Our blog

Four cyber security challenges for cloud deployment

k

08 December 2016

Global Services

Blogs by author:  Global Services , We’re a leading global business communications provider

LinkedInTwitterYouTubeSlideshare

In our last blog, we explained the questions you need to ask before introducing the cloud. Here, we’ll share the challenges of deployment, and how to overcome them.

Challenge one: the evolving threat landscape.

An evolving cyber-threat landscape is something many organisations are aware of. But, over the past few years, new threats have become more sophisticated, and the pace at which they’re deployed is increasing.

This has exposed the weaknesses of legacy security products, particularly in cloud environments. The cloud is especially vulnerable because attackers attempt to access the applications and data stored there. So, as organisations deploy more and more to the cloud, cyber criminals step up their efforts to access this valuable information.

Challenge two: inconsistent and limited security capabilities.

Because organisations use both public and private clouds, it’s important that they’re aware of the very different security capabilities of the two. Cloud partners often offer different levels of protection for these two products, and this leads to many organisations also deploying their own security products.

But again, security products are typically designed to work with a certain type of cloud, so security isn’t being tailored to your cloud environment specifically. And that leaves your data vulnerable. Without consistent, tailored security in place, your applications and data are exposed to cyber criminals — and that could have huge implications.

Challenge three: manual security operations.

Simply put, manual security operations can’t keep pace with business needs in public, private or hybrid cloud environments. They’re not effective. This is because workloads in cloud environments can have lifespans of days, hours, even minutes — far too quick for manual intervention, which means workloads are at a far higher risk of being compromised before protection policy is applied to them.

Challenge four: decentralised management.

Relying on decentralised security management is becoming very challenging for many organisations because of the increasing number of cloud technologies they now use. Large amounts of cloud technologies mean lots of different cyber threats, so creating a uniform security policy becomes increasingly difficult.

Overcoming these challenges.

The good news is that these challenges can be overcome. It’s a case of taking responsibility for your data, getting the right security technology, setting up consistent security postures and then managing these centrally.

According to Greg Day, VP and CISO EMEA, Palo Alto Networks: “Organisations seeking to embrace cloud computing must take into consideration four primary challenges in order to do so securely. Whilst these challenges may seem a barrier to securely enabling cloud adoption, they are surmountable with the right approach.”

If you choose the right security management and cloud service provider, you’re well on the way to making the most of the cloud’s vast benefits. Have a read of our whitepaper, ‘Securely enabling cloud adoption’ to find out more.