Ubiquity: We live in a world where there is little or no consistency between how security policies are enforced across multiple data centres and cloud deployments. When it comes to centralisation, pick your battles and centralise IT functions where it is achievable and when there is clear business value. Work toward a unified network and security policy fabric that spans across multiple data centres and clouds. In addition, business applications are rarely Windows-only, but also include Mac, web, mobile. In that vein, you should also look at multi-cloud identity solutions that allow you to centralise identity and policy across all applications and content. Simply providing single sign-on for business apps (regardless of the type of app) is a highly visible win that you could achieve this year that would provide immediate business value.
Today's architecture for security
What we need is a true architecture capable of bridging the divide between security policies and security innovations - and this is now made possible with virtualisation.
Alignment is possible because virtualisation provides the layer between the physical infrastructure below and the apps above, allowing you to "connect the dots" by seeing the infrastructure through the lens of the app. Ubiquity comes into play by virtue of virtualisation being the first ubiquitous layer we've ever had: one that cuts across compute, network, storage, and even clouds.
This combination of capabilities would allow companies to "architect in" security. Using the micro-segmentation made possible by alignment and ubiquity, network virtualisation offers the opportunity to not only transform every aspect of how we address security, but, because it embraces individual security innovations, birth a new renaissance in security that would "raise all boats" in the security innovation ecosystem.
Sign up for Computerworld eNewsletters.