RSA Report: Cloud Security, Protection, Remains Hot

For the second year in a row, the security minds at the RSA Conference were fixated on cloud security. Crowds on the expo floor flocked around vendors  such as Zscaler presenting their take on what it means to secure the crowd and long lines snaked through Moscone corridors in anticipation of talks such as "Cloud  […]

Feb 22, 2011
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

For the second year in a row, the security minds at the RSA Conference were fixated on cloud security. Crowds on the expo floor flocked around vendors  such as Zscaler presenting their take on what it means to secure the crowd and long lines snaked through Moscone corridors in anticipation of talks such as "Cloud  Computing: A Brave New World for Security and Privacy" or "Trends in Security Delivery Models: Cloudy Skies Ahead?"

So what has the difference been in this year’s agenda versus last year? According to Rob Ayoub, analyst with Burton Group, this 2011 focus on cloud protection seems a little more substantial.

"I think we got over that initial shock about ‘Oh my God , the cloud is coming,’" Ayoub said, "So now there really is a much greater emphasis on education of what cloud means. I think this year the professionals are looking for a lot more details around solutions; how does this really work in practice, how will this work in my institution?"

Ayoub’s sentiment was echoed by Art Coviello during the RSA company chief’s keynote to kick off the show. Coviello said that his repeated keynote theme of cloud security is not going to be like the re-hashing he and other industry experts did around public key encryption (PKI) back in the day.

"Last year my keynote was about the promise. This year it’s about the proof.

"The promise is that you can achieve safety in the cloud. The promise is that we can fundamentally do security differently and better," Coviello said. "The proof comes when, by leveraging virtualization technology, we demonstrate better control and visibility, the key elements of trust, in cloud environments."

As he explains, the industry is already in the midst of an IT transformation, where investments are focused less on infrastructure issues and more on using information to solve business problems.

"But in any of these transformations the goal of security remains the same ‐ getting the right information to the right people over a trusted infrastructure in a system that can be governed and managed," he said. "But independent of this transformation to cloud we’re seeing an enormous amount of change across the dimensions of information, identities and infrastructure ‐‐ creating a nightmare of control problems and visibility issues; the antithesis of trust."

Vendors are hoping to wake the industry from that nightmare with a spate of new products and industry alliances coming out of the RSA Conference–many of them geared toward the channel.

For its part, RSA and its fellow EMC company, VMWare, announced the forthcoming Project Horizon, a cloud-based management identity management service. Similarly, CA  is keeping the cloud focus on identity with a refresh of its Advanced Authentication Cloud Service that added tagless device identification, mobile authentication, and better integration with SiteMinder.

As an integral part of the shift to the cloud, virtualization security has gotten some much needed attention from the larger players, as evidenced by some of last week announcements. For example, HP announced that it is commencing work with VMware to improve integration with its TippingPoint intrusion prevention system (IPS) solutions for VMware vSphere-based environments to improve security management capabilities within the cloud.

According to Coviello, we’ll expect to see more of these types of announcements, as the industry has reached an inflection point.

"In the near future, trusted clouds will employ predictive analytics based on their understanding of normal states, user behaviors and transaction patterns to spot high‐risk events and allow organizations to proactively adapt defenses," Coviello said. "Adopting these principles enables a heightened level of control and visibility that will lead to trust. While I’ve advocated for these principles in the past, we are now at an inflection point where they are being applied in solutions arriving in the market place."

 

Recommended for you...

MetTel to Modernize Communication Lines for VA

MetTel secures a $54M contract to modernize 15,000 VA phone lines across 1,875 locations using its POTS Transformation solution, enhancing reliability and performance.

Jordan Smith
Aug 8, 2025
Galactic Advisors Wins Credential-Free Assessment Patent

Galactic Advisors patents a user-activated, credential-free pen testing tool, boosting MSP security with risk-free, forensic-grade assessments.

Jordan Smith
Aug 6, 2025
Flashpoint Mid-Year Report: Cyber Threats are Escalating

Flashpoint’s 2025 Midyear Index reveals an 800% rise in info-stealing malware and significant surges in ransomware, vulnerabilities, and breaches.

Franklin Okeke
Aug 5, 2025
Cloudbrink Adds Native ID Management, Crowdstrike Integration

Cloudbrink expands Personal SASE with identity services and Crowdstrike integration, unifying user and device security for zero-trust access control.

Jordan Smith
Aug 5, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.