Let’s say you’re CIO at an enterprise recently cash injected by venture capital backers looking to speed your latest innovations toward a projected destination in to the marketplace.
Like always decisions will be a question of priorities. Like everyone else in that situation the first goal is to strike a balance between rapid business deployment and network security.
Old enterprise, new paradigm...
You will face some choices.
$$ $
Today’s CIO wants to match core needs of keeping up with comfort factor of robustly supported network security. (That’s the allure of proprietary)
Guided by those interests, VC backers introduce more than just new cash resources, but also an influx of management, guidance, and performance expectations.
Runnersand gunners
Venture capital backing comes with a drive to run and gun in the marketplace following two main priorities.
Overhead costs reduction
Net value increase
Under those circumstances, many enterprises choose to encapsulate their network in a secure bubble of onsite, proprietary hardware.
ProprietaryAllure
It’s a fast choice that takes a long time to implement, as opposed to thoughtful choice that can be implemented fast.
Proprietary architecture is expensive: New hardware requires space to house it, software to operate it, and IT personnel to maintain it.
Meanwhile, while you’re stacking servers in the janitor’s closet, the market keeps moving and shaking …
WHAT’S WRONG WITH THAT CHOICE?
Secure Operational Agility:
CRITICAL CHOICES
Opt for rapid deployment in the cloud: invoking major security concerns for about 75% of enterprises.
Allocate funds for more hardware, software, and space for data centers: raising cost concerns from VC.
or...
Source: http://research.microsoft.com/en-us/people/sriram/raghu-cloudcomputing.pdf
More like a biker gang. Less like a Disney World tour bus.
are supplementing on-premises web, data, and network security deployments, with cloud-based solutions.
Three out of four enterprise companies
OPEN HYBRID CLOUD
Want BYOD? We say bring it on.
Hybrid cloud networks extend network security beyond the scope of onsite appliances — to wherever workers are located.
Not only that, hybrid cloud security protection isn’t restricted to app safeguards, or mobile security, or network function safety checks that exist in the cloud.
The security solutions in the cloud could just as easily be protecting on-premises functions.
010101010101 Sophisticated zero-footprint, no-compromise,
cloud-based content security.
Expertise of the trusted leader that protects and empowers 15,000 customers worldwide.
Blue Coat Cloud Service
Leverages real-time intelligence from the Global Intelligence Network, which harnesses data from more than
to provide the industry’s only Negative-Day Defense.
BLUE COAT CLOUD SERVICE SECURES ENTERPRISES FROM ATTACKS BEFORE THEY OCCUR:
75 million users worldwide
Blue Coat Cloud Service Includes:
• URL Filtering• Real Time Advanced Threat Protection• Application Controls• Universal Policy and Reporting• Mobile Security• Secure use of laptops, tablets, and smartphones
• MDM Profile integration with AirWatch• Transparent and seamless user experience across all connectivity options including• 3G/4G• Always-On Global Coverage