RedLock: Closing The Cloud’s Shared Security Gap

An Intellyx Brain Candy Brief

It has now become an accepted fact that the cloud is, in fact, more secure than almost any on-premises environment. This assertion is true, but it fails to account for one key element: the shared security model.

Redlock, which has only recently come out of stealth, aims to close this gap. The company explains that while cloud providers are responsible for the “security of the cloud,” it is organizations who are responsible for “security in the cloud.” Specifically, enterprises are responsible for the protection of five areas: resource configurations, users, network traffic, hosts and the applications themselves. While there are many security providers focused on any one of these areas, RedLock believes that it is the only provider holistically protecting the stack from configuration to host.

The cloud introduces unique challenges such as the transience of computing environments and IP addresses that are always changing. RedLock’s recent internal research found, in fact, that the average lifespan of a cloud compute resource is only 127 minutes, that 93% of those resources don’t restrict outbound traffic and that 82% of cloud databases are unencrypted.

The rapidly changing nature of the cloud coupled with a lack of visibility results in an often insecure application stack sitting on top of an otherwise secure infrastructure. RedLock’s holistic approach offers enterprise organizations the visibility they need to identify and dynamically close security gaps without negatively impacting the flexibility and adaptability that the cloud offers them.

Copyright © Intellyx LLC. Intellyx publishes the Agile Digital Transformation Roadmap poster, advises companies on their digital transformation initiatives, and helps vendors communicate their agility stories. As of the time of writing, none of the organizations mentioned in this article are Intellyx customers. To be considered for a Brain Candy article, email us at pr@intellyx.com.

SHARE THIS:

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.