something great on-premises, please, please, please, do not bring that challenge
to the cloud. Cloud is your moment to rethink the following processes:
• Image management
• Configuration management
• Change management
• Patch management
• Identity and access management
• And much much more
We hesitate mentioning automation, but in each one of these areas, automation is a key
component. If you are not using automation in the cloud, you will not be able to scale
securely. It is that simple.
What is All This About a 'Hidden Opportunity'
Scoping out security in the cloud shows you what is possible on-premises. The “hidden
opportunity” lies in the premise that if organizations can prove security effectiveness
and efficiency in a public cloud environment, they can translate those good habits
on-premises.
You have abstracted your security approach and applied it to the cloud. You have shown
that you can achieve automation, secure deployment pipelines, immutable infrastruc-
tures, continuous compliance and consistent protection of data, all in the cloud. Now, by
applying these security approaches on-premises, you will upgrade your overall security
ecosystem, your team will no longer be overworked and understaffed – and as security
professionals, you can move from being “back on your heels,” to “ready to sprint.” This
ultimately is your organization’s “hidden opportunity” to turn the tables on its security
attackers, bringing the fight to them.
FALL 2019 | THE DOPPLER | 11