New Era, New Security Stack: Cloud Security Reimagined

Dror Arie Head of Engineering @ GlobalDots
3 Min read

Once every few years, new technologies mature and reach a tipping point which requires a completely new outlook on the enterprise landscape, as it keeps evolving too. 2020 was such a tipping point, introducing cloud usage and remote work in unprecedented scales worldwide. In the context of cloud security, this tipping point created a burning need for what we call “the new security stack”: 5 technology solutions to protect your business’ most valuable & sensitive environments, assets, and processes.

What’s in the new security stack?

  • Identity & Access Management (IAM) — Seamlessly authenticate all remote interactions with business applications with adaptive MFA (Multi-Factor Authentication) and SSO (Single Sign-On). Plus, eliminate all manual work related to passwords and permissions:, to fully-automated employee onboarding, offboarding and role change provisioning to enable quick growth. 
  • Zero Trust Access Governance — Secure the environment where employee-application interactions occur by letting only authorized transactions through. Minimize attack surface by enforcing authentication and authorization for employees and limit their access to enterprise resources based on the least privilege principle.
  • Open Source Security — Monitor and detect open-source dependencies in your code, flag and remediate vulnerabilities — all prior to production. Allow your developers to speed up coding using open source repositories, with no pigs-in-a-poke. 
  • Cloud Workload Protection — Auto-detect & eliminate excessive permissions and misconfigurations in your public cloud workload. Block and correlate suspicious access attempts to sensitive data and exfiltrate it from the cloud. Reduce toil with automated hardening and prioritized alerts.
  • End-to-End Compliance Platform — Simplify security audits and controls with one place to manage all security compliance checklists, and automate evidence collection from other business applications – Whether you’re an enterprise, a public organization, a B2B vendor, or a B2C company handling user PII.

How to ensure your stack is up-to-date and future proof?

Today’s enterprise security solutions should have a few traits to be part of this new security stack:

How One AI-Driven Media Platform Cut EBS Costs for AWS ASGs by 48%

How One AI-Driven Media Platform Cut EBS Costs for AWS ASGs by 48%
  • SaaS Consumption Model — No more hardware-based appliances you need to plan and pay for years in advance. The ability to scale your usage up or down and pay for what you use is crucial in today’s rapidly changing reality. Automatic updates to the solution, (ensure a solution is always up-to-date) closing the consumption gap by inheriting the new features of each update.
  • DevOps & Integrations — The ability to integrate with existing tools and components within the company’s IT / DevOps environment: communication & collaboration apps (Slack), centralized monitoring / SIEM (Sumo Logic), API interface to make configuration changes or view reports, Active Directory, GSuite / Office365, HR Systems and other enterprise apps. No more UI-only based solutions you must manage from dedicated interfaces. Born in the cloud and originally designed for cloud environments — not converted. 
  • Noise-Free Alerts & Remediation — The ability to learn the company’s normal patterns and alert / act only on highly suspicious, true positive anomalies. Solutions that have AI or ML capabilities, using big data to determine which activities are malicious and require intervention, and in what priority.
  • Compliance Assistance — Using security solutions that enable compliance with the common security standards such as PCI-DSS, ISO-27001, SOC2, etc. By implementing them, companies can achieve security compliance faster with fewer efforts involved.


Cybersecurity threats grow at a rapid pace as new technologies emerge. CIOs and CISOs are in a constant race to beat the bad actors and deploy the best in class security solutions. Make sure you evaluate new security solutions based on the traits above, consult with cybersecurity partners that deal with these challenges on a daily basis, in order to get you to be protected, not just covered in the 4 areas described in this post.

Contact us to update your security stack for today’s business challenges and cybercrime threats.

Latest Articles

A Real-Life Guide to a Successful Cloud Strategy

Welcome to the Cloud Strategy Guide by GlobalDots, the ultimate practical guide for Cloud adoption and Cloud computing future. Our guide is designed to help you plan your Cloud roadmap, implement best practices for Cloud security, and execute effective Cloud migration strategies, including lift and shift migration strategy, cloud migration patterns, and migration hub strategy […]

Nesh (Steven Puddephatt) Senior Solutions Engineer @ GlobalDots
4th January, 2023
An expert’s analysis of the future of cybersecurity

We Live to Build Podcast episode #102 features Dr. Eduardo Rocha, Senior Solutions Engineer & Security Analyst at GlobalDots, discussing DDos Attacks, SQL injections, False Positives, False Negatives, Zero-Day exploits, Scraping, Biometric Authentication, and much more. Watch the full interview: How One AI-Driven Media Platform Cut EBS Costs for AWS ASGs by 48% Read Now Or […]

Dr. Eduardo Rocha Senior Solutions Engineer & Security Analyst @ GlobalDots
22nd June, 2022
Finally, Resource Optimization Hits Deep Learning: AI-Driven GPU Orchestration

Introduction With the rise of artificial intelligence (AI), more and more businesses are looking to incorporate its capabilities into their systems. However, doing so can be difficult, particularly in GPU orchestration. GPUs are the heart of many computer systems. They can handle much of the heavy lifting required for complex calculations, such as gaming and […]

Snir Ambar Head of AI & Innovation @ GlobalDots
10th April, 2022

Unlock Your Cloud Potential

Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.

Unlock Your Cloud Potential