sb-eu logo
Story image

Why it’s essential to re-write IT security for the cloud era

22 Sep 2020

Article by Bitglass CTO Anurag Kahol.

Digital transformation has caused a revolution, and workforce mobility has replaced the traditional on-premises approach. As a result, the focus of technology spend is increasingly shifting to users, devices and data.

The traditional ‘hub and spoke’ model, where everything including applications, data and users lived inside the corporate network, is no longer viable given the sheer numbers of cloud applications that are consumed.

Businesses today are looking for dynamic access to both internal applications and external cloud applications.

This requires a major review of how organisations view their perimeters as a more agile, distributed set of access and control points. Ultimately, today’s modern security should be about advancing strategies in a fast, safe way, all while understanding the language of the cloud.

Security and network teams need to change their approach to keep pace with the needs of modern organisations. The first few years of enterprise cloud adoption focused on a core set of commonly used SaaS applications. More recently, there’s been an accelerated use of a wider set of industry-specific and niche applications and, of course, internal apps moving to the cloud.

With this transition comes a need for total security and compliance for any application or device.

Key components of network security architecture for the cloud era should be built from the ground up, as opposed to being bolted on to legacy solutions built for organisations functioning only on-premises or from only managed devices.

The people perimeter

The problem is that legacy security technology is not designed to secure data as it moves beyond the traditional idea of the ‘perimeter’ and into a variety of cloud apps and devices.

Organisations need to re-evaluate the limits of their security platform to ensure that it holds firm against every eventuality, including the perennial weak links within the enterprise.

For example, more than ever before, employees are using their personal devices to perform their work duties. Bring your own device (BYOD) enhances productivity and flexibility, but it can also lead to security concerns if the right security solutions are not put in place. Before COVID-19, BYOD was a significant trend, but just one of many items on IT security to-do lists.

The impact of the lockdown has shifted the goalposts, and new work-from-home arrangements have opened multiple attack vectors for cyber attacks.  More people are likely to be signing up for apps using their own Gmail email account, for example, quickly circumventing established security processes.

Similarly, when it comes to threats to enterprise cybersecurity, it is easier to focus on external third parties as being the main source of risk. However, a considerable volume of data leakage comes as a result of insider threats - people within an enterprise, whether they divulge proprietary information with malevolent intentions, or are just careless employees who unwittingly share sensitive data.

Crucially, in building a security strategy for the cloud era, enterprises must also be cautious of disjointed solutions, as a disconnected approach may harm their ability to adapt swiftly in a highly remote and dynamic business environment.

For instance, the time and money associated with managing disjointed, disparate security tools can be effectively used elsewhere. In contrast, consolidating tools into a single platform can be highly effective, both operationally and in cost-effectiveness.

Unfortunately, organisations often overlook architecture when considering practical security solutions. In doing so, they can saddle themselves with additional maintenance costs (such as employee time, upgrade requirements and overhead expenses) associated with legacy and appliance-based solutions.

Architectures also claim to be cloud native when, in fact, they are merely hosted in private data centres. In practice, this means they still adhere to what is essentially an on-premises network model, and security vendors who build their solutions like this must continue to maintain data centres, stock them with hardware appliances for their customers and factor this into their pricing and service models.

Security threats and vulnerabilities change every day - that’s a given, and these issues require IT teams to remain vigilant and agile in the face of new challenges. In dealing with the here and now, however, what can’t be overlooked is the fundamental shift in infrastructure and network security brought about by the growth of cloud.

Only by viewing security strategies in the context of these macro trends can organisations update their rule book to more effectively meet challenges head on, both now and in the future.

Story image
OVHcloud, IBM, Atempo Group develop tape-based SaaS for data centres
The offering will be based on IBM’s 3592 enterprise tape technologies and leverage Atempo’s Miria platform, while OVHcloud will host and operate it through data centres in the French territory.More
Story image
One Identity reaches out to SolarWinds customers following breach
According to the company, this free assessment seeks to help organisations navigate through times of uncertainty as attacks continue to grow in sophistication and complexity across the broad range of identity-centric risks.More
Story image
CompTIA forms Cybersecurity Advisory Council, led by 16 security execs
The new body will be co-chaired by Tech Data director of security solutions Tracy Holtz, and Alvaka Networks chief operating officer and chief information security officer Kevin McDonald.More
Story image
Hornetsecurity acquires Altaro, the latest in acquisition spree
The move is a culmination of a medley of acquisitions made by Hornetsecurity recently, following the January 2019 acquisition of Spamina, a Spanish cloud email security company, as well as EveryCloud, its British market partner, in early 2020.More
Story image
22 billion records exposed from breaches in 2020 — report
The research also found that 35% of the breaches recorded by Tenable were caused by ransomware attacks, while 14% of breaches stemmed from email compromises.More
Story image
Kaspersky steps in to protect automotive industry from cyber threats
The company’s TI report, previously available for a selected range of customers, is able to provide car manufacturers with in-depth analysis of industry-specific security threats.More