Intelligent CIO Europe Issue 87 | Page 19

LATEST INTELLIGENCE several times , making it impossible to track and secure a transaction end to end .
5G adoption has also left traditional firewalls struggling to keep up – especially when 95 % of all traffic is now encrypted . Encrypted traffic , especially secure sockets layer / transport layer security ( SSL / TLS ) tunnels , is widely used to secure remote access and transactions . However , cybercriminals also use encryption to hide malicious activities , such as stealing company data and secrets and to launch ransomware attacks . Most firewalls cannot decrypt and inspect encrypted traffic without seriously impacting performance and user experience . So , most encrypted traffic – especially data traveling at very high speeds – goes uninspected . compliance , privacy , the need to protect intellectual property , or to secure sensitive records . However , most traditional firewalls cannot support hybrid data center use cases , including user-to-data center , data center-to-cloud , user-to-cloud , and data center-todata center interconnect models . p
Multi-cloud environments and a hybrid workforce are also rewriting security requirements . The cloud enables agile application development and scale-out / scaleup functionality to accommodate growing application access by remote workers . However , numerous business-critical applications still need to be housed in the on-premises data center for reasons such as
Download whitepapers free from www . intelligentcio . com / eu / whitepapers /
www . intelligentcio . com INTELLIGENTCIO EUROPE 19