Businesses need IT security tools that adapt to the way people work, such as secure browsers that make web apps more reliable and easy to use, while preventing security risks, said Calvin Hsu, a vice president at Citrix. “If more organizations focus on providing intuitive security tools like a secure browser that simplify security, security will be stronger, the risk of a catastrophic breach will be reduced, and the organization will be safer.”
With data and applications living in public, private and hybrid clouds, as well as traditional on-premises infrastructure, networks transporting this data to users and devices becomes a key point of entry for adversaries. To create a more secure environment for employees and ensure corporate data is not at risk, enterprises should focus on network solutions that are based on contextual access – that is, granting access based on typical user behavior, device and location of the device, said Steve Shah, vice president of product management, NetScaler at Citrix. “With the onset of IoT, connectivity will expand at a rapid pace, and the best way for organizations to maintain integrity of secure networks, and minimize exposure of those connections, is to take an access-based approach.”
The impact of changing regulations around data protection globally is causing concern for companies as they embrace the cloud, said Michael Elliott, cloud evangelist at NetApp. "Recently, the data privacy landscape has been muddled with news of data risks within cloud enablement and implementation. Keeping your data next to – rather than in – the cloud, represents a solution that mitigates data privacy and sovereignty issues by allowing companies to have complete control over their data, while still safely embracing the scale and flexibility that cloud compute has to offer.”
Lance Weaver, vice president of offer management and platform strategies at Equinix, said increasingly, enterprises are placing, managing and analyzing data in proximity to the users, services and clouds. “This is driving adoption of an interconnection oriented architecture that not only improves data accessibility, security and control but also satisfies data privacy and sovereignty requirements that dictate data containment in a specific node or location. Bypassing the public internet, directly connecting users and clouds locally, can enable a critical layer of protection for their hybrid and multi-cloud deployments to ensure data privacy.”
Sign up for CIO Asia eNewsletters.