The trend of moving data storage to the cloud continued in 2019 due to the need for digital transformation among businesses. With cloud technology, businesses can shorten the time-to-market in developing products and services, optimize infrastructure, streamline and simplify processes, and thus enable overall cost reduction.
The awareness of cloud security has significantly improved among businesses, largely driven by industry regulations and in-country cybersecurity laws. Many businesses state that security and privacy are their biggest concerns when moving to the cloud.
However, misconceptions about cloud security remain, particularly regarding cloud application and cloud workload security; this leads to the misuse of cloud security protection strategies. Additionally, many businesses lack clarity about the responsibility of data security between cloud service providers and the businesses themselves. Due to the ineffectiveness of legacy security solutions (e.g., endpoint security, firewalls, application security), it is vital for businesses to have visibility in the cloud environment and fully understand what, where, and how to protect workloads. Requirements for containers, containerized applications, and serverless workload protection are soaring due to the increased adoption of public cloud and multi-cloud models. Cloud workload protection (CWP) is increasingly integrated with other cloud security management tools, such as vulnerability assessment, security information and event management, security analytics, and log management, to have the full capabilities of risk management for cloud workloads.
CWP solutions are also integrating with other cloud security solutions, such as software-defined and virtual firewalls, cloud identity access management (IAM), cloud access security broker (CASB) for data security, advanced endpoint detection and response for server workload threat detection and response, and malware protection.
These solutions will be increasingly integrated with artificial intelligence and machine learning to drive the automation and orchestration of threat detection and response with minimal or no manual intervention. Mergers and acquisitions (M&A) continue to take place among security companies. Traditional security companies will use this as one of effective strategies to strengthen their product portfolios for cloud protection.
Companies mentioned in this Asia-Pacific Cloud Workload Security Industry Guide include Amazon Web Services, Google Cloud, IBM Cloud, Microsoft Azure, Oracle, VMware, Cisco Systems, Check Point Software Technologies, Palo Alto Networks, McAfee, Symantec, Trend Micro, VMware Carbon Black, and CrowdStrike.
1. Executive Summary
- Key Findings
2. Market Definitions - Cloud Workload and Cloud Applications
- What is a Cloud Workload?
- The Rise of Public Cloud Workloads
- Workloads in the Cloud
- Typical Workloads in the Hybrid Cloud
3. Mounting Risks and the Failure of Legacy Security Approaches
- Mounting Risks to Data Security
- The Shared-Responsibility Security Model
- The Failure of Legacy Security Tools
4. Key Requirements for Cloud Workload Protection
- Key Requirements for Cloud Workload Protection - Failure of Legacy Security Tools
- What is Cloud Workload Protection (CWP)?
- Cloud Workload Protection Architecture
- CWP Architecture - Agent-based, Agent-less or API-based, and Hybrid
- Hybrid Monitoring and Protection Model
- Cloud Workload Protection Layers
5. Cloud Workload Protection Market Landscape
- Market Landscape
6. Top Cloud Workload Protection by Cloud Service Providers (CSP)
- Cloud Workload Protection by Amazon Web Services (AWS)
- Cloud Workload Protection by Google Cloud
- Cloud Workload Protection by Microsoft Azure
- Cloud Workload Protection by IBM Cloud
- Cloud Workload Protection by Oracle
- Cloud Workload Protection by VMware
- Cloud Service Providers Key Capability Comparison
7. Top Cloud Workload Protection Platforms by Security Vendors
- Vendor Profiling - Cisco Systems
- Vendor Profiling - Check Point Software Technologies
- Vendor Profiling - McAfee
- Vendor Profiling - Palo Alto Networks
- Vendor Profiling - Symantec
- Vendor Profiling - Trend Micro
- Vendor Profiling - VMware (Carbon Black)
- Vendor Profiling - Crowdstrike
- Vendor Key Capability Comparison
8. Growth Opportunities and Companies to Action
- Transformation in CWP Ecosystem
- Growth Opportunity 1 - Market Education Essential at Early Stage Along with Collaboration with Local CSPs
- Growth Opportunity 2 - Increasing Need for Managed CWP Services
- Growth Opportunity 3 - Foresee More Threat Intelligence Service Integration
- Growth Opportunity 4 - Need for DevSecOps and Security Training
- Strategic Imperatives for Success and Growth
9. The Last Word
- Legal Disclaimer
- List of Exhibits