From carbon-neutral clouds to net-zero data centers to completely renewable power, green technology is rapidly becoming a viable option for global corporations hoping to both improve long-term outlooks and align operations with changing consumer sentiment.

Consider current projects by companies such as Salesforce, Apple and Toyota. According to Greentech Media, Salesforce recently achieved net-zero carbon emissions, while Apple and Toyota installed massive solar power systems to offset existing power consumption. It’s no surprise that these and other enterprises are now looking for ways to implement environmentally responsible IT and deploy green security technology, but what does this look like in practice? How can corporations identify green solutions, and what are the downstream implications for businesses trying on the newest corporate color?

Greener Pastures

Cloud computing and multitenant data centers naturally lend themselves to environmental stewardship. As noted by ICT Footprint, moving from local stacks to the cloud typically increases server utilization from around 15 percent to 65, 75 or even 80 percent, depending on the cloud provider. This results in less time spent powering servers simply to hold data and, in turn, reduced overhead and environmental impact.

But it’s not quite that simple for green technology adopters. The energy required to power large-scale data centers is substantial, even if enterprises aren’t on the hook to pay the bill. New solutions are emerging to tackle this challenge, such as leveraging geolocation to maximize free energy. For example, data centers in Iceland can take advantage of year-round free cooling while the development of solar, wind and geothermal energy technologies helps limit dependence on coal-based electricity.

Long story short: While companies enjoy an obvious benefit from adopting cloud solutions by limiting their on-site power consumption, simply outsourcing energy requirements doesn’t guarantee environmental success.

Cloud Considerations

Cloud security technology is a hot market. According to Digital Journal, the cloud market will expand at a 12.80 compound annual growth rate (CAGR) to $11.8 billion by 2022. Such a pace isn’t entirely surprising. As cloud security vendors both specify and diversify, and as their offerings equal or outperform on-site solutions, it’s no longer cost-effective for chief information security officers (CISOs) to leverage local security tools.

But beyond simply adopting cloud and reaping the benefits of reduced energy consumption, what does green security tech look like in practice? Right now, there’s no standardization in this field. Any move from local stacks counts as a slightly green shift. However, it’s not hard to imagine the development of more specific green practices. Below are a few examples.

Software-Dependent Controls

While recent years have seen the development of hardware-based security boxes that offer on-site protection, these devices naturally carry more environmental impact than their software-defined counterparts. Expect a shift to lightweight, network-optimizing security controls as part of the green initiative.

Artificial Intelligence

AI is already being touted as one solution to people-heavy security issues, but there’s a secondary benefit to automation empowered by intelligent infrastructure: time. By reducing the amount of time and effort required for security experts to remediate security issues — therefore reducing their overall use of compute resources and power — companies come out both greener and more secure.

Reusable Resources

IT security is undergoing a fundamental shift. Experts recognize that it’s no longer enough to defend endpoints since the sheer number and type of endpoints makes this type of defense impossible, even as protection gurus such as Bill Burr speak out against long-held password rules that see users constantly changing their credentials using strings of nonsense characters. In a post-perfection world, where total security is an impossible outcome, expect to see a rise in reusable security resources that are designed to grow along with IT initiatives rather than be replaced by the next new product.

Barriers to Green Security Technology Adoption

So what’s stopping a wholesale green security technology revolution? Why aren’t more enterprises coloring outside the lines and using green support as a market differentiator?

There are two key obstacles. First is pressure from within the industry itself. As noted by The Verge, current trends center around convincing users and companies to buy more products more often rather than maintain or repair the devices they have.

Consider the iPhone, Apple’s most popular product and now a mainstay of corporate culture. The smartphone is designed to naturally resist repair. Its voided warranties, unibody designs and batteries hidden under layers of fragile components require users to visit authorized retailers or send their phones away for a fix, even as the company pushes its newest, latest and greatest gadget and offers discounts to users willing to hand over their current devices. Scale up the life cycle window slightly and the same logic applies to PCs, servers and networking technology: Enterprises are encouraged to replace rather than repair once technology is more than a few years old.

Companies must also consider budgetary, logistical and support concerns when moving to green security technology. These include:

  • Conversion expense: As noted by Chron, there’s a cost associated with switching to new power sources or adopting new green devices. While this often pays for itself over the long term, up-front spend can be daunting.
  • Varying prices: With a lack of standardization comes a lack of consistent pricing. What are green solutions worth? How much is too much? Companies need to do their research before making the move.
  • Support issues: Niche providers may not be able to offer the same level of support as entrenched tech offerings, meaning businesses must be prepared to meet usability and service challenges.
  • Washing out: Just as some cloud providers are little more than collocation data centers using the cloud moniker to drum up business, some providers “greenwash” their services by using buzzwords without the necessary infrastructure in place. Look for references and reviews and ask hard questions. Washed-out providers typically emerge under scrutiny.

The cloud-based security market is growing, even as green clouds get the go-ahead from many enterprises. The rise of green security technology that both protects corporate assets and limits environmental impact is inevitable. However, it’s an evolving market, meaning companies must exercise caution while both evaluating and adopting the new corporate color.

More from Artificial Intelligence

Cloud Threat Landscape Report: AI-generated attacks low for the cloud

2 min read - For the last couple of years, a lot of attention has been placed on the evolutionary state of artificial intelligence (AI) technology and its impact on cybersecurity. In many industries, the risks associated with AI-generated attacks are still present and concerning, especially with the global average of data breach costs increasing by 10% from last year.However, according to the most recent Cloud Threat Landscape Report released by IBM’s X-Force team, the near-term threat of an AI-generated attack targeting cloud computing…

Testing the limits of generative AI: How red teaming exposes vulnerabilities in AI models

4 min read - With generative artificial intelligence (gen AI) on the frontlines of information security, red teams play an essential role in identifying vulnerabilities that others can overlook.With the average cost of a data breach reaching an all-time high of $4.88 million in 2024, businesses need to know exactly where their vulnerabilities lie. Given the remarkable pace at which they’re adopting gen AI, there’s a good chance that some of those vulnerabilities lie in AI models themselves — or the data used to…

Security roundup: Top AI stories in 2024

3 min read - 2024 has been a banner year for artificial intelligence (AI). As enterprises ramp up adoption, however, malicious actors have been exploring new ways to compromise systems with intelligent attacks.With the AI landscape rapidly evolving, it's worth looking back before moving forward. Here are our top five AI security stories for 2024.Can you hear me now? Hackers hijack audio with AIAttackers can fake entire conversations using large language models (LLMs), voice cloning and speech-to-text software. This method is relatively easy to…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today