Blogs

Dynamically Securing Applications in a Multi-Cloud World

By Erdem posted 09-05-2017 05:00

  

Security threats continue to increase exponentially in volume and in risk. According to a recent CBR article, cybercrime is expected to cost the world more than $2 trillion by 2019. Developers are creating more applications more frequently and many are migrating them between different clouds for business agility. But, the greater volume and dynamic nature of applications make businesses more vulnerable. In fact, Microsoft predicts that we will be writing 111 billion lines of new software code every year that will generate 50 times more data volume by 2020. This should give you an idea of the increased threat attack surface in a multi-cloud world. 

Security teams stay up at night worrying because applications are exposed to risk every time one is created or moved. In order for security teams to protect their organizations’ applications, operations must be simple so that those applications can be secured as quickly as they are spun up and moved.

 

 

Visibility is Key

With multi-cloud becoming the norm, applications are becoming more fluid – dynamically moving between different environments. This migration of applications becomes a source of vulnerability. Therefore, we need deep insights on how applications are interacting with each other and where they are located to create effective and up-to-date policies.

 

Operations Must Enable Business Agility

In order for the security posture to remain effective, operations must be simple. With threats increasing and “bad guys” becoming more innovative, simple operations are critical for effectively protecting a company and its applications spread across multiple heterogeneous environments.

The current approach to application security requires creating a new policy every time an application is created or moved to a new environment. With more applications and more environments, this approach is time-consuming and error-prone. In order for the security approach to be as dynamic as applications, creating and distributing security policies must be easy, quick, and automated. With agile operations, we can act fast to diminish risk.

 

Introducing Contrail Security

This is where Juniper Networks’ new product, Contrail Security, can improve simplicity. We believe that the synergy between security and connectivity needs to increase, and Juniper has the unique ability to provide that combined solution.   

 

Contrail Security is designed to provide several key advantages:

  • Visibility to all application traffic flows along with detection of anomalies through machine learning to take corrective actions.
  • Tackles the explosion of security policies in today’s multi-cloud world by defining policies once and automatically applying them to all applicable environments.
  • Ensures organizations have consistent protection by combining application traffic discovery with automated policy enforcement.
  • Enforcement of security policies across multiple points to protect applications on the host, or redirect suspicious traffic to a next-gen firewall for advanced security services.

 

When combined with the automated threat detection and enforcement capabilities of Juniper’s Software-Defined Secure Networks (SDSN) platform, Contrail Security will further fuel the expansion of a truly unified cybersecurity platform, able to adaptively respond to threats.

 

With Juniper’s Contrail Security and SDSN solutions, your cloud, networks, and assets are all speaking the same security language, diminishing risk to your organization.

 

To learn more about the technical details of Contrail Security, read Pratik Roychowdhury’s blog.