Cloud use continues to grow quickly in the enterprise and has obviously become a part of mainstream IT – to such an extent that numerous organizations now claim to have a “cloud-first” methodology. That is backed up by a recent Intel Security survey of 1200 respondents which demonstrated that 80% of respondents’ IT spend will go to cloud services within just 16 months. Even if that outlook overestimates cloud spend,it still
shows a dramatic shift in mindset, and it’s often the business, rather than the IT department, that is driving the shift. In today’s advanced world, the pull of the cloud and its advantages of adaptability, speed, innovation, expense, and versatility are now
too great to be dismissed by the usual fears. To compete today, organizations in KSA need to quickly adopt and set up new services, to both scale up or down in response to demand and meet the constantly developing needs and desires of employees and clients.
This newly discovered positive thinking for the cloud inevitably means more basic and sensitive information is put into cloud services. And that means security is going to become a big issue. Sadly, the same study uncovered that the picture isn’t awesome with regards to how well organizations are guaranteeing Cloud Security today. Around 40% are neglecting to secure records located on Software-as-a-Service (SaaS) with encryption or data loss prevention tools, 43% don’t utilize encryption or anti malware in their private cloud servers, and 38% use Infrastructure-as-a-Service (IaaS) without encryption or anti
Many organizations have already been at the sharp end of Cloud Security incidents. Nearly a quarter of respondents (23%) report cloud provider data losses or breaches, and one in five reports unauthorized access to their organizations’ data or services in the cloud. The reality check here is that the most commonly cited Cloud Security incidents were actually around migrating services or data, high costs, and lack of visibility into the provider’s operations.
Trust in cloud providers and services is growing, but 72% of decision makers in the survey still point to cloud compliance as their greatest concern. That’s not surprising given the current lack of visibility around cloud usage and where cloud data is being
stored. The wider trend to move away from the traditional PC-centric environment to unmanaged mobile devices is another factor here. Take a common example: an employee wants to copy data to their smartphone from a CRM tool via the Salesforce app. The problem is that they have the credentials to go to that cloud service and access that data, but in this case, they are using an untrusted and unmanaged device. Now multiply that situation across all of an organization’s cloud services and user devices.
There is clearly a need for better cloud-control tools across the stack. Large organizations may have hundreds or even thousands of cloud services being used by employees – some of which they probably don’t even know about. It is impossible to implement separate controls and polices for each of them.
Hybrid Cloud Security
To securely reap the benefits of cloud while meeting compliance and governance requirements, enterprises will need to take advantage of technologies and tools such as two-factor authentication, data leakage prevention, and encryption, on top of their cloud services and applications.
Increasingly, organizations are also investing in security-as-a-service (SECaaS) and other tools that can help orchestrate security across multiple providers and environments. These help tackle the visibility issue and ensure compliance needs are met. That’s why I believe we are starting to see the rise of so-called “broker” security services. These cloud access security brokers (CASBs) will enable consolidated enterprise security policy enforcement between the cloud service user and the cloud service provider. In fact, Gartner predicts that by 2020, 85% of large enterprises will use a CASB for their cloud services, up from fewer than 5% today.
The key to this is for companies to be able to seamlessly push and enforce their own security policies from an on-premise proxy infrastructure to a public infrastructure. For the enterprise, this provides the ability, if required, to encrypt corporate data that sits in a public cloud service and offer complete protection for every endpoint. It means the same security policy is applied to the end users regardless of how or where they have connected, whether that’s through a public or private cloud, from a smartphone in a coffee shop or a Wi-Fi hotspot at the airport. Another example of hybrid security in action is where a company is using the infrastructure of a public cloud provider, such as Amazon, but retains control and ownership of the server in that infrastructure. It can be managed by themselves and, using an Amazon API, enables encryption of the whole server within that public cloud environment.
Cloud adoption in the enterprise is rapidly approaching a tipping point and now more than ever, there is need for organizations in KSA to adopt a new model of ‘cloud-first’ integrated security that enables the centralized control or orchestration of the myriad of cloud services and apps employees use across the enterprise. Cloud Security is now a critical element of any business, and it needs to be taken seriously from the boardroom right down to the end users.