Shifting to Software-Defined
Showing results for 
Search instead for 
Did you mean: 

Securing Your Hybrid Cloud (First of a Series)


For some IT leaders, there are still barriers to adopting a cloud solution with security and compliance being the foremost concern. By using a right mix hybrid cloud solution, we can address most of these security considerations, allowing the business to realize the advantages of moving their workloads to a cloud environment. You can embrace risk, knowing your cloud is secure.
Cloud Security 400x267_v2.jpg
Hybrid cloud is has been a huge catalyst for business transformation. It can cut costs, improve time-to-market with new ideas, allow for quicker response to market changes and many other benefits—all while simultaneously fueling innovation. Quite simply, the power of an optimized hybrid infrastructure enables innovative business outcomes.

But the rapid IT transformation has also created new risks, threats and vulnerabilities. Hybrid IT—with the explosion of mobile connectivity and big data, which has distributed data everywhere—has created new exposures and attack surfaces. The need for increased data protection has significantly escalated both the cost and complexity of data security management. Conflicting regulatory controls and industry specific issues often means that there is no clear path for organizations to achieve regulatory success. Finally, increasingly sophisticated cyber-attacks have grown in number with more frequency and greater damage when a breach occurs.

Ignoring the risks and failing to take action can prove costly. The annualized average cost of cyber-crime for an enterprise is $7.7M! Even worse is the length of time it takes to resolve a single cyber-attack: 46 days.

In a recent paper from 451 Research, “Voice of the Enterprise: Cloud Computing Q3, 2015”, security and compliance related issues were cited by IT leadership as the primary concern and priority.

The resulting recommendations to address these concerns were as follows:
– Maintain consistent access security and authorization controls across environments
– Secure movement of data and workloads across environments
– Secure data residing and processed in a third-party or hosted environment
– Maintain consistent network security policies for security domains
– Ensure compliance with regulatory and policy requirements

Managing risk in today’s digital environment has become even more critical to the health and success of the enterprise. Finding the right mix of hybrid cloud as a part of a hybrid IT infrastructure strategy is synonymous with setting an enterprise on a path toward greater innovation.

Security must be at the foundation of your enterprise IT strategy when defining, powering and optimizing your right mix of hybrid IT. By addressing security considerations upfront, you can transform your business with hybrid cloud resources while ensuring your data is secure and compliant.

This blog series on cloud security, delivered in multiple parts, will help customers understand how Hewlett Packard Enterprise can help them deliver a secure hybrid cloud environment. In the next part of this blog series, I will cover the three principles of hybrid cloud security and also the first of five key security capabilities that a hybrid cloud needs to incorporate for your right mix of hybrid IT to be safe. These three principles and five key security capabilities are the foundation of HPE Helion products and services. When a hybrid cloud is built on them, it will deliver the enterprise security businesses require today.

This is the first article of the series. To find the additional parts, please search for HPE Hybrid Cloud Security.


0 Kudos
About the Author


Chris Steffen is the Chief Evangelist for HPE Cloud Security. He is part of the HPE Helion team that works to educate and promote information security as it relates to cloud computing solutions. Before joining HPE, Chris spent over 15 years as an IT executive and security practitioner in multiple industries, including financial services, manufacturing and government. He is a noted industry expert, and has multiple technical certifications, including CISSP and CISA. You can follow him on Twitter at @CloudSecChris.