by Dr. Amit Sinha - Zscaler's CTO and Executive Vice President of Engineering and Cloud Operations
Cloud adoption can change not just the way an enterprise works, but the way it's IT leadership manages applications, connectivity and security. Transition to the cloud offers an opportunity for enterprise IT leaders to reevaluate network architecture and optimize user experience. IT stakeholders looking to optimize network performance for a cloud environment must understand how architecture impacts cloud access. The new blueprint for enterprise IT connectivity infrastructure is comprised of five functional components: inline security, modern identity/access management, smart endpoint management, dynamic security information and event management (SIEM) and direct-to-cloud connectivity.
1. Don’t build castles around your network. Protect users wherever they are.
Enterprise IT stakeholders moving to a cloud model must recognize the subsequent impacts on security and network performance, particularly with regard to mobile users. When doing so, it’s important to:
2. Invest in a federated identity and access management (IAM) platform.
When doing so, it’s key to:
3. Revisit your endpoint management system.
As workers move to the cloud, IT leaders must reevaluate endpoint management. Will corporate endpoint management processes adapt to a “cloud way of work”? Two practices to consider incorporating for endpoint management in a cloud environment:
4. Consolidate logs in a SIEM system.
Event management, like most traditional hub-and-spoke network functions, has to evolve to function properly (read: securely) in a cloud environment. IT leaders moving to the cloud need to ensure SIEM can handle the impacts of the transition. When doing so:
5. Assess alternatives to your hub-and-spoke network with software-defined wide-area networking (SD-WAN).
SD-WAN is a more direct-to-internet connectivity model. Conceptually, SD-WAN separates network control from hardware, effectively virtualizing WAN management. When utilizing SD-WAN:
If your organization is moving applications to the cloud, starting with these five pillars can help transform both your security and your network.