NEWS: 公告在東京證券交易所JASDAQ標準市場新上市



Industry Guide to Cloud Workload Security in Asia-Pacific

出版商 Frost & Sullivan 商品編碼 939653
出版日期 內容資訊 英文 72 Pages
商品交期: 最快1-2個工作天內
雲端負載安全的業界指南:亞洲太平洋 Industry Guide to Cloud Workload Security in Asia-Pacific
出版日期: 2020年05月06日內容資訊: 英文 72 Pages





  • 主要調查結果


  • 雲端負載為何
  • 公共雲端負載的興起
  • 雲端負載
  • 混合雲端與一般的負載


  • 數據風險增加
  • 責任共有安全模式
  • 傳統安全工具的錯誤


  • 雲端負載保護的主要要件
  • 雲端負載保護的主要要件:傳統安全工具的錯誤
  • 雲端負載保護(CWP)為何?
  • 雲端負載保護架構
  • CWP架構:基於Agent、Agent-less或基於API、及混合
  • 混合監控與保護模式
  • 雲端負載保護層


    • 市場情勢


    • Amazon Web Services(AWS)
    • Google Cloud
    • Microsoft Azure
    • IBM Cloud
    • Oracle
    • VMware
    • 雲端服務提供者的主要機能比較


    • 供應商檔案:Cisco Systems
    • 供應商檔案:Check Point Software Technologies
    • 供應商檔案:McAfee
    • 供應商檔案:Palo Alto Networks
    • 供應商檔案:Symantec
    • 供應商檔案:Trend Micro
    • 供應商檔案:VMware (Carbon Black)
    • 供應商檔案:Crowdstrike
    • 供應商關鍵機能的比較


    • CWP商業生態系統的變革
    • 成長機會1:加上與地域的CSP合作、初期階段不可或缺的市場教育
    • 成長機會2:對於管理CWP服務需求的增加
    • 成長機會3:更進一步威脅智能服務整合的預測
    • 成長機會4:DevSecOps與安全訓練為必要的
    • 為了成功與成長的戰略必須事項


    • 結論
    • 免責事項


    關於Frost & Sullivan

Product Code: PAF3-74

Increased Adoption of Public and Hybrid Cloud Technology Creates Strong Need for Cloud Workload Protection

The trend of moving data storage to the cloud continued in 2019 due to the need for digital transformation among businesses. With cloud technology, businesses can shorten the time-to-market in developing products and services, optimize infrastructure, streamline and simplify processes, and thus enable overall cost reduction.

The awareness of cloud security has significantly improved among businesses, largely driven by industry regulations and in-country cybersecurity laws. Many businesses state that security and privacy are their biggest concerns when moving to the cloud.

However, misconceptions about cloud security remain, particularly regarding cloud application and cloud workload security; this leads to the misuse of cloud security protection strategies. Additionally, many businesses lack clarity about the responsibility of data security between cloud service providers and the businesses themselves. Due to the ineffectiveness of legacy security solutions (e.g., endpoint security, firewalls, application security), it is vital for businesses to have visibility in the cloud environment and fully understand what, where, and how to protect workloads. Requirements for containers, containerized applications, and serverless workload protection are soaring due to the increased adoption of public cloud and multi-cloud models. Cloud workload protection (CWP) is increasingly integrated with other cloud security management tools, such as vulnerability assessment, security information and event management, security analytics, and log management, to have the full capabilities of risk management for cloud workloads.

CWP solutions are also integrating with other cloud security solutions, such as software-defined and virtual firewalls, cloud identity access management (IAM), cloud access security broker (CASB) for data security, advanced endpoint detection and response for server workload threat detection and response, and malware protection.

These solutions will be increasingly integrated with artificial intelligence and machine learning to drive the automation and orchestration of threat detection and response with minimal or no manual intervention. Mergers and acquisitions (M&A) continue to take place among security companies. Traditional security companies will use this as one of effective strategies to strengthen their product portfolios for cloud protection.

Companies mentioned in this Asia-Pacific Cloud Workload Security Industry Guide include: Amazon Web Services, Google Cloud, IBM Cloud, Microsoft Azure, Oracle, VMware, Cisco Systems, Check Point Software Technologies, Palo Alto Networks, McAfee, Symantec, Trend Micro, VMware Carbon Black, and CrowdStrike.


This infographic presents a brief overview of the research, and highlights the key topics discussed in it.

Table of Contents

Executive Summary

  • Key Findings
  • Key Findings (continued)

Market Definitions-Cloud Workload and Cloud Applications

  • What is a Cloud Workload?
  • The Rise of Public Cloud Workloads
  • Workloads in the Cloud
  • Typical Workloads in the Hybrid Cloud
  • Typical Workloads in the Hybrid Cloud (continued)

Mounting Risks and the Failure of Legacy Security Approaches

  • Mounting Risks to Data Security
  • The Shared-Responsibility Security Model
  • The Failure of Legacy Security Tools
  • The Failure of Legacy Security Tools (continued)
  • The Failure of Legacy Security Tools (continued)

Key Requirements for Cloud Workload Protection

  • Key Requirements for Cloud Workload Protection
  • Key Requirements for Cloud Workload Protection--Failure of Legacy Security Tools
  • Key Requirements for Cloud Workload Protection--Failure of Legacy Security Tools (continued)
  • What is Cloud Workload Protection (CWP)?
  • Cloud Workload Protection Architecture
  • CWP Architecture-Agent-based, Agent-less or API-based, and Hybrid
  • Hybrid Monitoring and Protection Model
  • Cloud Workload Protection Layers
  • Cloud Workload Protection Layers (continued)
  • Cloud Workload Protection Layers (continued)
  • Cloud Workload Protection Layers (continued)

Cloud Workload Protection Market Landscape

  • Market Landscape

Top Cloud Workload Protection by Cloud Service Providers (CSP)

  • Cloud Workload Protection by Amazon Web Services (AWS)
  • Cloud Workload Protection by Google Cloud
  • Cloud Workload Protection by Microsoft Azure
  • Cloud Workload Protection by IBM Cloud
  • Cloud Workload Protection by Oracle
  • Cloud Workload Protection by VMware
  • Cloud Service Providers Key Capability Comparison

Top Cloud Workload Protection Platforms by Security Vendors

  • Vendor Profiling-Cisco Systems
  • Vendor Profiling-Check Point Software Technologies
  • Vendor Profiling-McAfee
  • Vendor Profiling-Palo Alto Networks
  • Vendor Profiling-Symantec
  • Vendor Profiling-Trend Micro
  • Vendor Profiling-VMware (Carbon Black)
  • Vendor Profiling-Crowdstrike
  • Vendor Key Capability Comparison

Growth Opportunities and Companies to Action

  • Transformation in CWP Ecosystem
  • Growth Opportunity 1-Market Education Essential at Early Stage Along with Collaboration with Local CSPs
  • Growth Opportunity 2-Increasing Need for Managed CWP Services
  • Growth Opportunity 3-Foresee More Threat Intelligence Service Integration
  • Growth Opportunity 4-Need for DevSecOps and Security Training
  • Strategic Imperatives for Success and Growth

The Last Word

  • The Last Word
  • Legal Disclaimer


  • List of Exhibits

The Frost & Sullivan Story

  • The Frost & Sullivan Story
  • Value Proposition: Future of Your Company & Career
  • Global Perspective
  • Industry Convergence
  • 360º Research Perspective
  • Implementation Excellence
  • Our Blue Ocean Strategy