* [Blog](https://www.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www.paloaltonetworks.com/blog/corporate/) * [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/) * Scaling Security for Data... # Scaling Security for Data Center Transformation: COVID-19 Amplifies Trends [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2020%2F05%2Fnetwork-data-center-transformation%2F) [](https://twitter.com/share?text=Scaling+Security+for+Data+Center+Transformation%3A+COVID-19+Amplifies+Trends&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2020%2F05%2Fnetwork-data-center-transformation%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2020%2F05%2Fnetwork-data-center-transformation%2F&title=Scaling+Security+for+Data+Center+Transformation%3A+COVID-19+Amplifies+Trends&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www.paloaltonetworks.com/blog/2020/05/network-data-center-transformation/&ts=markdown) \[\](mailto:?subject=Scaling Security for Data Center Transformation: COVID-19 Amplifies Trends) Link copied By [Eric Hanselman](https://www.paloaltonetworks.com/blog/author/eric-hanselman/?ts=markdown "Posts by Eric Hanselman") May 06, 2020 5 minutes [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown) [Automation](https://www.paloaltonetworks.com/blog/tag/automation/?ts=markdown) [COVID-19](https://www.paloaltonetworks.com/blog/tag/covid-19/?ts=markdown) [data center](https://www.paloaltonetworks.com/blog/tag/data-center/?ts=markdown) [micro-segmentation](https://www.paloaltonetworks.com/blog/tag/micro-segmentation/?ts=markdown) [remote access](https://www.paloaltonetworks.com/blog/tag/remote-access/?ts=markdown) Data centers have been rapidly adopting new technologies as they race to increase efficiency and keep up with the pace of business transformation. This shift has only been amplified by the pressures created by the current pandemic. Many security teams were already straining, and this accelerated pace and scale can overwhelm them. To keep from holding their businesses back, security teams have to adapt as quickly as the rest of these environments are changing. The challenge is that traditional information security tools and practices have difficulty scaling to match the velocity that technologies like containers and cloud can achieve. Organizations that can't keep up risk leaving unintentional gaps in protection or becoming less competitive. Fortunately, there are techniques that organizations can use today to leverage security teams' existing skills and capabilities and accelerate security operations. The main challenge that a security team faces is [adapting to the push to new environments](https://www.paloaltonetworks.com/blog/2019/12/network-data-center/?ts=markdown). This includes the shift to cloud and off-premises resources. As a consequence of these changes, a security team often has to deal with the increasing adoption of workload orchestration tools and the shorter provisioning cycles driven by concepts such as software-defined infrastructure. The move to virtualization started this cycle, but changing application architectures and application-development techniques are fueling demands to create supporting infrastructure faster and to push it closer to users, many of whom are now suddenly working remotely. Shorter software-development cycle patterns, like agile methods and DevOps, depend on resources that can be put to use quickly and torn down at the same rate. Container-based infrastructure approaches escalate these trends with smaller units of capacity and dramatically shorter lifetimes. The amount of work required to secure these environments using traditional methods means that many security teams simply can't support either their speed or scale. Far too much of traditional security operations is hampered by manual interventions or hand-offs. There are additional complexities in trying to extend traditional security approaches to cloud. It's no wonder that a 451 Research Voice of the Enterprise (VotE) Digital Pulse study in 2019 found that data protection and security concerns led the list of workload-related challenges by a wide margin. ![Data protection and security was rated the most important workload-related problem in a 451 Research Voice of the Enterprise Digital Pulse study related to data center transformation. 60% of respondents report it as a leading challenge.](https://www.paloaltonetworks.com/blog/wp-content/uploads/2020/05/Dataprotection.png) Source: 451 Research Voice of the Enterprise (VotE) Digital Pulse study, 2019 All these changes are taking place while there's a chronic shortage of information-security professionals. To succeed, organizations have to realize that they can't hire their way out of this problem. The competition for talent is going to continue -- especially in areas that are key to data center transformation. A 451 Research VotE study on information security in 2019 reported cloud platform expertise as the leading security skills gap. Both these trends have been exacerbated by the recent changes in the world due to the pandemic. The combination of these factors mean that organizations have to look to other ways to succeed. ## Simplify and Standardize To keep security from becoming a bottleneck in the production pipeline, teams need to do two main things -- simplify and standardize operations. They can take a page from the DevOps playbook without having to radically change their security posture. To start, they should take advantage of the automation capabilities that are often already available in their existing tools. [Automation is a force multiplier for security teams](https://www.paloaltonetworks.com/blog/2020/01/cortex-secops-strategies/?ts=markdown) and can be integrated into infrastructure provisioning. Integration into the orchestration of infrastructure can come in a number of forms. For automation to be most effective, [policies must be standardized](https://www.paloaltonetworks.com/blog/2019/12/network-data-center-security/?ts=markdown) and a consistent set of controls put into place to enforce them. It can be tempting to customize native controls in different environments, but the effort required to maintain them can destroy any efficiency and complicate automation efforts. Much less maintenance work is required when the same controls can extend consistently across virtual machines, containers and clouds. The reduction in complexity has the added benefit of reducing the potential for error. With automation, security teams can scale their capacity to use the more effective workload isolation techniques that new application architectures require, such as [microsegmentation](https://www.paloaltonetworks.com/cyberpedia/what-is-microsegmentation?ts=markdown). Automation can ensure that the right protections are in place when a workload is built and can accomplish what would otherwise be a manual approval process. It takes coordination across teams to build agreement on policy, but that agreement makes greater speed possible. Coordination can be as simple as agreeing on a common definition for workload types and the protections that will be put in place. To ensure business success, information security teams have to put automation and operational simplification into practice and fully leverage their benefits. These changes will only become more important over time. A [451 Research study](https://www.spglobal.com/marketintelligence/en/news-insights/latest-news-headlines/coronavirus-forces-companies-to-consider-permanent-policies-culture-change-57743545) on the effects of the pandemic in April reported that 38% of enterprise respondents expect that workforce dislocation will be permanent. If that sentiment is correct, organizations will need to continue to operate infrastructure in more places and at greater pace. By making improvements to simplify and standardize operations, organizations can enable effective security protections that can scale to meet the pace at which a modern business needs to operate. They can drive the data center transformation process to create infrastructure that can be both fast and secure. This is the sort of infrastructure that can support the expanded and extended workforce of the future. You can read more about the role of [security in data center transformation](https://www.paloaltonetworks.com/resources/research/security-in-datacenter-transformation?ts=markdown). *This guest post was contributed by Eric Hanselman, chief analyst, 451 Research.* *** ** * ** *** ## Related Blogs ### [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown), [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown) [#### Power the New Normal with Prisma Access: Delivering Next-Gen Cybersecurity](https://www.paloaltonetworks.com/blog/2020/05/network-remote-work/) ### [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown), [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/sase/category/use-cases/?ts=markdown) [#### Working from Home During COVID-19: Secure Access for Remote Workers](https://www.paloaltonetworks.com/blog/2020/04/network-secure-access/) ### [Next-Generation Firewalls](https://www.paloaltonetworks.com/blog/network-security/category/next-generation-firewalls/?ts=markdown), [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown), [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown) [#### How DNS Security Helps Secure Your Remote Workforce](https://www.paloaltonetworks.com/blog/2020/04/network-dns-security/) ### [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown), [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown) [#### Securely Connect and Scale Remote Workforces](https://www.paloaltonetworks.com/blog/2020/03/cloud-securing-remote-workforces/) ### [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown), [Secure the Future](https://www.paloaltonetworks.com/blog/category/secure-the-future/?ts=markdown) [#### Forrester Study: The 2020 State of Security Operations](https://www.paloaltonetworks.com/blog/2020/09/state-of-security-operations/) ### [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown) [#### COVID-19: The Cybercrime Gold Rush of 2020](https://www.paloaltonetworks.com/blog/2020/07/unit-42-cybercrime-gold-rush/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language