Select Page

We think it is an honor for Hillstone Networks to be included in 2022 Gartner “Emerging Technologies: Adoption Growth Insights for Cloud Workload Protection Platforms” report. 

Gartner Report Key Takeaways

  • The adoption of cloud-native services has led to a change in adoption of cloud workload protection platforms and adjacent capabilities.
  • The government sector has the most interest in cloud workload protection platforms. However, other highly regulated industries like finance, healthcare, energy and utilities have substantial mind share and adoption interest.
  • Technical staff are often the main buyer personas and need to understand the differences in CWPP functionality in addressing diverse cloud workloads that require technical proficiency of the cloud-native ecosystem such as managed Kubernetes service and serverless functions.
  • CWPP product leaders should attract technical buyers by differentiating on capabilities that will meet technical requirements like cloud workload-type coverage from containers to serverless functions, nonfunctional requirements like deployment strategies, and alignment with CNAPPs.

Hillstone CloudArmour

Hillstone’s CWPP solution CloudArmour aids large corporations in the fight against cloud-based threats. CloudArmour allows users to see all their cloud workloads, understand how assets and network traffic interact with each other, and allows users to act intelligently via a smart policy assistant and various policy configuration capabilities. This results in a cyber-resilient cloud scheme that’ll work, and be able to endure agile unknown threats in the cloud space. CloudArmour additionally addresses potential gaps in skill sets in cloud security. By following the simple methodology of seeing assets, understanding their relation and purpose, and acting appropriately to mitigate vulnerabilities, CloudArmour lowers the level of technical aptitude needed to enforce security in cloud-native ecosystems. CloudArmour delivers full and deep visibility and security for all converged cloud workloads, ensuring the integrity of your investments in the cloud.

*Gartner, “Emerging Technologies: Adoption Growth Insights for Cloud Workload Protection Platforms”, Mark Wah, 5 April 2022.

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

About Hillstone Networks

Hillstone Networks’ innovative and accessible cybersecurity solutions reshape enterprise and service provider security, enabling cyber resilience while lowering TCO. Providing comprehensive visibility, superior intelligence and rapid protection to see, understand, and act against cyberthreats from edge to cloud, Hillstone is favorably rated by leading analysts and trusted by global companies.

Learn more about Hillstone CloudArmour to start a conversation with us on how to help you address your security needs as your enterprise continues to embrace the cloud. 

iSource V2.0R7: Immediately Experience Security that Works

Breaking the Mold: Halting a Hacker’s Code ep. 4 – Black Basta

Inhibit Application Threats (OWASP) with Hillstone WAF V3.0

OT and IoT security will be a topic of concern

Breaking the Mold: Halting a Hacker’s Code ep. 3

Simplify and Virtualize Your SD-WAN Implementation with HSM V5.2

Breaking the Mold: Halting a Hacker’s Code ep. 2 – F5 BIG-IP

Getting from ‘Good Enough’ to Great in Cybersecurity

Hillstone Networks sBDS Included in 2021 Gartner® Emerging Trends: Top Use Cases for Network Detection and Response