decrypting myths
of company data increases it requires
continuous upgrades to the hardware
just to keep up. It has effectively become
a bottleneck to the cloud.
Many firms ‘get’ this and have tried it
already – only to be left disappointed.
A particular ‘gripe’ has been that
the switch from appliances to cloud
security typically requires making
sacrifices to their security and
operational practices and having to
forfeit their IP address identity when
they moved to a cloud solution.
Security should follow the user
Instead, security should shift to focus
on the user and securing access to
data as it resides across multiple
third-party clouds. Moving security to
the cloud allows security to follow the
users wherever they go. This means
compliance, malware defence and data
loss prevention are always applied as
users connect to security in the cloud
at all times. In addition, since security
68
Craig Talbot, VP EMIEA, iboss
lives in the cloud, it can scale elastically
to provide the capacity needed to
process an ever-increasing amount of
bandwidth and connectivity.
Furthermore, firms have found they had to
lose the non-shared proxy service that are
native to appliances and moved to proxy
services that are shared across multiple
customers in the cloud. This has resulted
in uneasy implementations and firms have
found they are locked in to one provider.
Issue 19
|
www.intelligentciso.com