How Cloud Migration Fueled Digital Transformation and Global Growth...
The Cloud (and DMS)
The Role of CIO in the Cloud-First World
Conducting Cloud Operations Economically
Leveraging Cloud for Enhanced Productivity
Aaron Gette, CIO, The Bay Club Company
VA Looks to the Cloud
Camilo Sandoval, Executive in Charge, Office of Information and Technology, U.S. Department of Veterans Affairs
Do You Suffer from Cloud Strategy Deficiency (CSD)?
Hiba S. Sharief, Vice President, IT, Oportun
Understanding the Prospects of Cloud Technology
Ramin Beheshti, CPTO, Dow Jones
Can integrating the existing infrastructure with multi cloud providers assure security?
The conventional security controls and practices are gradually phasing out in the world that is increasingly influenced by the cloud. IT professionals are finding it difficult to create new security levels that can integrate on-premise infrastructure with multiple clouds that can close visibility gaps and build holistic protection.
According to a research study conducted by IBM and IDG, 77 percent of respondents agree that the rise in multi-cloud has forced them to take up ‘security’ differently. They believe that multi-cloud has added a complex layer to the existing security equation. This has made it a big challenge to manage multi-cloud environments. Chris Dotson who works as a senior technical staff member and executive architect with IBM explains the challenges related to a traditional on-premise environment like speed and democratization of IT services where anyone can create and deploy a system.
Meanwhile, several security practices including access and identity management, asset management, and vulnerability management can help in protecting the on-premise and multi-cloud infrastructure. Security tools and cloud platforms that support high level of integration alongside the functioning of automation are critical in achieving visibility and mitigating risk in an increasingly diversified landscape, he adds.
Three pre-requisites that can help secure an enterprise from on-premise systems to multi-cloud based services are: Identity & Access Management (IAM), Automated Access Management, and Vulnerability Management. Enterprises need to check for system updates, need to have a formal roadmap for spotting and correcting potential vulnerabilities. This works both on on-premise systems as well as in a library in the cloud, regardless of wherever the problem lies.