Intelligent CIO LATAM Issue 01 | Page 54

FEATURE : CLOUD

WE HAVE REACHED THE POINT WHERE LARGE COMPANIES ARE OFTEN USING 50 – 100 DIFFERENT SECURITY TOOLS FROM DOZENS OF DIFFERENT VENDORS .

that they need to protect . In fact , in a recent Forrester Research study , 85 % of technology decision makers agreed that on-premises infrastructure is critical to their hybrid cloud strategies . emerged to protect today ’ s cloud environments . We have reached the point where large companies are often using 50 – 100 different security tools from dozens of different vendors .
The problem here is not the cloud resources , or the security tools themselves , but the fact that the various pieces are not being connected with a single singular approach , creating security blind spots and complexity as a result .
A well-executed ‘ hybrid cloud model ’ combines parts of a company ’ s existing on-premises systems with a mix of public cloud resources and Resources-As-a-Service and treats them as one . In turn , security must also be redesigned with a single point of control that provides a holistic view of threats and mitigates complexity .
Connecting security through the clouds
However , the ad hoc adoption of cloud technologies has created a ‘ rugged landscape ’ of dispersed IT resources to ensure , with gaps in visibility and data propagation across multiple tools , the cloud and online infrastructure premise . This problem has only been compounded by the hasty deployment of new tools and resources in the cloud to accommodate remote work amid the global pandemic .
Unfortunately , this disconnected approach is reflected in much of the security tools that have
In the hybrid cloud world , both data security and privacy become a shared responsibility among data owners , users and providers .
Ultimately , many of the security risks emerging in cloud environments are the result of human error , combined with a lack of centralized visibility to find and fix these issues before they become harmful . Cloud misconfigurations were cited as one of the leading causes of data breaches studied in the Cost of a Data Breach Report from IBM and the Ponemon Institute ,
54 INTELLIGENTCIO LATAM www . intelligentcio . com