Security has to be top of the mind when moving to highly complex cloud environments
Today’s enterprise environment is evolving and dynamic, driven largely by mobility, cloud services, encrypted communications and more. This introduces new complexities to ensure the proper degree of security coverage to protect users, systems and data. When assessing and improving your ability to defend against today’s sophisticated cyber threats, it is important to take into account the physical location, digital communications and sheer capacity of data to be inspected and protected.
The last few years saw a rapid proliferation of cloud services and mobile device adoption in the workplace. The trend has transformed business productivity. But it has also wrecked the tight-fisted control that CIOs used to be able to exert on their IT systems. CIOs now have to grapple with the idea of employees using unsanctioned cloud services via unsecured phones to hook up to corporate servers and accessing sensitive business data. The expected explosion of IoT devices will result in a further fragmentation of IT in businesses. There is no shortage of anecdotes and reports out there that point to how the unauthorized use of applications and cloud services, or shadow IT, is on the rise among businesses. While much excitement focuses on new technologies like network sandboxing, there is no single product answer to the challenge of advanced threats.
Digital India will over a period of time have a big impact on businesses. CIOs will have to learn how to tap on the new connected infrastructure for their business. Smart city technologies like IoT and data analytics are expected to drive innovative business ideas in the future.
Connected devices as part of the Digital India initiative will generate huge data repositories. To protect huge amounts of data with large inflows and outflows, the bandwidth capabilities of security appliances will come to the fore. Security has to be on top of mind for anyone moving to more efficient -- yet more complex -- cloud environments. Enterprise customers need the peace of mind in knowing that their critical assets are continually being protected, regardless of their cloud environments.
Regional Director, SAARC, Fortinet.