Table of Content
Table of Contents
Executive Summary
Key Findings
Key Findings (continued)
Market Definitions—Cloud Workload and Cloud Applications
What is a Cloud Workload?
The Rise of Public Cloud Workloads
Workloads in the Cloud
Typical Workloads in the Hybrid Cloud
Typical Workloads in the Hybrid Cloud (continued)
Mounting Risks and the Failure of Legacy Security Approaches
Mounting Risks to Data Security
The Shared-Responsibility Security Model
The Failure of Legacy Security Tools
The Failure of Legacy Security Tools (continued)
The Failure of Legacy Security Tools (continued)
Key Requirements for Cloud Workload Protection
Key Requirements for Cloud Workload Protection
Key Requirements for Cloud Workload Protection––Failure of Legacy Security Tools
Key Requirements for Cloud Workload Protection––Failure of Legacy Security Tools (continued)
What is Cloud Workload Protection (CWP)?
Cloud Workload Protection Architecture
CWP Architecture—Agent-based, Agent-less or API-based, and Hybrid
Hybrid Monitoring and Protection Model
Cloud Workload Protection Layers
Cloud Workload Protection Layers (continued)
Cloud Workload Protection Layers (continued)
Cloud Workload Protection Layers (continued)
Cloud Workload Protection Market Landscape
Market Landscape
Top Cloud Workload Protection by Cloud Service Providers (CSP)
Cloud Workload Protection by Amazon Web Services (AWS)
Cloud Workload Protection by Google Cloud
Cloud Workload Protection by Microsoft Azure
Cloud Workload Protection by IBM Cloud
Cloud Workload Protection by Oracle
Cloud Workload Protection by VMware
Cloud Service Providers Key Capability Comparison
Top Cloud Workload Protection Platforms by Security Vendors
Vendor Profiling—Cisco Systems
Vendor Profiling—Check Point Software Technologies
Vendor Profiling—McAfee
Vendor Profiling—Palo Alto Networks
Vendor Profiling—Symantec
Vendor Profiling—Trend Micro
Vendor Profiling—VMware (Carbon Black)
Vendor Profiling—Crowdstrike
Vendor Key Capability Comparison
Growth Opportunities and Companies to Action
Transformation in CWP Ecosystem
Growth Opportunity 1—Market Education Essential at Early Stage Along with Collaboration with Local CSPs
Growth Opportunity 2—Increasing Need for Managed CWP Services
Growth Opportunity 3—Foresee More Threat Intelligence Service Integration
Growth Opportunity 4—Need for DevSecOps and Security Training
Strategic Imperatives for Success and Growth
The Last Word
The Last Word
Legal Disclaimer
Appendix
List of Exhibit