Get the premiere industry report that quantitatively defines the state of the modern application stack and the shift in technology used by enterprises adopting Cloud and DevSecOps. Cloud Architects, Operations/DevOps teams as well as Security Operations teams and practitioners can leverage this report as they look to effectively and securely build, run and secure modern applications and cloud infrastructures.
While the COVID-19 pandemic has disrupted business models around the world, the adoption of modern application and cloud technologies continues to grow. This year’s Continuous Intelligence Report by Sumo Logic provides an inside look into the state of the modern application technology stack, including changing trends in cloud and application adoption and usage by customers, and the impact of COVID-19 as an accelerant for digital transformation efforts.
Modern businesses are looking for stability and visibility of IT infrastructure and services in order to proceed with digital transformation. In order to adapt to the digital world, businesses need to bring services to market faster, while maintaining information security and infrastructure stability, and keepin service response speed at the highest level.
With their enriched threat data offerings, TruSTAR places a priority on providing a high-performing platform that makes it fast and easy for customers to get the information they need. However, TruSTAR needed a unified and streamlined way to understand how well their platform was doing across their infrastructure. This includes a footprint of AWS services, including Amazon GuardDuty and Amazon Elastic Compute Cloud (Amazon EC2). The company’s engineering team lacked a rapid method to prototype and report on the typical customer-centric experience at any given moment. It was challenging to answer questions like: how long does it take a user to login, or how long does it take a user to request a certain type of data from the platform? In addition, the company needed an affordable approach to store their log data in a separate, offsite location, which was essential for the company’s SOC 2 Type 2 certification.
Digital business transformation requires a fast-moving, collaborative culture. As companies on this fast track focus on innovation and speed to market, they inherently introduce more risk from the inside. Furthermore, in 2020, remote work became the norm, requiring increased adoption of cloud collaboration technologies. This shift caused a sudden acceleration of insider risk like we’ve never seen before.
Cost management, information security, observability, and regulatory compliance present unique challenges for educational institutions. In a tight budgetary and compliance environment, institutions need to get the most out of their technology investments while maintaining a strong security and compliance posture.
The Energy Authority (TEA) provides public power utilities with access to advanced resources and various technology systems across the US. Energy is much more than the electric grid—there’s power plants, hydro optimization, wind and solar farms. All of these things make up the energy markets across the US, and TEA participates in seven of those energy markets. TEA runs a 24/7 shop that operates with a very small IT staff heavily invested in various technologies. They have 225 employees across the country and business partners all across the US that are also running 24/7/365. TEA’s partners of course want to keep the power on 24/7/365.
Clorox is a $6 billion global consumer packaged goods (CPG) company that has operations in 25+ countries, approximately 8,800 employees across 83+ sites, with 33 manufacturing plants globally. Their computing environment is composed of approximately 1400 to 1500 Windows servers, ranging everywhere from 2003 all the way up to 2019. They run about 300 Linux servers in the environment with direct internet access at each of their locations, with a firewall at each of those sites. They have about 7,500 PCs, mostly laptops—predominantly Windows—with about 200 Macs in the environment.
In the wake of the widely publicized FireEye breach and the alarming SolarWinds supply chain attack, this presents an ideal opportunity for reflection on the broader shift taking place across the world—the transition from legacy on-prem infrastructures to the cloud. When a sophisticated nation-state obtains utilities intended for Red Team activities-- all but assuring nefarious intent-- it should give our community pause as to the collective state of security readiness should an attacker leverage such tools.