10 Strategies for mastering the cloud and BYO

SECURITY

|
Image: By BiztechAfrica
10 Strategies for mastering the cloud and BYO

By Sean Wainer, country manager, Citrix South Africa

Whether you’re embracing, ignoring or fearing BYO and cloud computing, one thing is for sure:  the notion of security has been irreversibly changed.  This force of change in security has been instantiated by a transfer of power, as BYO, Cloud and consumerisation have taken significant control of the computing environment away from IT.

In previous decades, IT had the luxury of end-to-end control of endpoints, networks, servers, applications and data.  Not so much anymore.  But security architectures haven’t been updated to reflect this reality.  The practice of “Secure everything equally and hope for the best” just doesn’t cut it when dealing with BYO and Cloud.  Clinging to the comforts of security’s past leads to fear for security’s future.

We’re well aware that something needs to be done to return IT to a position where information governance can be assured.  And we need to foster the productivity and innovation associated with BYO and cloud computing. So, with this in mind, let’s explore the recommendations for mastering the new wave of computing architecture:

1.       Design for your fears

Instead of fearing BYO and the cloud, find a way to embrace today’s computing realities. By designing for your fears, BYO and Cloud computing achieve the synergistic goal of optimising productivity and security, empowering both workers and IT. And one of the first fears to get over it consumerisation.

2.       Embrace consumerisation

Embrace and extend consumerisation in the enterprise by first learning how people across every generation are leveraging consumer technologies.  Consumerisation at work often begins with a BYO program that makes the computing experience personal.

3.       Make IT Personal

Information Technology must first support productivity - enabling personalisation, BYO and the personal cloud. The computing experience for the Cloud Era is custom tailored to the individual - and not one-size-fits all.  By making IT personal, the use of devices, applications, data and even the security experience can be fit-to-purpose and therefore more relevant to work.

4.       Refocus on networking

With services moving to the cloud and people connecting to application and data, networking is more important than ever.  Cloud computing and virtualisation requirements also demand that networks are portable.  With increased mobility, we’re more dependent on the network than ever.  Challenge the decades-old outdated assumptions of networking and access to optimise and advance.

5.       Refactor Access

Challenging the assumptions of access doesn’t mean anything goes.  Just because BYO and the cloud have appeared doesn’t mean that we destroy security to accommodate them.  In fact, the opposite is true – security can be made much more specific and relevant, with BYO and cloud providing the impetus. 

6.       Define relationships

Relationships are the new networking. Cloud Era networks are social, federated and service-enabled.  Granular access is integrated.  BYO is a given.  Single Sign On, security optimisation, branch services and follow-me-data are essential for optimal productivity.

7.       Virtualise to secure

Virtualisation is a tailoring of computing to business needs, opportunities and innovations.  This evolution is driving slow incremental changes to existing applications and processes while enabling wild innovation for those who start anew - especially for those who transform security through virtualisation. Effective virtualisation security protects mobility, collaboration and social computing through isolation of sensitive resources.  BYO cannot be effectively secured without virtualisation.

8.       Presume multitenancy

Multitenant is an ownership, management and security model. From cloud to BYO, multitenant is a new reality.  A proven multitenant design is essential to proving compliance and privacy in clouds and other shared-ownership models.  Design for multitenancy to protect administrative, tenant and external services from each other. Good fences make for good neighbors.

9.       Own your own

Own what you manage, manage what you own. Own your own data.  Own your own encryption.  Ask if you really need to own devices, or just the sessions and data that will be utilised by multiple devices.

Enterprise, cloud and BYO management models must be distinct to maintain a clear boundary of ownership.  Be explicit in defining and managing ownership models to avoid the “grey areas” surrounding:

  • Shared devices, responsibility and accountability
  • Data comingling – especially for sensitive data (and email on devices)
  • Privacy, legal and HR concerns
  • Forensic challenges

IT organisations must prepare for these realities by automating the security experience for BYO and the cloud in ways that build and enforce end-to-end trust.

10.   In Cloud we trust

How can we trust in the cloud, the way we trust in other critical infrastructure with Inherent risks?  For cloud services to be relied upon, proven assurance must be transparently visible and multiple failsafes must protect against catastrophe.  More than the simple measures of security, the ultimate goal of the cloud is trust.

Cloud Trust is built on the principles of security, privacy, transparency, and accountability.



Share the News

Get Daily Newsletter

comments powered by Disqus

MORE SECURITY NEWS

Safe Deposit: Defeating cyber-attacks against banks

With online heists once again hitting the headlines, how should banks and their customers protect themselves against similar attacks?  Read More

Large organisations gear up to address aggressive cyber-security business disruption attacks

Although the frequency of a cyber-security attack on a large scale is low, by 2018, 40 per cent of large organisations will have formal plans to address aggressive cyber-security business disruption attacks, up from none this year, says Gartner. Read More

Identity and access management trends for 2015

CA Technologies has identified five key trends for security and identity and access management (IAM) that will impact organisations and security professionals in 2015 as they compete in the application economy.  Read More

Leading newspaper site hacked

Botswana is seeing unprecedented cases of internet hacking with one of the latest attacks targeting one of the country’s leading private newspapers, Mmegi. Read More

Senegal hit by wave of cyber attacks

Senegal has been hit by a wave of hackings in the past two weeks, two of which hit the popular news website Seneweb.com and ADIE. Read More

Cyber attacks may get more virulent, Cisco, Kaspersky warn

Cyber attackers are using more subtle methods to infiltrate corporate networks with the aim of stealing vital information or simply causing mayhem. This is according Kaspersky Lab and Cisco, who say IT security experts should up their game in educating users how to ward off potential attackers. Read More

SIM box task team steps up successes with help from ICT firm

Ghana’s efforts to crack down on SIM boxing fraud have been given a boost by the efforts of Subah Infosolutions Ghana Limited, which now partners with the authorities in the fight against this crime. Read More

Software vulnerability led to Ghana govt site hack

A software vulnerability and failure to update software led to the hacking of some websites on the government of Ghana’s official portal. Read More

CBN issues directive on two factor authentication for internal banking processes

The Central Bank of Nigeria has issued a directive requiring all deposit money banks (DMBs) to implement two factor authentication for internal processes this year. Read More

SA: 57% could not recover money stolen in online fraud

A recent survey conducted by Kaspersky Lab and B2B International found that more than half of those respondents in South Africa who lost money in fraudulent online transactions did not get all – or sometimes any – of their funds back. Read More

PRESS OFFICES

Sage ERP AfricaSAP AfricaSage Pastel AccountingTrust PayVMWareSamsung ElectronicsMitsumi DistributionPhoenix DistributionMTN BusinessSchneider ElectricMultichoiceMicrosoft 4Afrika

FEATURED STORY

Malawi Govt denies clinging to ‘Cashgate’ softwareMalawi Govt denies clinging to ‘Cashgate’ software

The Malawi Government will not exclude the software brand that has been in use for the country’s Integrated Financial Management System (IFMIS), but it has rejected reports implying that it is ‘clinging’ to the old system.

IN DEPTH

Kenya’s digital TV battle hots up Kenya’s digital TV battle hots up

Kenya’s journey to Digital TV broadcasting took a new turn this week, when the Communication Authority of Kenya (CAK) accused three local media firms of intent to disrupt the process.

COMPANY NEWS

MTN demonstrates the benefits of its video on demand offering

MTN showcased the benefits of FrontRow when it streamed high bandwidth video content onto multiple mobile devices using its video on demand (VOD) offering.

VMware appoints Bask Iyer as chief information officer

VMware has announced the appointment of Bask Iyer to the role of senior vice president and chief information officer (CIO) of VMware.