Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Mastering security in a multi-cloud world: “If you can’t see it, you can’t secure it”

Aviatrix CTO Anirban Sengupta shares his insights on overcoming the toughest challenges of multi-cloud environments. Explore how enterprises can simplify Kubernetes management, strengthen observability, and build a secure foundation for future innovation.

byElena Poughia
March 24, 2025
in Conversations, Cybersecurity
Home Conversations

The rapid adoption of multi-cloud strategies has dramatically reshaped enterprise IT infrastructures. Organizations now regularly employ multiple cloud service providers (CSPs), hybrid clouds, and edge computing environments, driven by a quest for cost efficiency, performance optimization, and enhanced resilience.

Dataconomy has sat down and talked to Anirban Sengupta, CTO and SVP of Engineering at Aviatrix, who highlights that enterprises today are inherently multi-cloud. “Every large enterprise customer is multi-cloud,” Sengupta states, emphasizing that the “best-of-breed solutions” often dictate such diverse infrastructure strategies.

However, with increased flexibility comes heightened security concerns. Sengupta stresses that robust security is paramount, especially considering today’s threat landscape, where enterprises face sophisticated attacks, including those sponsored by nation-states. He argues that enterprises should proactively invest in security infrastructure rather than viewing it as an afterthought. “Security is the fundamental need at this point. It is not just bad actors, but nation-states sponsoring these actors,” Sengupta notes, underscoring the urgency of comprehensive security measures.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

Agentic AI amplifies networking challenges

The emergence of generative and agentic AI applications has compounded networking complexities. These new applications are inherently multi-cloud, often spreading workloads across multiple cloud platforms, data locations, and AI model sites. Sengupta describes this complexity clearly: “Data is somewhere, the models are somewhere else, the applications are somewhere else, and the agents could be tens of thousands or even millions, running everywhere.” The need for secure, distributed connectivity thus becomes critical, making reliable multi-cloud networking essential for businesses investing in cutting-edge AI technologies.

Reflecting on his experience at Google Cloud Platform (GCP), Sengupta contrasts previous networking challenges with today’s landscape. While Google excels in connecting its own data centers internally, enterprise needs have evolved. Today’s enterprises require seamless and secure connectivity across diverse CSPs, edge environments, colocation centers, and infrastructure providers like Equinix and Megaport. Sengupta identifies a significant gap in addressing secure multi-cloud connectivity and Kubernetes network integration: “CSPs like Google are not investing enough in secure connectivity across multiple clouds and hybrid environments.”

A notable pain point that Sengupta observed at Google Kubernetes Engine (GKE) revolves around Kubernetes’ dynamic, ephemeral nature and related network security issues, such as IP exhaustion and firewall complexities. Kubernetes demands extensive IP addresses and frequently recycles them, complicating security measures. “Kubernetes is IP address hungry and extremely dynamic, making it hard to implement effective security and firewall rules,” Sengupta explains. Aviatrix addresses this with their new Kubernetes firewall solution, specifically designed to mitigate these networking security challenges and streamline operations.

Observability as the foundation of security

Observability, according to Sengupta, forms the cornerstone of effective multi-cloud security. “If you can’t see it, you can’t secure it,” he asserts. Aviatrix provides comprehensive observability through a unified control plane that simplifies multi-cloud management, security monitoring, and operational oversight. The Aviatrix platform, Sengupta describes, includes a distributed control plane running across all clouds, on-premises, and edge environments, alongside a data plane handling connectivity, security, and firewall management directly within packet paths. This approach significantly reduces latency and operational complexity.

Sengupta advises enterprises to embrace multi-cloud realities proactively. He made three critical recommendations: adopting and strategically planning multi-cloud and hybrid infrastructures, investing significantly in networking and security infrastructure, and empowering developers with tools to innovate securely at speed. He concludes, “Enabling developers to deploy applications with high velocity while maintaining security, governance, and compliance is essential.”

As enterprises navigate increasingly complex cloud landscapes, Sengupta’s insights serve as a vital roadmap, highlighting the importance of holistic security strategies, comprehensive observability, and robust multi-cloud networking solutions to power the future of enterprise IT.

Tags: Featured

Related Posts

Steps to building resilient cybersecurity frameworks

Steps to building resilient cybersecurity frameworks

September 18, 2025
CrowdStrike and Meta launch open-source CyberSOCEval benchmark to test AI cybersecurity models

CrowdStrike and Meta launch open-source CyberSOCEval benchmark to test AI cybersecurity models

September 16, 2025
Shiny Hunters breach Kering, exposing 7.4M Gucci, Balenciaga, and Alexander McQueen customer records

Shiny Hunters breach Kering, exposing 7.4M Gucci, Balenciaga, and Alexander McQueen customer records

September 16, 2025
Apple opens 2026 SRD program for iOS security research

Apple opens 2026 SRD program for iOS security research

September 16, 2025
Gmail hit by AI prompt injection attack via calendar

Gmail hit by AI prompt injection attack via calendar

September 15, 2025
FreeVPN.one Chrome extension stole user screenshots

FreeVPN.one Chrome extension stole user screenshots

September 15, 2025

LATEST NEWS

Meta unveils Ray-Ban Meta Display smart glasses with augmented reality at Meta Connect 2025

Google’s Gemini AI achieves gold medal in prestigious ICPC coding competition, outperforming most human teams

Leveraging AI to transform data visualizations into engaging presentations

Steps to building resilient cybersecurity frameworks

DJI Mini 5 Pro launches with a 1-inch sensor but skips official US release

Google launches Gemini Canvas AI no-code platform

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.