11 limitations of cloud-based security

11 Limitations of Network-Centric Security In The Cloud

Cover

Traditional security tools were originally at the perimeter, which was primarily defined by the network. Modern threats targeting public clouds (PaaS or IaaS platforms) demand a different level of insight and action.                  

Here is a list of the 11 use cases where network-centric security is inadequate to handle the challenges of modern cloud environments, including:

  1. Network-based detection creates many false positives
  2. Cyberattacks have moved beyond the network attack surface
  3. Network data can’t attribute cloud sessions to actual users
  4. Deep packet inspection on network traffic doesn’t scale
  5. Malicious activity at the storage layer is not detected

For the full list of the 11 use cases, read this report and learn about how Lacework can help modernize your organization's network security practices in the cloud. 

Vendor:
Lacework
Posted:
24 Sep 2018
Published:
24 Sep 2018
Format:
PDF
Length:
18 Page(s)
Type:
Resource
Language:
English
Already a Bitpipe member? Login here

Download this Resource!