{"id":111522,"date":"2020-05-15T06:00:28","date_gmt":"2020-05-15T13:00:28","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=111522"},"modified":"2023-09-08T05:55:31","modified_gmt":"2023-09-08T12:55:31","slug":"cloud-2020-guide-cloud-workload-protection-2","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2020\/05\/cloud-2020-guide-cloud-workload-protection-2\/","title":{"rendered":"2021 Gartner Market Guide for CWPP: Key Takeaways"},"content":{"rendered":"<p><span style=\"font-size: 10pt;\"><em>Updated July 16, 2021<\/em><\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cloud native development relies on workloads spread across any number of compute options \u2013 virtual machines (VMs), containers, serverless and many points in between. These components which make up cloud native applications can be created and spun down in a matter of hours or even minutes \u2013 they are surprisingly ephemeral.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Moreover, protecting these workloads can be difficult. Discovering when they have been created, determining who or what is accessing them and figuring out whether they are configured correctly is a monumental task not suited for manual security work. That's why the market has seen an influx of platforms specially designed to protect them. These so-called cloud workload protection platforms (CWPP) are evolving almost as quickly as the workloads themselves, and understanding key functionality can be overwhelming.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Gartner recently released its 2021 <\/span><i><span style=\"font-weight: 400;\">Market Guide for Cloud Workload Protection Platforms, <\/span><\/i><span style=\"font-weight: 400;\">which has annually examined the latest developments in cloud native infrastructure security and offered recommendations on how enterprises should protect these components and the continuum of compute options, including VMs, containers and serverless workloads.\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/start.paloaltonetworks.com\/gartner-market-guide-cwpp.html\"><span style=\"font-weight: 400;\">You can download a copy of the 2021 \u201cMarket Guide for Cloud Workload Protection Platforms\u201d to read in full<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Palo Alto Networks is proud to be included by Gartner as a Representative Vendor for CWPP.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">What Is a Cloud Workload?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">First, it may be helpful to understand what these platforms can actually protect. A workload can be broadly defined as the resources and processes needed to run an application. A cloud workload typically includes an application, but it also involves things like data served to and generated by the application, as well as network resources required to connect users to the application or to connect different parts of the application together.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Most organizations' workloads now typically span multiple cloud service providers (CSPs) and compute options, and a majority of organizations intentionally choose multiple types of infrastructure offerings based on business needs. <\/span><span style=\"font-weight: 400;\">According to Gartner, \u201cWorkload protection must span virtual machines, containers and serverless workloads in public and private clouds. Security and risk management leaders should use this Market Guide to understand the need for protection that spans development and runtime and includes cloud security posture management.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We've talked for a while now about how each infrastructure offering comes with individual configurations and security requirements, which we highlight in our whitepaper titled the <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/whitepapers\/continuum-cloud-native-topologies\"><span style=\"font-weight: 400;\">Continuum of Cloud Native Topologies<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">What Is a Cloud Workload Protection Platform?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Second, Gartner defines cloud workload protection platforms (CWPP) as \"workload-centric security products that protect server workloads in hybrid, multicloud data center environments.\" Or as we simply say, these platforms help enterprises protect workloads. They also offer greater visibility and control over them, regardless of their location.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These platforms need to help security leaders continuously assess risk across cloud native architectures and identify vulnerabilities and misconfigurations before deployment to runtime to minimize runtime problems. These platforms span CSPs to provide greater assurance with less manual effort.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">Protection Needs to Span the Entire Application Lifecycle From Build to Runtime<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">We've seen that the diffusion of DevOps methodologies has led to the increasing granularity of workloads. DevOps intentionally uses small, frequent iterations, where deployments happen multiple times a week or even multiple times a day.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In order to protect these increasingly ephemeral workloads, security and risk management leaders need to understand what workloads are running where, and Cloud Workload Protection Platforms help them do that.\u00a0<\/span><\/p>\n<p><div style=\"max-width:100%\" data-width=\"1146\"><span class=\"ar-custom\" style=\"padding-bottom:62.83%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-138388 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/05\/CWPP-figure-1.png\" alt=\"Cloud Workload Protection Platforms involve Development Scanning (covering vulnerable components, cloud configuration, secrets, malware and API discovery) and runtime protection (covering workload vulnerability, workload configuration, workload segmentation, integrity monitoring, application control, behavioral monitoring, host IPS and anti-malware). The graphic shows how this allows DevOps to maintain consistent visibility and control, including over bare metal, VMs, containers, serverless, on-premises, colocation, AWS, Azure, Alibaba Cloud, Tencent, GCP and Kubernetes. Source: Gartner. \" width=\"1146\" height=\"720\" \/><\/span><\/div><\/p>\n<p><span style=\"font-weight: 400;\">Security controls need to support public, private and hybrid clouds, while also combining full stack runtime protection with integrated DevOps security. These capabilities include vulnerability management, compliance, runtime protection and application control, and other key security controls highlighted by Gartner.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Recommendations for Security and Risk Management Professionals<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">The report highlights key recommendations organizations should consider for securing their cloud infrastructure. Palo Alto Networks has chosen to emphasize the following for a full lifecycle, full stack security approach: <\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Implement a CWPP offering that protects workloads regardless of location, size, runtime duration or application architecture.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Secure workloads earlier by extending workload scanning and compliance efforts into development (DevSecOps), especially for container-based and serverless function platform as a service (PaaS)-based development and deployment.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Consolidate CWPP and CSPM strategies over the next 12 to 24 months to reduce costs and complexity and identify risks better.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">As an integrated Cloud Native Security Platform, we believe Prisma Cloud aligns strongly to this consolidation trend across CSPM and CWPP.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To read the report in full, including further in-depth exploration of these best practices and recommendations, download your copy of \u201c<\/span><a href=\"https:\/\/start.paloaltonetworks.com\/gartner-market-guide-cwpp.html\"><span style=\"font-weight: 400;\">Market Guide for Cloud Workload Protection Platforms<\/span><\/a><span style=\"font-weight: 400;\">.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400; font-size: 10pt;\">Gartner, Market Guide for Cloud Workload Protection Platforms, Neil MacDonald, Tom Croll, 12 July 2021<\/span><\/p>\n<p><span style=\"font-weight: 400; font-size: 10pt;\">Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.<\/span><\/p>\n<p><span style=\"font-size: 10pt;\"><span style=\"font-weight: 400;\">This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from <\/span><a href=\"https:\/\/start.paloaltonetworks.com\/gartner-market-guide-cwpp.html\"><span style=\"font-weight: 400;\">https:\/\/start.paloaltonetworks.com\/gartner-market-guide-cwpp.html<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the new Market Guide for Cloud Workload Protection Platforms, Gartner explores recent trends in CWPP. Read our assessment of key takeaways. <\/p>\n","protected":false},"author":689,"featured_media":138401,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[308,6717],"tags":[7093,117,7106],"coauthors":[6882,7101],"class_list":["post-111522","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-announcement","category-products-and-services","tag-cnapp","tag-gartner","tag-workload-protection","cloud_sec_category-cloud-workload-protection-platform"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/05\/Woman-Smiling-3.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/111522","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/689"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=111522"}],"version-history":[{"count":4,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/111522\/revisions"}],"predecessor-version":[{"id":138414,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/111522\/revisions\/138414"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/138401"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=111522"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=111522"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=111522"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=111522"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}