UPDATED 13:19 EDT / APRIL 13 2015

Assume you’ve been breached: security in the cloud era | #AWSSummit

IMG_5213

Every business “assumes [it’s] been breached,” said Swaroop Sayeram, Group Product Manager, Cloud & Data Center Security at the Intel Security Group, the question is how to “identify, stop the spread, [and] remediate,” Sayeram stated. He predicted that solving rampant security breeches will require new approaches and collaboration

 

A new focus on secure servers

 

Perimeter-based security measures are no longer up to snuff, asserted Sayeram, since customers are “designing for the cloud and setting up auto-scaling environments.” Security is now the host’s responsibility and server security is becoming paramount. In fact, on Amazon.com, Inc.’s AWS, the “focus is on the servers, not the perimeter [because] all security needs to be in-host in order to get the most from cloud usage,” Sayeram explained.

Server security is focused on “the infrastructure level,” Sayeram said. While AWS gives its customers what he called “physical securities” and “access controls,” it’s the customer that really owns the security. That’s why, he commented “there are so many security vendors at the [AWSSummit] conference.”

 

Security & Storage

 

When it comes to security in the storage space, Sayeram explained the he believes there “needs to be a framework that identifies security instances.” Ideal products right now aggregate data from different sources and directions, but Sayeram said that in an ideal world, there would be “an analytics layer” that offers insight into security threats.

 

Speed and connectivity are of the essence

 

Sayeram agreed with the common consensus that “security is broken.” That’s partially becomes right now, the tech world has “mostly point solutions,” he continued. While point solutions may work well independently, “you end up with three different vendors that aren’t connected,” Sayeram explained.

Sayeram said he “believes in the security connected strategy.” There’s a “1+1 = 3” theory behind this approach in which “different pieces of security connect with each other,” he stated. Above all, Sayeram stressed that the point is for customers to quickly understand: “You’re breached. How do you find the damage and fix it?”

The collaborative approach has been made possible because “the industry has matured,” according to Sayeram. Now, different security vendors come together and work as an alliance.  They exchange threat information and work well with each other’s solutions. There’s been a realization, said Sayeram, that “if you compete with each other, the bad guys are going to win.”

Watch the full interview below, and be sure to check out more of SiliconANGLE and theCUBE’s coverage of AWS Summit 2015.


A message from John Furrier, co-founder of SiliconANGLE:

Your vote of support is important to us and it helps us keep the content FREE.

One click below supports our mission to provide free, deep, and relevant content.  

Join our community on YouTube

Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.

“TheCUBE is an important partner to the industry. You guys really are a part of our events and we really appreciate you coming and I know people appreciate the content you create as well” – Andy Jassy

THANK YOU