6

Let's prioritise where cloud-centric organisations should focus data protection

 3 years ago
source link: https://itwire.com/guest-articles/guest-opinion/let-s-prioritise-where-cloud-centric-organisations-should-focus-data-protection.html
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
neoserver,ios ssh client

Tuesday, 06 July 2021 14:45

Let's prioritise where cloud-centric organisations should focus data protection

By Anurag Kahol, Bitglass founder and CTO

GUEST OPINION: For many organisations, creating an effective data protection strategy to support the adoption of remote work and cloud infrastructure is becoming increasingly urgent.

But in working to mitigate risks and build robust processes, IT leaders face a range of challenges, and getting the priorities right is key to overcoming issues as varied as data leakage, compliance and access control, all while maximising user experience.

So where should they start? And what are the main data protection challenges that can threaten the integrity, management, and security of distributed data?

Challenge 1: Removing the risk of hidden data loss in encrypted traffic.

When workers were in the office and connected directly to the company network, data and applications resided in central data centres, encrypted traffic was limited, and, as a result, on-premises security solutions were sufficient.

However, with the move to the cloud, the use of the web, and the widespread adoption of remote working, encrypted traffic has shifted from the exception to the rule. If current data protection solutions don't identify and control sensitive data in encrypted traffic, they will miss the majority of sessions in which data exposure and misuse is a possibility, leaving the organisation vulnerable to data loss and breaches.

Solution: Stolen data is often disguised and sent uninspected through SSL, and according to a recent Google Transparency report, 95% of traffic is encrypted and therefore not subject to inspection by traditional data loss protection (DLP) solutions. This is potentially disastrous, as partial inspection of traffic leaves businesses vulnerable to data loss, meaning sensitive data passing through may be missed.

Consequently, organisations need cloud and web security solutions that can inspect every byte outside the network and beyond the scope of legacy technologies. With this approach, they can ensure that data within encrypted traffic is secure.

Challenge 2: Closing gaps between data protection services.

With the move to the cloud, data is distributed across diverse SaaS, IaaS, web and on-premises environments. Naturally, each of these needs effective data protection.

As a result, organisations are adopting cloud access security brokers (CASBs) to secure managed SaaS applications and IaaS platforms, cloud security posture management (CSPM) to scan IaaS instances for costly misconfigurations, secure web gateways (SWGs) to secure the web and unmanaged apps (shadow IT), and zero trust network access (ZTNA) to secure residual on-premises resources as they are accessed remotely.

However, this complexity makes data protection uniformity and solution management challenging, and can waste time and money while creating gaps in visibility and control across resources.

Solution: Unified protection, in which a consistent level of security is provided to all interactions across ecosystems, can be achieved by adopting a comprehensive security platform built in and delivered through the cloud. Today's market-leading technologies can monitor data in transit and at rest within IT resources through capabilities like cloud DLP and advanced threat protection (ATP). Consistent, easily managed security across all interactions is key.

Challenge 3: Avoiding poor user experience.

With workers and the resources they access and use to do their jobs moving off premises, a major element of core infrastructure is now the internet itself. One of its downsides, however, is that this approach limits IT's ability to anticipate, identify, and mitigate issues with their legacy security stack.

Additionally, when the majority of services, solutions or applications used by workers are out of the organisation’s control, it becomes more difficult to ensure that employees have a good user experience and maintain productivity while data stays safe.

Solution: Many appliance-based security offerings require traffic to be backhauled to a central data centre, creating bottlenecks and causing latency, which directly impacts user experience and productivity. A platform that embraces the concept of secure access service edge (SASE) puts data security as close as possible to the user, reducing latency and significantly improving the user experience.

Challenge 4: Eliminating compliance violations across the cloud.

Failing to meet and maintain required industry regulations can result in significant fines and even loss of business. With data distributed across SaaS, IaaS, the web and a myriad of devices with remote access to enterprise networks, visibility and remediation for compliance purposes are reduced, potentially putting your company at risk.

Solution: By obtaining unified visibility and control across the entire IT ecosystem, a range of key compliance standards (PCI DSS, HIPAA, GDPR, and others) can be met, minimising the risk of compliance violations in today’s complex environments. This is done through, once again, through integrated platforms that boast a variety of functionality (DLP, IAM, CSPM, and others) which can ensure that specific regulatory requirements are addressed.

By including these important considerations in data protection strategy planning and execution, organisations can embrace digital transformation with confidence. In doing so, they can close gaps between data protection services, minimise risk, achieve compliance, and deliver a consistently strong user experience.

Subscribe to ITWIRE UPDATE Newsletter here

GRAND OPENING OF THE ITWIRE SHOP

The much awaited iTWire Shop is now open to our readers.

Visit the iTWire Shop, a leading destination for stylish accessories, gear & gadgets, lifestyle products and everyday portable office essentials, drones, zoom lenses for smartphones, software and online training.

PLUS Big Brands include: Apple, Lenovo, LG, Samsung, Sennheiser and many more.

Products available for any country.

We hope you enjoy and find value in the much anticipated iTWire Shop.

ENTER THE SHOP NOW!

INTRODUCING ITWIRE TV

iTWire TV offers a unique value to the Tech Sector by providing a range of video interviews, news, views and reviews, and also provides the opportunity for vendors to promote your company and your marketing messages.

We work with you to develop the message and conduct the interview or product review in a safe and collaborative way. Unlike other Tech YouTube channels, we create a story around your message and post that on the homepage of ITWire, linking to your message.

In addition, your interview post message can be displayed in up to 7 different post displays on our the iTWire.com site to drive traffic and readers to your video content and downloads. This can be a significant Lead Generation opportunity for your business.

We also provide 3 videos in one recording/sitting if you require so that you have a series of videos to promote to your customers. Your sales team can add your emails to sales collateral and to the footer of their sales and marketing emails.

See the latest in Tech News, Views, Interviews, Reviews, Product Promos and Events. Plus funny videos from our readers and customers.

SEE WHAT'S ON ITWIRE TV NOW!


About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK