• Home
  • Startup
  • Money & Finance
  • Starting a Business
    • Branding
    • Business Ideas
    • Business Models
    • Business Plans
    • Fundraising
  • Growing a Business
  • More
    • Innovation
    • Leadership
Trending

Why Conversational Commerce is the Future of Shopping

May 29, 2025

10 Leadership Myths You Need to Stop Believing

May 29, 2025

Tesla’s Layoffs Won’t Solve Its Growing Pains

May 29, 2025
Facebook Twitter Instagram
  • Newsletter
  • Submit Articles
  • Privacy
  • Advertise
  • Contact
Facebook Twitter Instagram
InDirectica
  • Home
  • Startup
  • Money & Finance
  • Starting a Business
    • Branding
    • Business Ideas
    • Business Models
    • Business Plans
    • Fundraising
  • Growing a Business
  • More
    • Innovation
    • Leadership
Subscribe for Alerts
InDirectica
Home » How IT And Security Leaders Can Strike The Right Budget Balance
Innovation

How IT And Security Leaders Can Strike The Right Budget Balance

adminBy adminNovember 13, 20230 ViewsNo Comments5 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email

President and Chief Executive Officer of Gigamon, a leader in deep observability.

As business leaders commence budgeting and planning for 2024, securing hybrid cloud infrastructure will likely remain a top priority—yet it will also be closely scrutinized for cost efficiencies. In an era in which organizations must do more with less, it’s an important exercise, but there are critical considerations as today’s threat landscape continues to rapidly evolve.

Further complicating these issues, there appears to be a disconnect among security and IT leaders when it comes to securing their infrastructure. In a recent Gigamon survey, 94% of the 1,000 IT and security leaders surveyed believe their current tool sets and processes provide them with complete visibility and insights into their hybrid cloud environment. Yet, 90% had also experienced a data breach in the last 18 months, with 1 in 3 security breaches going undetected using traditional cloud, security and observability tools.

Next year, we expect to see organizations continuing to consolidate their security stack and turning to vendors that can offer multiple solutions under one cost center. But although this helps save budget and resources, it’s important to closely evaluate which tools you’re cutting. It’s not about reducing the number of tools for the sake of cost savings alone.

In fact, cutting tools may end up creating more risk—and ultimately much more expense—if you remove tools that offer defense-in-depth security (i.e., the tools that offer you 360-degree visibility and protection). I encourage business and security leaders to closely align on the value of the tools in place, the potential risks and gaps with change, and the associated budget that can increase the likelihood of maintaining the organization’s security posture. Although our data shows that most IT and security leaders are confident, the reality is that security breaches continue to occur, and threats are more pernicious in an increasingly complex hybrid cloud environment.

Here are some tips for organizations evaluating their hybrid cloud infrastructure from a cost and efficiency perspective—without sacrificing security.

Protect Encrypted Traffic

Encrypted or transport layer security (TLS) traffic represents a huge threat to organizations today. The volume of encrypted web traffic is up to 95%, nearly doubling in the last 10 years. And because the threat landscape has also changed significantly since 2013, we’re seeing the majority (90%) of cyber threats concealed within encrypted channels and traffic.

Organizations have deployed more tools in their network to keep pace with changing distributed workforce and digital transformation needs. This has created massive tool sprawl, resulting in blind spots for security teams. To protect encrypted traffic in various tools and prevent cybercrime, it’s critical that effective telemetry data, including network-derived intelligence, can be leveraged from all tools. When tools share telemetry data seamlessly with each other, it helps reduce the bloat of tools and allows organizations to do more with fewer resources.

Leverage Telemetry Data To Help Prevent Cyberattacks

The native tools that cloud service providers (CSPs) offer to monitor and protect network traffic aren’t adequate to prevent most cyberattacks. These tools are based on log information, which is typically altered during an attack, duping the security team into a false sense of security. In addition, threat actors can hide their activities inside encrypted traffic, making them blind to most security tools and wreaking havoc on an organization.

Cybercriminals are becoming extremely sophisticated in their efforts to manipulate logs, making it nearly impossible for security teams to see abnormal or risky behaviors within their hybrid cloud infrastructure. Organizations should leverage immutable network-based metadata to validate the authenticity of log-based telemetry to identify potential nefarious actions and reduce the cost of egress traffic from cloud to on-premises tools.

Leaders often don’t fully appreciate just how big of a risk is associated with using log-based tools. Much to their surprise, CSPs aren’t responsible for securing the workloads running across your network. It’s up to an organization to leverage useful telemetry data, alongside logs, to monitor network traffic and deem what’s safe or unsafe. It’s critical to remember that network-derived intelligence is accurate and can’t be manipulated.

Elevate The Importance Of Visibility

A major challenge that continues to face organizations in the quest to secure the hybrid cloud is protecting against lateral movement—also known as East-West movement. An example of this is when a cybercriminal uses a spear phishing email to gain access to a single laptop and then can get into the entire server and gather sensitive credentials.

This gets even more complex as business-critical tools live in different platforms—from clouds to on-premises containers—and this is driving up costs and increasing blind spots, or the threat “blast area.” With limited visibility into tools and platforms, organizations typically can’t detect malicious activity before a breach occurs. We need more than just detection—we also need protection. And we need it early. One solution is to ensure there’s deep observability in all East-West, lateral and encrypted traffic.

Maintain A Strong Security Posture

As of September 5, 2023, the SEC is requiring organizations to comply with its new requirements and provide annual cybersecurity risk management, strategy and disclosures of any cybersecurity incidents. This will be a forcing function for organizations to implement new approaches, such as a zero-trust architecture and deep observability of all network traffic.

As organizations evaluate their security stack, it’s important to ensure all encrypted traffic is monitored, that telemetry data is accessible from all tools and that you have visibility into all network activity. With these steps in mind, organizations can better prioritize critical security technologies in order to do more with less and remain confident in their security-first mindset.

Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?

Read the full article here

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Articles

Going Eco Benefits Planet And This Hotel’s Bottom Line

Innovation May 29, 2025

What IBM’s Deal For HashiCorp Means For The Cloud Infra Battle

Innovation April 25, 2024

Is Telepathy Possible? Perhaps, Due To New Technology

Innovation April 24, 2024

Luminar Launches Production For Volvo, Shows Next-Gen Halo Lidar

Innovation April 23, 2024

Turning Customers Into Investors – Tiny Health’s Experience

Innovation April 22, 2024

Netflix’s Best New Original Series Is Stressing Me Out

Innovation April 21, 2024
Add A Comment

Leave A Reply Cancel Reply

Editors Picks

Why Conversational Commerce is the Future of Shopping

May 29, 2025

10 Leadership Myths You Need to Stop Believing

May 29, 2025

Tesla’s Layoffs Won’t Solve Its Growing Pains

May 29, 2025

Going Eco Benefits Planet And This Hotel’s Bottom Line

May 29, 2025

What IBM’s Deal For HashiCorp Means For The Cloud Infra Battle

April 25, 2024

Latest Posts

The Future of Football Comes Down to These Two Words, Says This CEO

April 25, 2024

This Side Hustle Is Helping Land-Owners Earn Up to $60,000 a Year

April 25, 2024

A Wave of AI Tools Is Set to Transform Work Meetings

April 25, 2024

Is Telepathy Possible? Perhaps, Due To New Technology

April 24, 2024

How to Control the Way People Think About You

April 24, 2024
Advertisement
Demo

InDirectica is your one-stop website for the latest news and updates about how to start a business, follow us now to get the news that matters to you.

Facebook Twitter Instagram Pinterest YouTube
Sections
  • Growing a Business
  • Innovation
  • Leadership
  • Money & Finance
  • Starting a Business
Trending Topics
  • Branding
  • Business Ideas
  • Business Models
  • Business Plans
  • Fundraising

Subscribe to Updates

Get the latest business and startup news and updates directly to your inbox.

© 2025 InDirectica. All Rights Reserved.
  • Privacy Policy
  • Terms of use
  • Press Release
  • Advertise
  • Contact

Type above and press Enter to search. Press Esc to cancel.