The following are excerpts from an interview with Wong IK Ming, Director, eSURIA MENTARI SYSTEMS SDN BHD.
From halfway around the globe in fabulous Singapore, I was delighted to have the chance to interview Wong IK Ming, a Cisco Certified Partner covering Southeast Asian nations, to get his perspectives on data center security opportunities.
Tell me about your customers. What are their most pressing problems?
eSURIA caters mostly for the public sector but we are now extending our services to include Oil and Energy. Our customers have to adhere to new and emerging government mandates around data privacy and sovereignty. This requires a combination of strong governance processes mapped to sound technical controls and a design that is future proof, for example ensuring unified policy, dynamic and logical segmentation. Security must be thought out from the beginning—from the application to the edge of the cloud. I’ve seen a couple of instances of community clouds where security has not been thought through and it’s a matter of time before a security incident occurs.
As a partner, what benefits do you see for Cisco’s approach to data center security?
Our customers are fast adopting new infrastructure models and having the Cisco Validated Designs is a huge benefit because it enables us to attest to the technical soundness of the overall solution and to present security as an integrated element as opposed to a separate element. It also enables us to build these into the overall services templates that we provide with confidence that the necessary testing has taken place. I look forward to seeing more of these validated designs. For example, a validated security blueprint for Microsoft private cloud applications with Cisco UCS.
What do you see as the next wave of data center security requirements?
While VMware infrastructure models continue to dominate, Microsoft Hyper-V 3 is starting to look more enterprise ready than previous versions, and it’s low cost. I’m watching with interest to see how many of our customers will start utilizing Microsoft Hyper-V and what unique security challenges it will pose.