Gaining 360 Degree View of Consumers
Predicting a Better Future for Students
The Changing Dynamics of Engineering Industry
CIO ... Only Until the Next Data Breach
Embrace Technology to Stay Ahead!
Dave Doyle, CIO & SVP - IT, Regal Entertainment Group
The Changing Role of the CIO
Mel Kirk, SVP & CIO, Ryder System, Inc.
Effective Strategy While Implementing SAP or ERP Systems
Daniel M Horton, CIO, Michael Baker International
Leveraging Data as an Enterprise Asset
Renee P Wynn, CIO, NASA
Can integrating the existing infrastructure with multi cloud providers assure security?
The conventional security controls and practices are gradually phasing out in the world that is increasingly influenced by the cloud. IT professionals are finding it difficult to create new security levels that can integrate on-premise infrastructure with multiple clouds that can close visibility gaps and build holistic protection.
According to a research study conducted by IBM and IDG, 77 percent of respondents agree that the rise in multi-cloud has forced them to take up ‘security’ differently. They believe that multi-cloud has added a complex layer to the existing security equation. This has made it a big challenge to manage multi-cloud environments. Chris Dotson who works as a senior technical staff member and executive architect with IBM explains the challenges related to a traditional on-premise environment like speed and democratization of IT services where anyone can create and deploy a system.
Meanwhile, several security practices including access and identity management, asset management, and vulnerability management can help in protecting the on-premise and multi-cloud infrastructure. Security tools and cloud platforms that support high level of integration alongside the functioning of automation are critical in achieving visibility and mitigating risk in an increasingly diversified landscape, he adds.
Three pre-requisites that can help secure an enterprise from on-premise systems to multi-cloud based services are: Identity & Access Management (IAM), Automated Access Management, and Vulnerability Management. Enterprises need to check for system updates, need to have a formal roadmap for spotting and correcting potential vulnerabilities. This works both on on-premise systems as well as in a library in the cloud, regardless of wherever the problem lies.