×

Empower Your Business with Innovation

  • Shop By Category
  • Protecting the cloud, one workload at a time

    Posted by HSSL Systems Integrators on Jul 24th 2020

    As companies deployed multiple workloads in the cloud, those with networking background began to question whether existing security was naturally extensible to these new workloads. Security vendors responded with CWPP  Cloud Workload Protection Platforms.

    These solutions are defined as work-load centric security protection solutions. They usually deploy an agent and address server workload protection in hybrid architectures. An example would be a hybrid data center with both on-premises or physical and virtual machines, and potentially multi-cloud IaaS infrastructures. Most also support container-based application architectures (i.e., Docker and Kubernetes). So far, sounds perfect.

    The notion behind CWPP is that focusing on application security misses the broader context of cloud workloads, where deployment, monitoring, and security are all aspects of deploying workloads in the cloud. This includes items like data served to and generated by the application and network resources required to connect users and the application.

    Protection for cloud workloads is based on the analysis of the security for all the components involved in running your workloads. If you look at a typical cloud workload and note, a cloud workload is more than just the application at the core of it, most of them involve multiple layers of “networking,” many of which may simply be moving data from one user or access point to another but there is going to be some element which is exposed to the public internet, even if that is simply Secure Remote Access.

    Therefore, CWPP products focus their attention on protecting the workload itself, versus any vulnerabilities in the application code itself. While many of the vendors offering CWPP solutions came from the endpoint security sector, many others are “born-in-the-cloud” solutions and overlap (and in some cases also compete in) the other security sectors that we’ll discuss in future blogs.

    Recently, some products began to offer extensions into compliance, for example checking configurations against best-practices benchmarks such as CIS (Center for Internet Security), but that has not been the focus of CWPP  when most of those products were first conceived, the notion of a security posture or worse, compliance as it related to IT best practices, hadn’t come to fruition. 

    Top

    Don't Miss Out

    Sign up now to receive exclusive perks and unique promotions directly to your inbox.

    Culver Drive, 340 Irvine, CA 92604

    Tel 888.988.5472

    Copyright © HSSL Technologies. All Rights Reserved. HSSL Technologies are registered trademarks of HSSL Technologies. All other trademarks and registered trademarks brands are the sole property of their respective owners.

    HSSL Technologies (US) © 2026. All Rights Reserved.
    american expressdiners clubdiscovermaestromasterpaypalvisa