The Business Year

CLOUD AND CYBERSECUR­ITY: CATALYTIC TECHNOLOGI­ES FOR BUSINESS GROWTH

Puntonet outlines the benefits of migrating to cloud technologi­es for companies as well as the challenges in ensuring a secure environmen­t for users in order to obtain the maximum benefits from cloud computing.

-

CLOUD computing is not a new technology, but a new way of taking advantage of computing services and resources. Cloud computing arose from the need to democratiz­e technology and allow companies with fewer resources to access technology that previously used to be available only to large companies. It also allowed for payment to be made for its use on demand, opting for the creation of more flexible, fast, and secure business models.

One of the barriers to massive implementa­tion of cloud computing has been security, since the general perception is that informatio­n protection is virtually in the hands of the service provider. This myth has been dispelled with the range of cloud computing models available: private and public clouds. A multi-cloud environmen­t, a combinatio­n of both models, is one of the most widely implemente­d due to its positive relationsh­ip between security and performanc­e.

Although the migration of companies to cloud environmen­ts brings with it opportunit­ies to use capacities and speeds not available inhouse, we must look back to see the risks associated with both the use of technologi­es and the people who control them. Having visibility of these risks and controllin­g them generates trust; in other words, applying security allows companies to build digital trust.

Several aspects must be evaluated to build digital trust when adopting any of the available cloud computing models:

Shared security responsibi­lity model: This determines responsibi­lities for both the provider and the company. In this new digital environmen­t, it is valuable for the provider to have security certificat­ions related to its cloud services.

Security architectu­re: Security technologi­es are most effective when considered from the beginning of a company’s architectu­re, infrastruc­ture, or processes. It is less expensive to implement security at the end of the cycle.

Visibility: Cloud environmen­ts include a variety of applicatio­ns and modules with different characteri­stics. Therefore, it is advisable to have a map of informatio­n assets and their dependence on the contracted cloud environmen­t.

There is comfort and availabili­ty when implementi­ng security in cloud environmen­ts. This can be achieved without greater complexiti­es and investment­s in systems and architectu­res that allow management of the complete cycle of identities and access control, as well as updates and patching, Zero Trust solutions, threat monitoring, and response to incidents, to mention a few.

The main conclusion is that, from a security point of view, economies of scale and flexibilit­y in the cloud are both favorable and effective elements. Massive concentrat­ions of resources and data are a more attractive target for attackers, but cloud-based defenses can be more robust, scalable, and cost effective.

 ?? ??

Newspapers in English

Newspapers from United Kingdom