- Community Home
- >
- Software
- >
- AI Unlocked
- >
- Get grounded in Zero Trust Data Security with Ezme...
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Forums
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark
- Receive email notifications
- Printer Friendly Page
- Report Inappropriate Content
Get grounded in Zero Trust Data Security with Ezmeral Learn On Demand
Embark on the Zero Trust Data Security learning path, where HPE Ezmeral Learn On Demand has launched the new, free course, Emerging Threats & Zero Trust Architecture.. This is the first course in a planned series on the hot topic of data security.
Why take this course?
Itโs free and available on demand. You can enroll, sample, begin a course, and return where you left off. Learn at your own pace and in your own way (even do it on your phone)!
But more importantly, the course unravels the many confusing, indistinct, and scary terms and events you have been reading about in the emerging threat data security landscape. The lessons then knit it all back together in a clear and straightforward manner, with the result being a solid overview of current data security challenges. The following topics are covered:
- Emerging threats: The basics
- Threats to on premises, hybrid, or cloud businesses
- Meeting threats with Zero Trust
Emerging threats: the basics
Data security is an all-encompassing term that covers many different fields across a vast technical landscape (some of which are shown in Figure 1). Youโve probably heard of many of these industry areas: security operations & architecture, threat intelligence, governance & compliance, and risk assessment.
Within each of these fields, many other specific aspects are included--like incident response, containment, recovery, training, or corporate education and user awareness.
The pace and technological advances of these various security threats require aggressive monitoring and active mitigation by all organizations involved with securing data. This course discusses three main areas where data security shortfalls are having devastating impacts: failure to meet regulatory compliance, revenue loss, and emerging cyber threats.
The course also reviews the four basic pillars of data security โ secrets, authentication, authorization, and attestation โ and provides the basic grounding in current security access processes in use today.
On-prem, hybrid cloud
Next you will learn (via some use cases in the communications, technology, finance, and healthcare industries) a handful of the technical challenges unique to each industry vertical.
For example, businesses operating in the financial sector must incorporate the services and data of a variety of different companies (to gather commercial lending rates, retail banking accounts and services, real-time stock data, and so on). Each of these subsidiaries or separate businesses have their own IT infrastructures and compliance regulations. Each business might be functioning with different operating systems and platforms, with applications built in different languages, making it even tougher to guarantee secure, integrated access, and data transfers. Their security solution must be platform agnostic and capable of interfacing services between a combination of cloud, hybrid, and on-prem compute resources.
For instance, one bank may have balance information stored in a legacy on-prem database with secure client access being provided on cloud applications. This information also needs to be securely accessed and shared behind the scenes with other financial institutions in order to clear transactions, such as in the transferring of funds.
Incorporating all these data sources together, while ensuring regulation compliance laws and security authentication procedures are met, is non-trivial and is but one area of potential security-flaw exploitation.
Adoption of Zero Trust Architectures and DevOps
New and innovative ways to protect data and applications are constantly being developed. Organizations are required to handle increasing operational complexities within their business.
Over the past few years, this has driven the expansion of the DevOps role. As IT infrastructures get more complex, developers now include security considerations much earlier in the process of application development โ itโs getting planned for and baked in. The security-focused DevOps structure allows teams to be proactive to protect against vulnerabilities instead of detecting the breaches after the fact (Figure 2).
As networks grow ever more complex with the addition of cloud-based infrastructures and services, software-as-a-service applications, containers, mobile workers, and more, perimeter-based security approaches are declining (Figure 3).
The number of systems now requiring protection has increased so significantly that building and maintaining these types of perimeters have become unmanageable. Existing tools like VPN, firewalls, and network-based security tools are simply no longer enough.
Many companies are now moving towards a Zero Trust Architecture (ZTA). This is a term that has been increasingly used in the industry and can have a few different interpretations.
Generally, a Zero Trust network is defined as an evolving set of security paradigms that are moving away from the static, perimeter-based defenses weโve just discussed. These architectures focus more on protecting resources, services, and users directly, instead of network segments with known locations.
Zero Trust assumes that the โbad guysโ are everywhere, so organizations do not automatically trust anything inside or outside their perimeters. The default assumption is that everything should be denied access, no matter its origin, until it has been verified.
A ZTA will often use cryptographic identities to authenticate resources, including every system or user, and it enables universal enforcement of this across hybrid infrastructures, including varying platform or cloud services.
In the hybrid infrastructure world, companies are searching for a Zero Trust Architecture they can implement and reliably support.
SPIFFE and SPIRE provide such a solution, eliminating the need for perimeters and secrets by keeping distributed systems secure and solving the challenges organizations now face. Take the new, free course: Emerging Threats & Zero Trust Architecture today, and stay tuned to Ezmeral Learn On Demand, as a course on the specifics of SPIFFE โ SPIRE security solutions is coming soon! Questions? Leave a comment below or contact us.
About the author:
Suzanne Ferry is the Director of Digital Learning for the HPE Ezmeral software business unit. This team creates free, on-demand courses covering timely topics such as Zero Trust Data Security, AI/ML, Data Fabric, and others.
Hewlett Packard Enterprise
HPE Ezmeral on LinkedIn | @HPE_Ezmeral on Twitter
@HPE_DevCom on Twitter
- Back to Blog
- Newer Article
- Older Article
- SFERRY on: What is machine learning?
- MTiempos on: HPE Ezmeral Container Platform is now HPE Ezmeral ...
- Arda Acar on: Analytic model deployment too slow? Accelerate dat...
- Jeroen_Kleen on: Introducing HPE Ezmeral Container Platform 5.1
- LWhitehouse on: Catch the next wave of HPE Discover Virtual Experi...
- jnewtonhp on: Bringing Trusted Computing to the Cloud
- Marty Poniatowski on: Leverage containers to maintain business continuit...
- Data Science training in hyderabad on: How to accelerate model training and improve data ...
- vanphongpham1 on: More enterprises are using containers; hereโs why.
- data science course on: Machine Learning Operationalization in the Enterpr...