Se­cu­rity has to be top of the mind when mov­ing to highly com­plex cloud en­vi­ron­ments

Voice&Data - - NETWORK SECURITY -

To­day’s en­ter­prise en­vi­ron­ment is evolv­ing and dy­namic, driven largely by mo­bil­ity, cloud ser­vices, en­crypted com­mu­ni­ca­tions and more. This in­tro­duces new com­plex­i­ties to en­sure the proper de­gree of se­cu­rity cov­er­age to pro­tect users, sys­tems and data. When as­sess­ing and im­prov­ing your abil­ity to de­fend against to­day’s so­phis­ti­cated cy­ber threats, it is im­por­tant to take into ac­count the phys­i­cal lo­ca­tion, dig­i­tal com­mu­ni­ca­tions and sheer ca­pac­ity of data to be in­spected and pro­tected.

The last few years saw a rapid pro­lif­er­a­tion of cloud ser­vices and mo­bile de­vice adop­tion in the work­place. The trend has trans­formed busi­ness pro­duc­tiv­ity. But it has also wrecked the tight-fisted con­trol that CIOs used to be able to ex­ert on their IT sys­tems. CIOs now have to grap­ple with the idea of em­ploy­ees us­ing un­sanc­tioned cloud ser­vices via un­se­cured phones to hook up to cor­po­rate servers and ac­cess­ing sen­si­tive busi­ness data. The ex­pected ex­plo­sion of IoT de­vices will re­sult in a fur­ther frag­men­ta­tion of IT in busi­nesses. There is no short­age of anec­dotes and re­ports out there that point to how the unau­tho­rized use of ap­pli­ca­tions and cloud ser­vices, or shadow IT, is on the rise among busi­nesses. While much ex­cite­ment fo­cuses on new tech­nolo­gies like net­work sand­box­ing, there is no sin­gle prod­uct an­swer to the chal­lenge of ad­vanced threats.

Dig­i­tal In­dia will over a pe­riod of time have a big im­pact on busi­nesses. CIOs will have to learn how to tap on the new con­nected in­fras­truc­ture for their busi­ness. Smart city tech­nolo­gies like IoT and data an­a­lyt­ics are ex­pected to drive in­no­va­tive busi­ness ideas in the fu­ture.

Con­nected de­vices as part of the Dig­i­tal In­dia ini­tia­tive will gen­er­ate huge data repos­i­to­ries. To pro­tect huge amounts of data with large in­flows and out­flows, the band­width ca­pa­bil­i­ties of se­cu­rity ap­pli­ances will come to the fore. Se­cu­rity has to be on top of mind for any­one mov­ing to more ef­fi­cient -- yet more com­plex -- cloud en­vi­ron­ments. En­ter­prise cus­tomers need the peace of mind in know­ing that their crit­i­cal as­sets are con­tin­u­ally be­ing pro­tected, re­gard­less of their cloud en­vi­ron­ments.

Re­gional Di­rec­tor, SAARC, Fortinet.

Newspapers in English

Newspapers from India

© PressReader. All rights reserved.