Intelligent CISO Issue 19 | Page 68

decrypting myths of company data increases it requires continuous upgrades to the hardware just to keep up. It has effectively become a bottleneck to the cloud. Many firms ‘get’ this and have tried it already – only to be left disappointed. A particular ‘gripe’ has been that the switch from appliances to cloud security typically requires making sacrifices to their security and operational practices and having to forfeit their IP address identity when they moved to a cloud solution. Security should follow the user Instead, security should shift to focus on the user and securing access to data as it resides across multiple third-party clouds. Moving security to the cloud allows security to follow the users wherever they go. This means compliance, malware defence and data loss prevention are always applied as users connect to security in the cloud at all times. In addition, since security 68 Craig Talbot, VP EMIEA, iboss lives in the cloud, it can scale elastically to provide the capacity needed to process an ever-increasing amount of bandwidth and connectivity. Furthermore, firms have found they had to lose the non-shared proxy service that are native to appliances and moved to proxy services that are shared across multiple customers in the cloud. This has resulted in uneasy implementations and firms have found they are locked in to one provider. Issue 19 | www.intelligentciso.com