Conf42 Observability 2025 - Online

- premiere 5PM GMT

Next-Gen Cloud: Enabling Secure and Seamless Cross-Platform Integration for Enterprise Transformation

Video size:

Abstract

Discover how AI-driven platforms, confidential computing, zero trust, and event-driven architectures are revolutionizing multi-cloud security—reducing attacks by 85% while boosting integration efficiency by 42%. Real solutions for real results

Summary

Transcript

This transcript was autogenerated. To make changes, submit a PR.
Hello all. I'm Na Kala. I'm excited to talk to you today about how Cloud is evolving and also more importantly, how we can bring together different cloud platforms and make them work seamlessly and securely. We'll be discussing four main key points. In this presentation the first one is AI driven, API Management, followed by confidential computing, zero trust and event driven architectures. These are game changes for any of the industry that is already into multiple clouds or that is going to invest into multiple clouds. Moving on to the very first slide, multi-cloud reality. 94% of enterprises use multi-cloud platforms. They'll be using AWS Azure or Google Cloud to leverage specific capabilities. The advantage is that vendor lockin is totally avoided, but the cons is that, integration issues exist because the by the data communication to and fro between the systems needs some effective and comprehensive integration strategy. And mostly will be facing data synchronization hurdles, which will lead to implementation delays and also, which will lead to budget overruns. And also there'll be many issues. With security policies because each cloud will come with its own security and we need to create a unified security policy that can be used to overcome any of the issues. Okay. Moving on to the second slide. Benefits of effective cloud integration. So as long as we have a comprehensive integration strategy, the deployment rate will be faster and we can see 30 to 40% of improvement. And also there'll be grade agility. Agility is directly proportional to marketer around or business turn turnaround because we will build and, deployed things faster, so that will give a positive impact to the whole business. And also resilience, especially during service interruptions will be benefited. I identified few of the integration complexity challenges that will be commonly faced. One thing the main thing is that with each cloud edition the integration complexity will be increased by at least 70%. And also each cloud will have different security models. AWS will have its own model and Google Cloud will have its own model. We have to make sure that the security policies is correctly, are correctly laid as discussed before. And also there'll be a lot of inconsistencies with the a p structures and authentication and authorization mechanisms. And also there'll be differences between data formats and storage mechanisms. AI driven API management platforms. There are mainly efficiency gains and governance benefits, and this is not a traditional approach. This is AI driven, so the bugs will be decreased. And also the overall, implementation time will be cut down and there'll be several other benefits for few of the benefits are identified and written here. So reduction in API design improvement in overall API, usability metrics and also reduction in MA manual documentation. Efforts and benefits are mostly related to performance optimizations and also related to compliance and security. So we can see policy violations reduction, compliance verification, time improvement, and then latency through traffic optimization reduction and also resource provisioning. Costs will get reduced. And moving on to the next slide enhanced security through AI driven a BI management. So there are in this chart. The dark color ones are a traditional approach, and the lighter color ones the green the bright green ones belong to ai, a approach or AI enhanced approach. So have the they will be reduction in false positive rate and also exploitation reduction. So we'll be able to, du reduce exploitation by detecting them early and also attack detection will be showing a positive impact when we go with AI models. So overall on an average 78.3 successful exploitation effort attempt. And then, machine learning models can detect up to 93% of API based attacks while maintaining false positive rates below 4%. So AI driven is more secure and also it'll mitigate more protection vulnerabilities before even the exploitation items are occurred. And before even the traditional methods or traditional strategies kick in, AI will take care of most of them. And confidential computing. So confidential computing mostly rotates around the concept of half data is secured. So data, when data is in use, AI models will secure it even more even more in a better way. When I mean in use, it's nothing but being in transit, but data at rest. We will be predicting it either based using traditional or security model. So traditional or AI based security model. So data addressed, sophisticated encryption algorithms, protect store data from unauthorized access and data in transit. T-L-S-S-S. S SL protocols and encrypted channel safeguard data during transmission and data in use. Hardware based ttes create secure enclaves. That product data during computation and complete protection, comprehensive security framework ensures data remains encrypted throughout its entire lifecycle. These specialized enclaves whatever we are discussing about, especially for data in use or for TES maintain encryption during during active computational process, creating a secure, isolated environment that. Prevents otherized access. So even for users or system administrators or cloud service themselves will not have access. So this is more secure and confidential computing performance breakthrough. So it is 33 times more fast. Organizations implementing confidential computing for analytics and their AI workloads have reported up to 33 x fast. Processing and hardware enforced security. The tes Predict application from attacks with privileged system access, effectively mitigating threats from any of the administrators, hypervisors BIOS and OS and other operating systems. Expanded capabilities also exist. So Intel's third SGX implementations have expanded secure memory capacity from 1 28 MB 2 5 12 gb dramatically increasing the scope of workloads that benefit from hardware based protection. Industry applications of confidential computing healthcare, definitely healthcare organizations can securely process a PHI in the cloud while maintaining HIPAA con compliance. Enabling advanced analytics on patient data by disclosing all the sensitive in information and financial services. Like financial institutions can perform complex analytics. And research collaboration. Federated learning frameworks allow multiple organizations to collectively train AI models on their combined data sets while mathematically guaranteeing that no party can access the original data from other participants. Zero trust architecture. So never trust, always verify. Zero trust architecture principle is that it will. Require a continuous authentication and authorization of all entities regardless of their location or network connection. So least privilege access will be enforced here. So minimum necessary permissions and then isolated network zones by workload. And also it'll calculate all the real time behavior analytics. And then we, it'll have lot of identity verification principles, like advanced authentication frameworks and also custom authentication frameworks that can be used. So this approach replaces all the traditional security with a model that is Zooms breach and verifies each request as though it originates from untrusted network. It continuously keeps pinging us and verifying us which is great. This is definitely having a lot of impact. And pros on every everybody's business. Organization implementations experience of frameworks, experience 43% reduction in successful network introductions, 37% reduction in security incident response costs, and 29% decrease in overall security management overhead. And also advanced authentication frameworks reported a 92% success rate in pre preventing credential based attacks. While organizations employing real time behavior analytics detected suspicious activities, 73% faster than those using periodic security scanning approaches, event driven architectures for real time integrations. So event driven architectures mostly, or rotate around using system bus and using subscribers, publishers, and making the tasks even more fast and easier. So even generation system changes trigger events and routes them to subscribers and subscribers React to the events. Also there'll be state synchronization where system will maintain consistency across all the services and keep updating the right data and also getting the right data. Even architecture is loosely coupled. It supports real time data synchronization across drivers cloud environments. So whenever there is a change, immediately through through the bus, you can kick off the change. Organizations imple implementing EDA frameworks experience a 58% reduction in data integr integrated latency compared to traditional scheduled batch processing approaches. Just a second. Yep. And the performance metrics I gave few of the performance metrics in the slide. So what is the latency reduction and how many events will we processed per second message delivery guarantee, responsiveness increase, incident reduction maintenance cost reduction. So this architectural approach allows organizations to build responsive systems that immediately react to business events as they occur. I would say this is more proactive in nature and it'll be very much helpful for industries to use them as their real time or near near real time most of the time. Financial services industrial, IOD and global Enterprises are heavily using all the EDI architectures. And then for financial services, 63% faster. An anomaly detection for production for potential fraud scenarios and industrial iot. There is a 88% improvement in real time processing capability, enabling monitoring systems to process data from over 25,000 sensors with a sub-second response time. And also for the Global Enterprises, there is a 71% reduction in cross-regional data inconsistencies while using EDA, which is really great. And overall the future of the secure platform integration is all the four aspects that we have discussed right now. We have to create a framework in such a way that all of these, at all of these key points that we have covered are balanced in each and every strategy that we come up for the organization. So as organization continues their digital transformational journeys these approaches will become increasingly essential components of a strategic technology foundation. Thank you all. That's my take.
...

Naga Swetha Kattula

Senior Member @ IEEE

Naga Swetha Kattula's LinkedIn account



Join the community!

Learn for free, join the best tech learning community for a price of a pumpkin latte.

Annual
Monthly
Newsletter
$ 0 /mo

Event notifications, weekly newsletter

Delayed access to all content

Immediate access to Keynotes & Panels

Community
$ 8.34 /mo

Immediate access to all content

Courses, quizes & certificates

Community chats

Join the community (7 day free trial)