IT Brief Asia logo
Technology news for Asia's largest enterprises
Story image

Dark clouds on the horizon: How to close the gaps in cloud security

By Contributor
Thu 2 Dec 2021

Article by Gigamon A/NZ general manager George Tsoukas.

These days cloud security is more trusted than ever. According to a recent study in a survey of 2,000 IT leaders from around the globe, nearly 85% of respondents said that they trust cloud security practices as much as, or more than, those associated with their on-premises data infrastructures.

Counterintuitive though it may seem, the reality is that in most cases, data is actually more secure when it is maintained offsite. Cloud computing eliminates the dangers associated with on-site threats (disgruntled employees, break-ins, disasters and regional emergencies, and so on).

At the same time, cloud vendors tend to take a more proactive approach to keep security measures fully patched and up to date, often well beyond standards maintained by individual organisations.

As such, cloud computing is enjoying a golden age of trust and capability. This is why it's all the more important to recognise that cloud security isn't infallible. There are still gaps in cloud security, and the first step to closing those gaps is identifying them.

What are the major problems of cloud security? A solid cloud infrastructure brings with it a number of advantages.

In addition to the obvious benefits associated with unrestricted availability (authorised users can access their cloud solutions at any time, from anywhere in the world) and improved collaboration (having a single, centralised set of cloud-based tools empowers team members to connect easily and share information), cloud computing is also capable of improving data capture and analysis, reporting, business continuity and resilience, and scalability.

Given the current business environment, these are essential factors in retaining a competitive edge. But let's not discuss the strengths of the cloud. Instead, let's focus on some of its potential weaknesses.

Modern problems in cloud security, though not as obvious as the fears when the cloud first began to gain prominence, can still represent a clear danger to businesses and their customers.

Taking a closer look at several gaps in cloud security and considering how these dark clouds may be casting a shadow on organisations can help understanding.

The inability to replicate on-prem security and compliance models is a serious issue. When people operate within the cloud, they play on someone else's field and have to abide by their rules.

While cloud vendors implement effective security solutions, these are seldom the same as those in which organisations have already invested significant time and energy in creating. So what happens to those security investments when a business switches to the cloud? In many cases, they risk being lost, along with essential data visibility.

This issue also extends to concerns with compliance models. Data compliance is a major issue, with new and upcoming legislation taking an ever-more-aggressive approach to ensuring safe and ethical data practices.

Non-compliance with regulatory measures may result in serious consequences, including fines, jail time for company executives, or even the forced dissolution of the offending company.

Unfortunately, issues related to data compliance in the cloud can be difficult to define fully, but even when data is managed entirely by cloud vendors, the business assumes at least a portion of the liability. 

And when the organisation has almost no say in what compliance models are being implemented, it also has little control over the outcome.

Modifying cloud apps to meet security controls is a difficult process. The gaps in cloud security extend into cloud applications, and cloud apps may not be designed to meet the security standards of the organisations that depend on them.

While it may be possible to modify or extend some applications for improved security, doing so is generally a time-consuming, expensive and highly complex task. 

If a business does not have access to the available resources, expertise or funding to modify cloud apps to meet security controls, then organisations may find themselves looking for other options.

All the previous points come together to create this final gap in cloud security. Because many organisations recognise all the issues, full cloud adoption may be slowed, lessened, or even completely halted. This can result in a less effective cloud security posture.

Security and compliance solutions

In many (or possibly most) cases, a company's data and reputation are still safer in the cloud than they would be if they were confined strictly to on-premises solutions. 

That said, those gaps in cloud security should not be overlooked. To help ensure optimal data protection in the cloud, organisations need optimal cloud visibility.

Selected technology can provide unfiltered visibility into any private or hybrid cloud infrastructure, giving more control over everything that happens to assets in the cloud.

It enables users to eliminate many blind spots that stand in the way of optimal cloud security and experience. Organisations can see exactly how their data is being handled. 

With visibility-as-code, essential monitoring can be embedded directly into cloud automation, easily scaling up or down to match users' needs.

With improved visibility comes increased control. Organisations are able to migrate their entire existing security posture directly to the cloud and ensure that investment in on-premises solutions and essential compliance frameworks becomes part of a complete cloud security plan.

Visibility also extends to cloud applications, delivering a reliable, easy and inexpensive way to connect cloud apps with your proven security controls. 

In other words, advanced solutions are closing the most prominent cloud security gaps, enabling users to blow away the dark clouds blocking the view of their data.

Related stories
Top stories
Story image
WiFi
WiFi as a Service market to reach $26 billion through 2032
As a result of the easy management of wireless infrastructure over cloud services, WaaS is experiencing rapid growth.
Story image
Ransomware
Examining the future of ransomware threats with Vectra’s CTO
As customers' valuable data move to the cloud, so will ransomware. What is the current landscape and what do we need to know?
Story image
Infrastructure
Symbio, Cisco partner to launch Webex Calling in Singapore
Symbio has partnered with Cisco to launch a unified communications offering for Cisco's Cloud Connect for Webex Calling.
Story image
Adobe
Marketplacer and Adobe accelerate partnership for enhanced commerce solutions
Marketplacer has accelerated its partnership with Adobe in order to further enhance the global commerce marketplace.
Story image
Collaboration
Enterprise service management: the importance of a one-stop shop
In an online world, employees and end-users want one place to go for all their questions and requests. Intranet technology and self-service portals are useful tools that help serve this purpose.
Story image
Artificial Intelligence
Dynatrace extends automatic release validation capabilities
Dynatrace has extended its platform release validation capabilities to improve user experience at every stage of the software development lifecycle.
Story image
Microsoft
ASI Solutions named finalist of Microsoft Surface Partner of the Year
"ASI Solutions has a strong Microsoft focus, building value by helping customers maximise investment in modern workplace solutions."
Story image
Cybersecurity
Delinea’s Joseph Carson recognised with OnCon Icon Award
Delinea chief security scientist and advisory CISO Joseph Carson has been recognised as a Top 50 Information Security Professional in the 2022 OnCon Icon Awards.
SonicWall
Find out how you and your business can prevent being caught out by everything from ransomware to cryptojacking.
Link image
Story image
Supply chain
Supply chains continue to be disrupted, enterprises embrace circular economy
“Businesses urgently need to find a solution that can help them to manage this disruption, and transition to a circular economy."
Story image
Multi Cloud
Cloud is a tool, not a destination
For many years, “cloud” has been thought of as a destination which has led to a misguided strategy that sees an enterprise trying to shift all its applications to a single cloud provider – regardless of the specific needs and nuances of each individual workload.
Story image
Aspire
NEC expands Open RAN ecosystem with Aspire Tech acquisition
With its agreement to acquire Aspire Technology, NEC Corporation has further increased its capacity to deliver End-to-End Open RAN ecosystems.
Story image
Tech job moves
Tech job moves - Bitdefender, Cohesity, Fortinet & MODIFI
We round up all job appointments from June 27-30, 2022, in one place to keep you updated with the latest from across the tech industries.
Story image
Artificial Intelligence
Vectra AI named as AWS security competency partner
Threat detection and response company Vectra AI has announced that it has become an Amazon Web Services Security Competency Partner.
Story image
Internet of Things
ManageEngine wins big in IDC MarketScape assessment
ManageEngine's Endpoint Central service has been recognised as a leader by IDC MarketScape in several categories including Internet of Things device deployments and UEM software for SMEs.
Story image
Remote Working
RDP attacks on the rise, Kaspersky experts offer advice
"Given that remote work is here to stay, we urge companies to seriously look into securing their remote and hybrid workforce to protect their data."
AWS Marketplace
Make security easier to manage and respond more effectively to threats with SaaS-delivered MSS.
Link image
Story image
Voice recognition
Renesas and Cyberon expand services with voice recognition
“We are honoured to collaborate with Renesas to simplify the development of embedded voice recognition functions."
Story image
Robotics
Evonik relies on Getac F110 tablet to control autonomous robot
The aim of the project is to evaluate the practicality of an automated robotic maintenance and inspection solution in the chemical industry.
Story image
Artificial Intelligence
Eight top DevSecOps trends to support IT innovation in 2022
The use of DevSecOps practices is growing, as it is increasingly seen as the best way to produce high-quality and secure code. So what are the current trends?
Story image
Development
Intel Labs unveils integrated photonics research advancement
"This new research demonstrates that its possible to achieve well-matched output power with uniform and densely spaced wavelengths."
Story image
IDTechEx
The next stage for 5G in thermal materials - IDTechEx
IDTechEx says higher frequency deployments, such as mmWave devices and very different station types such as small cells, present their own technological evolution and, with it, thermal challenges. 
Story image
Cloud
BT builds on Equinix partnership with new cloud offering
BT has launched a next-generation cloud connectivity offering extending its global network into strategic carrier-neutral facilities (CNFs) and building on its existing partnership with Equinix.
Story image
Apple
Jamf introduces new content filtering solution for education providers
Jamf has announced the launch of Jamf Safe Internet, a new offering that looks to deliver a safe online experience to students while offering better management options for admins.
Story image
Solutions
Progress launches latest version of network visibility solution
In Flowmon 12 network solution, Progress has expanded its support for public cloud provider flow log monitoring and launched new features.
Story image
Airwallex
How Airwallex helps businesses achieve globalisation success
As markets continue to shift, businesses need to be able to provide the same quality of service for customers regardless of where they are located around the world.
Story image
Cybersecurity
How organisations can mitigate IoT and IIoT security risks
IoT and IIoT come with inherent risks because they are often deployed faster than they can be secured, putting organisations in danger of cyber threats. Here are tips on how to mitigate those risks.
Story image
Storage
EXCLUSIVE: Finding the best data center for your business needs with datacenterHawk
Companies using cloud are consistently looking for the best storage solutions to suit their enterprise needs and often have to go through rather complex processes in order to find the right fit.
Story image
Artificial Intelligence
Siemens expands NVIDIA partnership for industrial metaverse
Siemens is expanding its partnership with NVIDIA to enable the industrial metaverse and increase the use of AI-driven digital twin technology.
Story image
Infrastructure
New VMware offerings improve cloud infrastructure management
VMware has unveiled VMware vSphere+ and VMware vSAN+ to help organisations bring benefits of the cloud to existing on-prem infrastructure.
Story image
Compliance
SentinelOne integrates with Torq to empower security teams
"With Torq, security teams can extend the power of SentinelOne to systems across the organisation to benefit from a proactive security posture.”
Story image
Infrastructure
Video: 10 Minute IT Jams - An update from Paessler
Sebastian Krüger joins us today to discuss how unified infrastructure monitoring enables MSPs to seamlessly deliver services to their clients.
Story image
CSG
To win at 5G, telcos must tame their quoting chaos
The catalogs of CSP (communication service providers) market offerings are set to explode as new digital services emerge, powered by B2B2X business models.
Story image
Cybersecurity
Without trust, your security team is dead in the water
The rise of cyberattacks has increased the need for sound security that works across any type of business, but with any change, buy-in is essential. Airwallex explains why.
Story image
Malware
Colt launches new SASE Gateway solution with Versa
Colt Technology Services’ customers now have access to an integrated full SASE solution that brings together SD WAN and SSE features.
Story image
Hybrid Cloud
Advent One acquires Layer 8 Networks, complements hybrid cloud offering
The acquisition comes at a time of surging demand in hybrid cloud, network virtualisation and network security.
Story image
Microsoft
SAS wins Microsoft ISV 2022 Partner of the Year award
"We formed the SAS and Microsoft strategic partnership with a shared goal of making it easier for customers to drive better decisions in the cloud."
Story image
Artificial Intelligence
Accenture shares the benefits of supply chain visibility
It's clear that gaining better visibility into the supply chain will help organisations avoid excess costs, inefficiencies, and complexity to ultimately improve their bottom line.
Story image
Cybersecurity
Tech and data’s role in the changing face of compliance
Accenture's study found that 93% of respondents agree or strongly agree new technologies such as AI and cloud make compliance easier.
Story image
Recruitment
Thales on recruitment hunt for next disruptive innovations
"Recruiting new talent is part of Thales's belief in the power of innovation and technological progress to build a safer, greener and more inclusive world."
Story image
Identity and Access Management
Ping Identity named a Leader in Access Management
Ping Identity has been named a leader in the 2022 KuppingerCole Leadership Compass report for Access Management. 
Story image
Cloudian
Cloudian, Vertica to deliver on-premise data warehouse platform
"We’re enabling our customers to capitalise on a leading object storage platform and maximise the value of their digital assets.”
Story image
ABI Research
NaaS market expected to reach $150B by 2030 - research
"The market is immature and fragmented, but telco market revenue will exceed US$75 billion by 2030 if they act now and transform to align with requirements."
Story image
Infosys
Preparing for the digital decade with the right workforce strategies
For a decade that started under the pall of the pandemic, the 2020s is poised to end with a bang with the digital economy swelling to a high across the world.