editor’s question
DRAGAN PETKOVIC,
SECURITY PRODUCT
LEADER ECEMEA
ORACLE
O
ne of the biggest
complaints with
cloud services
is that there
are perception
problems of
security, latency
and governance. Why would I put my
data on a computer that I don’t control?
However, today’s borderless enterprises
are increasingly turning to cloud
computing in an effort to protect
themselves against the rising tide of
external cyberthreats.
Companies respond in several ways to
mitigate the threat of cyberattacks which
includes hiring CEOs who come from
a cybersecurity background, as they
know how to manage risk and speed up
migration to the cloud.
By 2025, 80% of cloud operations
risk will vanish entirely and a higher
degree of intelligent automation will
permeate the cloud platform – becoming
28
the catalyst that further accelerates
enterprise cloud adoption.
Machine versus machine, battling
sophisticated cybercrime with
autonomous cloud solutions
Cybercrime is becoming
increasingly sophisticated and
organisations are finding it difficult to
effectively detect, prevent and
respond to modern cyberattacks.
In March, Oracle announced its
Autonomous Data Warehouse Cloud
Service, a solution that protects systems
from external attacks and malicious
internal users by automatically applying
As mobile users
proliferate and the
network edge moves
into the cloud, your
IT resources are
vulnerable to
new threats.
security updates with no downtime while
also encrypting data.
Best practice to ensure security
in the cloud
No cloud service should be without
data encryption.
Encryption is one of the easiest
technical controls to implement and a
number of organisations opt for it as
a quick win since it requires minimum
human intervention. It has been used
for decades and it is a big concern that
some organisations are still not using it
to protect their confidential data.
Many enterprises are also implementing
security solutions that analyse user
behaviour. Rather than focusing solely
on quickly identifying attack objects
such as viruses, malware or beating
the hackers to the punch with early
discovery of vulnerabilities.
Unfortunately, many IT administrators
lose their security precautions with
the adoption of cloud services; there
is no longer any perceived network
separation, physical separation or
unique login procedures. Losing the
controlled administrative access the IT
teams are accustomed to can represent
a significant void in the security
posture. UBA solutions fill this void
by acting as another layer of security
beyond simple credentials.
As mobile users proliferate and the
network edge moves into the cloud,
your IT resources are vulnerable to new
threats. Businesses need consistent
security controls that span cloud and
on-premises environments. These
controls must apply identity context
to better predict, prevent, detect and
respond to threats.
Oracle’s security cloud services make
these leading security technologies
available everywhere to organisations
large and small.
Issue 07
|
www.intelligentciso.com