Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Why cloud-delivered security provides the best protection for business

Scott Robertson | July 7, 2016
As the proportion of business transactions conducted electronically continues to rise, maintaining the trust of customers has never been more important.

The importance of the Cloud

As well as expressing a preference for an integrated platform approach to solving their security challenges, survey respondents also identified cloud-based resources as an integral part of their ideal mix.

The ability to use cloud-based security to secure crowd-sourced threat intelligence was identified by 59% of respondents. At the same time, having cloud-scale visibility was nominated by 73% while 55% specified a desire to be able to take advantage of advanced anomaly detection based on unsupervised machine learning.

The results clearly demonstrate most organisations believe cloud security-as-a-service offerings can deliver better security than on-premises hardware or software security offerings. The survey found 48% of IT decision makers have, as a top-three goal, the adoption of cloud security-as-as-service to secure areas that on-premise deployments cannot. These include areas such as remote locations, mobile devices, and rapidly evolving Internet-of-Things (IoT) infrastructures.

 Clearly, IT professionals acknowledge that the value, flexibility and scalability of cloud solutions can deliver to them a more secure environment overall.

Strategy for a secure future

Based on the demand for an integrated platform and cloud-based approach identified by the survey, there are some key steps organisations should take when building their security strategy. They include:

  • Making integration a must-have feature for all security technologies within an infrastructure. As each component is added it should be able to hook into a central management platform.
  • Creating a comprehensive data security strategy designed to address all channels and devices used to access sensitive assets. This should cover everything from employee-owned devices to data stored on cloud platforms.
  • Ensuring end-point protection by adopting solutions that use dynamic analysis, such as application or process sandbox analysis and user or kernel activity behaviour monitoring.
  • Taking advantage of cloud-sourced threat intelligence to learn from attacks experienced by other organisations.

By following this strategy, organisations can be sure they have an effective security infrastructure in place that will significantly reduce the likelihood of successful attacks. Customer service and satisfaction can then be confidently maintained.

Source: CSO Australia


Previous Page  1  2 

Sign up for CIO Asia eNewsletters.