Top Banner
IT professionals are concerned about deploying traditional security products in virtualized data centers. Beat the Challenges to a Secure Virtual Infrastructure Virtualization and the transition to the cloud is impacting organizations, with challenges and complexities in securing the data center that are unique to these environments. Virtual Concerns THE TOP CONCERNS Going Public Global Virtualization Capabilities The most important security capabilities in a virtual environment globally are vulnerability shielding and meeting regulatory compliance. 27% 21% 12% Higher operational complexity of managing security products Difficulty in ensuring compliance with regulations or corporate security policy Difficulty in auditing security posture TOP SECURITY CAPABILITIES GLOBALLY 82% Security for All A new breed of virtualization/cloud security is desired to secure the entire virtual environment. of IT professionals want their virtualization/cloud security to protect not just their virtual machines but also the hypervisor. 69% Meeting regulatory compliance in virtual environments 84% Vulnerability shielding for system and apps 84% Security/monitoring for the hypervisor 83% IT professionals are concerned about the inability to enforce corporate security policies on public/hybrid cloud workloads. IT professionals note the lack of adequate data security and privacy in a multi-tenant cloud environment as their primary concern Most proven in real word deployments Cloud Pleasers Experience speaks for itself when ranking the most important factors when making security purchase decisions for virtualization/cloud environments. TOP 5 VIRTUALIZATION AND CLOUD SECURITY PURCHASE DRIVERS 71% Highly automated Highly scalable Tightly integrated with virtualization and cloud environment VM sprawl comes with virtualization, having a single vendor with a virtualization security data center platform can solve complexity issues. Most resource efficient 9 0 % 8 4 % 8 2 % sponsored by 8 1 % 64% According to a global survey of 162 respondents, sponsored by Trend Micro and conducted by IDG Research Services. Base: 62 US respondents, 50 EMEA respondents, and 50 APAC respondents who are employed in an IT or IT-security related job function and who have involvement in or influence over purchasing, implementation, or ongoing management of virtualization or cloud security solutions. Click Here to View White Paper Learn more: www.trendmicro.com/cloud
1

TOP 5 Purchase drivers for VIRTUALIZATION AND Cloud Security

Sep 12, 2021

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: TOP 5 Purchase drivers for VIRTUALIZATION AND Cloud Security

IT professionals are concerned about deployingtraditional security products in virtualized data centers.

Beat the Challenges to a Secure Virtual InfrastructureVirtualization and the transition to the cloud is impacting organizations, with challenges and complexities in securing the data center that are unique to these environments.

Virtual Concerns

THE TOP CONCERNS

Going Public

Global Virtualization CapabilitiesThe most important security capabilities in a virtual environment globally are vulnerability shielding and meeting regulatory compliance.

27% 21% 12%Higher operational complexity of managing security products

Difficultyin ensuring compliance with regulations or corporate security policy

Difficultyin auditing security posture

TOP

SECURITY CAPABILITIES

GLOBALLY

82%

Security for AllA new breed of virtualization/cloud security is desired to secure the entire virtual environment.

of IT professionals want their virtualization/cloud security to protect not just their virtual machines but also the hypervisor.69%

Meeting regulatory compliance in virtual

environments

84%Vulnerability

shielding for system and apps

84%Security/monitoring for the hypervisor

83%

IT professionals are concerned

about the inability to enforce corporatesecurity

policies on public/hybrid

cloud workloads.

IT professionals note the lack of adequate data security and privacy in a multi-tenant

cloud environment as

their primary concern

Most proven in real word deployments

Cloud PleasersExperience speaks for itself when ranking the most important factors when making security purchase decisions for virtualization/cloud environments.

TOP 5 VIRTUALIZATION ANDCLOUD SECURITY PURCHASE DRIVERS

71%

Highlyautomated

Highlyscalable

Tightly integrated with virtualization and cloud environment

VM sprawl comes with virtualization, having a single vendor witha virtualization security data center platform can solve complexity issues.

Most resource efficient

90%

84%82%

sponsored by

81%

64%

According to a global survey of 162 respondents, sponsored by Trend Micro and conducted by IDG Research Services. Base: 62 US respondents, 50 EMEA respondents, and 50 APAC respondents who are employed in an IT or IT-security related job function and who have involvement in or influence over purchasing, implementation, or ongoing management of virtualization or cloud security solutions.

Click Here to View White Paper Learn more:www.trendmicro.com/cloud