Why Traditional Security Tools Can't Cut it

Today's enterprise infrastructure is full of blind spots that can hide malicious threats, and traditional security tools struggle to scale up to meet increased demands. How must security leaders respond? Amrit Williams of CloudPassage shares insight.

In short, because today's infrastructure is virtualized, on-demand and must scale up automatically to meet peak needs - security tools must be prepared to do the same. Otherwise, threats will be missed and performance will be compromised, says Williams, CTO of CloudPassage.

As an example, Williams offers Netflix. "The compute resources required to deliver services to customers on Friday evening are very different from the compute resources needed on Monday at 3 a.m.," he says. And security resources need to be prepared to scale up with that demand - without compromising performance.

The problem is: Traditional security tools are not prepared to meet the demands of the modern infrastructure. And too many organizations are unaware of the security blind spots and performance issues these tools are creating.

In an interview about meeting the security needs of the new infrastructure, Williams discusses:

How traditional security tools hamper business agility; How to gain visibility across the new infrastructure; Technical and cultural hurdles to overcome as organizations transition away from old tools.

Williams has more than 20 years of experience in information technology and is currently the CTO of CloudPassage. Previously he was the Director of Emerging Security Technologies and CTO for mobile computing at IBM. Prior to IBM, he was a research director in the Information Security and Risk Research Practice at Gartner, Inc. where he covered vulnerability and threat management, network security, security information and event management, risk management, and secure application development. Previously, Williams was a director of engineering for nCircle Network Security, and undertook leadership positions at Consilient Inc., Network Associates, and McAfee Associates.