Note: This is the final post in a six-part series on public cloud security. You can follow the entire series here.
What does this alphabet soup mean to you? The first takeaway is that once you begin leveraging the cloud in an impactful way (multiple workloads, native cloud applications, etc.) you will need to look beyond perimeter security. There are a number of solutions to consider, from those which look for threats and threat potentials (SIEM tools) to those that establish a security posture (CSPM tools). And there is the intermediary step, workload protection (CWPP). Which do you need?
Rich is the Product Marketing Manager, Information Management. He's been with Barracuda since the acquisition of C2C Systems in 2014. Rich specializes in cloud-deployed solutions, information management, and archiving systems. His experience includes extensive work on OEM opportunities and the legal community.
You can email Rich at email@example.com.