The Cloud (and DMS)
Conducting Cloud Operations Economically
Leveraging Cloud for Enhanced Productivity
VA Looks to the Cloud
Understanding the Prospects of Cloud Technology
Ramin Beheshti, CPTO, Dow Jones
Cloud - A Thoughtful Journey -Alaska Airlines Journey to Cloud...
Bob Peterson, Enterprise Architect, Alaska Airlines
Ensuring Good Weather with Clouds
Glenn Kurowski, SVP, CACI International Inc [NYSE:CACI]
What is CLOUD doing to our networks?
Sam Schoelen, Chief Information Technology Officer, Continental Resources
Can integrating the existing infrastructure with multi cloud providers assure security?
The conventional security controls and practices are gradually phasing out in the world that is increasingly influenced by the cloud. IT professionals are finding it difficult to create new security levels that can integrate on-premise infrastructure with multiple clouds that can close visibility gaps and build holistic protection.
According to a research study conducted by IBM and IDG, 77 percent of respondents agree that the rise in multi-cloud has forced them to take up ‘security’ differently. They believe that multi-cloud has added a complex layer to the existing security equation. This has made it a big challenge to manage multi-cloud environments. Chris Dotson who works as a senior technical staff member and executive architect with IBM explains the challenges related to a traditional on-premise environment like speed and democratization of IT services where anyone can create and deploy a system.
Meanwhile, several security practices including access and identity management, asset management, and vulnerability management can help in protecting the on-premise and multi-cloud infrastructure. Security tools and cloud platforms that support high level of integration alongside the functioning of automation are critical in achieving visibility and mitigating risk in an increasingly diversified landscape, he adds.
Three pre-requisites that can help secure an enterprise from on-premise systems to multi-cloud based services are: Identity & Access Management (IAM), Automated Access Management, and Vulnerability Management. Enterprises need to check for system updates, need to have a formal roadmap for spotting and correcting potential vulnerabilities. This works both on on-premise systems as well as in a library in the cloud, regardless of wherever the problem lies.