Can integrating the existing infrastructure with multi cloud providers assure security?
The conventional security controls and practices are gradually phasing out in the world that is increasingly influenced by the cloud. IT professionals are finding it difficult to create new security levels that can integrate on-premise infrastructure with multiple clouds that can close visibility gaps and build holistic protection.
According to a research study conducted by IBM and IDG, 77 percent of respondents agree that the rise in multi-cloud has forced them to take up ‘security’ differently. They believe that multi-cloud has added a complex layer to the existing security equation. This has made it a big challenge to manage multi-cloud environments. Chris Dotson who works as a senior technical staff member and executive architect with IBM explains the challenges related to a traditional on-premise environment like speed and democratization of IT services where anyone can create and deploy a system.
Meanwhile, several security practices including access and identity management, asset management, and vulnerability management can help in protecting the on-premise and multi-cloud infrastructure. Security tools and cloud platforms that support high level of integration alongside the functioning of automation are critical in achieving visibility and mitigating risk in an increasingly diversified landscape, he adds.
Three pre-requisites that can help secure an enterprise from on-premise systems to multi-cloud based services are: Identity & Access Management (IAM), Automated Access Management, and Vulnerability Management. Enterprises need to check for system updates, need to have a formal roadmap for spotting and correcting potential vulnerabilities. This works both on on-premise systems as well as in a library in the cloud, regardless of wherever the problem lies.
Cloud Computing Changing Management
By James Seevers, CIO & GM, Toyoda Gosei
By Bill Krivoshik, SVP & CIO, Time Warner Inc.
By Gregory Morrison, SVP & CIO, Cox Enterprises
By Alberto Ruocco, CIO, American Electric Power
By Bruce. D. Smith, SVP & CIO, Information Systems, Advocate...
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
By Graham Welch, Director-Cisco Security, Cisco
By Michael Watkins, Senior Product Director, Global Knowledge
By Bernd Schlotter, President of Services, Unify
By Patrick Hale, CIO, VITAS Healthcare
By Steve Bein, VP-GIS, Michael Baker International
By Jason Alan Snyder, CTO, Momentum Worldwide
By Mike Morris, CIO, Legends
By Louis Carr, Jr., CIO, Clark County
By Bill Dow, SVP and General Manager of Business Solutions,...
By Jim Whitehurst, CEO, Red Hat
By Darren Cockrel, CIO, Coyote Logistics, a UPS Company...
By Nathan Johnson, SVP and CIO, Werner Enterprises [NASDAQ:...
By David Tamayo, CIO, DCS Corporation
By Neil Hampshire, CIO, ModusLink Global Solutions, Inc....