network transparency | #NXTWORK
If data is king, then cybersecurity is the royal guard. In this world of viruses and ransomware, data must be protected or a company can lose its most vital assets in a single attack. This has created an arms race between security researchers and the dark minions of evil across the Internet. New views on design, networking and system management are shifting the game toward built-in security.
To gain some understanding of these new security technologies, John Furrier (@furrier) and Stu Miniman (@stu), co-hosts of theCUBE, from the SiliconANGLE Media team, visited the Juniper NXTWORK conference in Santa Clara, CA. There, they sat down with Chris McCurdy, VP of Global Security Services at IBM.
Customer conversations on security
The discussion opened with a look at what customers have been asking for in regards to security. McCurdy related that IBM likes to talk with its clients about security by design. Customers expect their systems to be secure from the start. IBM can’t provide solutions that don’t include security because customers expect it to be there.
McCurdy explained that as a security service provider, IBM is doing network design, deployment and management services. Between those, IBM is also looking at the Cloud, hybrid cloud and private data centers. It’s important to provide a risk framework that’s measured the same way across all these infrastructures, he explained.
Visibility across the Cloud
“The conversation is very much that companies should adopt the Cloud,” McCurdy said. He mentioned that IBM is able to provide Infrastructure as a Service through the Cloud, which gives companies a great opportunity to transform their security structures. Cloud providers, as well, are looking for new ways to include security in their solutions.
McCurdy stressed that a company must look at security from end to end. They must have visibility on events that are happening across the network and in the Cloud. The key is being able to look at different protection strategies and layer those strategies into the system. Identity access management is also a concern. If an attacker with credentials can be cut off at the user level, that’s a great capability for customers, he said.
Watch the complete video interview below, and be sure to check out more of SiliconANGLE and theCUBE’s coverage of Juniper NXTWORK 2016 event.
Photo by SiliconANGLE
A message from John Furrier, co-founder of SiliconANGLE:
Your vote of support is important to us and it helps us keep the content FREE.
One click below supports our mission to provide free, deep, and relevant content.
Join our community on YouTube
Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.
THANK YOU