Rising to the Security Challenge of Heavy Cloud Adoption
- LANGUAGE: English DATE: Tuesday, October 11, 2016 TIME: 6:00pm CEST, 12:00pm EDT, 9:00am PDT
Many enterprises have decided on a “cloud first” strategy, or have seen heavy cloud adoption evolve spontaneously as their business units embrace cloud for cost savings, agility or other competitive imperatives. In the course of this development, security teams face difficult challenges controlling, influencing or enabling cloud adoption.
Strategic uncertainty in IT itself leaves security organizations rudderless, without direction. IT departments often have an outdated cloud strategy or even none at all. Yet need for an IT Cloud strategy has never been greater.
Multinational corporations with decentralized lines of business that build software as well as buy it face the most acute challenges. Their group security organizations find themselves in the eye of a heavy storm. Other types of organizations can learn much from their experiences before the cloud tempest hits them too.
A good IT Cloud Strategy must not only specify a cloud direction but also the expected interactions between business units, customers, suppliers and competitors. It has to be well-aligned with the organization’s business drivers, principles and strategies. In a rapidly changing environment, it should have a strong focus on architecture, risk management and collaboration. Finally, users and endpoints in the hybrid multi-cloud and mobile environments must be protected from network-borne cyber-attacks, DDOS, and malware.
In this webinar, Dan Blum, Senior Analyst at KuppingerCole, sums up the most important points of his new advisory note “Rising to the Security Challenge of Heavy Cloud Adoption “. This report provides actionable and detailed recommendations on how IT security leadership deals best with the challenges of strategic uncertainty, regulatory compliance, shadow IT, fragmented security infrastructure and agile development as well as devops practices.
Hear in this KuppingerCole webinar how to:
- Engage with multiple stakeholders in an actual or virtual IT Cloud Strategy team
- Determine the primary cloud direction and governance model
- Understand the enterprise’s application hosting guidelines
- Help implement cloud management and assurance frameworks
- Optimize protection for cloud networking and mobility
- Optimize cloud identity and access management
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.