{"id":3044,"date":"2012-12-05T10:30:35","date_gmt":"2012-12-05T18:30:35","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=3044"},"modified":"2013-02-28T16:33:12","modified_gmt":"2013-03-01T00:33:12","slug":"cloud-more-journey-than-destination","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2012\/12\/cloud-more-journey-than-destination\/","title":{"rendered":"Cloud: More Journey than Destination"},"content":{"rendered":"<p>When I was at the <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/ignite2012\/\">Ignite<\/a> user conference recently, a customer said they didn\u2019t yet have a roadmap to move towards a private cloud model. By \u201c<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/cloud\/\">cloud<\/a>,\" he meant an IT infrastructure where computing resources are pooled together, and applications of different trust levels are residing within the virtualized server. He was worried that this was an atypical perspective in the IT world.<\/p>\n<p><!--more--><\/p>\n<p>In fact, the cloud is not the utopia IT architecture for all enterprises, nor should it be. It is one of multiple options towards a more efficient, responsive and available IT infrastructure. And, it may be a journey of a thousand miles to get there, rather than an immediate migration. That\u2019s okay. You will get there one step at a time. After all, there\u2019s still a lot to do in terms of data center consolidation, segmentation, securing your virtualized infrastructure, and safely enabling data center applications. But whichever challenge you\u2019re tackling now and whether or not you\u2019re heading to the clouds, we\u2019re here to help. In fact, we have leveraged many of the benefits and characteristics of cloud computing technologies within our <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/NGFW\/\">next-generation firewall<\/a> solution.<\/p>\n<p><strong>Cloud Computing Might<\/strong><\/p>\n<p>For example, the ability to utilize pools of computing resources has been used to great advantage by developers. That same cloud computing benefit can now be extended to optimize and accelerate security analysis. That\u2019s exactly what we\u2019re doing with <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/wildfire\/\">WildFire<\/a><\/p>\n<p>With <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/wildfire\/\">WildFire<\/a>,\u00a0we are harnessing the computational power of cloud to analyze unknown files for malicious behaviors as part of a comprehensive strategy to tackle modern malware. The power of the cloud enables hundreds of thousands of files to be analyzed in minutes, with a platform for malware that lets it do exactly what an attacker intended it to do. This means the malware can be observed in a protected cloud \u201csandbox\u201d without impacting an enterprise\u2019s network. This would be much harder to do inline, with an on-premise appliance.<\/p>\n<p><strong>Dynamic, Automated Security Services<\/strong><\/p>\n<p>One of the most popular application development platforms in the cloud-- Amazon Web Services-- was built by developers for developers. The design is all about optimizing the backend infrastructure so these application developers can leverage common features and services, and quickly get up and running. Application developers are nimble, tearing down and creating virtual machines in minutes, and they automate many of their application delivery processes.<\/p>\n<p>We\u2019ve learned from this model that it\u2019s important to embrace the dynamic and automated nature of this environment so that security doesn\u2019t slow down the application delivery process. We do this with dynamic address objects (new feature in PAN-OS 5.0) and our REST XML API features. Dynamic Address Objects are a new address object type that can be updated using our XML API. They can be referenced in security policies and when virtual machines are created or moved, security policies can be enforced without a manual change.<\/p>\n<p>Using a combination of orchestration software APIs (from companies like CA or VMware) and our XML API, security operations like creating a new firewall, applying an initial configuration, applying common security policies and maintaining these policies can all be automated. In a large, dynamic data center with a high rate of change, this automation not only improves response times for firewall changes but also reduces the chance of outages caused by firewall administrator errors.<\/p>\n<p>So, while you may not quite be ready for the cloud, your next-generation firewalls have the features to support you when you decide it\u2019s time.<\/p>\n<p>You can read up more about our how lessons learned from cloud computing can be applied to security in my Security Week Article here -- \u201c<a href=\"http:\/\/www.securityweek.com\/can-amazon-web-services-model-extend-security\" rel=\"nofollow,noopener\" >Can The Amazon Web Services Model Extend To Security<\/a>\u201d. Let me know what you think at <a href=\"https:\/\/twitter.com\/DanelleAu\" rel=\"nofollow,noopener\" >@DanelleAu<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When I was at the Ignite user conference recently, a customer said they didn\u2019t yet have a roadmap to move towards a private cloud model. By \u201ccloud,\" he meant an IT infrastructure &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[113],"tags":[109,105,111],"coauthors":[771],"class_list":["post-3044","post","type-post","status-publish","format-standard","hentry","category-cloud-computing-2","tag-cloud","tag-ignite2012","tag-ngfw"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3044","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=3044"}],"version-history":[{"count":11,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3044\/revisions"}],"predecessor-version":[{"id":3055,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3044\/revisions\/3055"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=3044"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=3044"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=3044"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=3044"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}