Create an account


Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Microsoft - The new business imperative: a unified cloud security strategy

#1
The new business imperative: a unified cloud security strategy

<div style="margin: 5px 5% 10px 5%;"><img src="http://www.sickgaming.net/blog/wp-content/uploads/2018/09/the-new-business-imperative-a-unified-cloud-security-strategy.jpg" width="960" height="540" title="" alt="" /></div><div><p><img class="size-full wp-image-126004 alignnone" src="http://www.sickgaming.net/blog/wp-content/uploads/2018/09/the-new-business-imperative-a-unified-cloud-security-strategy.jpg" alt="" width="960" height="540" /></p>
<p>As more businesses begin to explore the benefits of moving on-premises data and applications to the cloud, they’re having to rethink their traditional approaches to data security. Not only are cybercriminals developing <u><a href="https://www.microsoft.com/en-us/security/intelligence-report" target="_blank" rel="noopener">more sophisticated attacks</a></u>, but the number of employees and users who can access, edit, and share data has increased the risk of breaches. In fact, <a href="https://www.gartner.com/smarterwithgartner/is-the-cloud-secure/" target="_blank" rel="noopener">Gartner indicates*</a> that “through 2022, 95 percent of cloud security incidents failures will be the customer’s fault. CIOs can combat this by implementing and enforcing policies on cloud ownership, responsibility and risk acceptance. They should also be sure to follow a life cycle approach to cloud governance and put in place central management and monitoring planes to cover the inherent complexity of multicloud use.”</p>
<p>Instead of relying on a patchwork of third-party security solutions that don’t always speak to each other, potentially leaving systems vulnerable to attack, companies are now adopting a unified, end-to-end cloud security defense. This typically involves choosing a cloud provider that can integrate security controls right into existing corporate systems and processes. When these controls span the entire IT infrastructure, they make it easier to protect data and maintain user trust by offering increased compatibility, better performance, and more flexibility.</p>
<p><strong>Protection that’s always compatible</strong></p>
<p>A holistic, cloud-supported threat warning and detection system can be designed to work seamlessly across every asset of an IT environment. For instance, built-in security management solutions can give IT teams the ability to constantly monitor the entire system from a centralized location, rather than manually evaluating different machines. This allows them to sense threats early, provide identity monitoring, and more—all without any compatibility issues.</p>
<p>Container shipping company <u><a href="https://customers.microsoft.com/en-us/story/msc-travel-transportation-windows-10" target="_blank" rel="noopener">Mediterranean Shipping Company (MSC)</a></u> has gone this route. As in many businesses, MSC’s IT environment is spread across a variety of locations, networks, and technologies, such as container ships, trucking networks, and offices. Its previous security strategy employed a mixture of third-party solutions that often ran into compatibility issues between different components, giving attackers a large surface area to probe. This made MSC vulnerable to threats such as fileless attacks, phishing, and ransomware. However, after transitioning to a unified cloud security solution, it has been able to guard against attacks using protection that integrates effortlessly into its existing environment.</p>
<p><strong>Reliable performance, more efficiently</strong></p>
<p>The more complex an IT environment gets, the more time employees spend testing, maintaining, and repairing third-party security solutions. A unified cloud security approach improves performance by not only providing a consistent, layered defense strategy, but by also automating it across the entire IT infrastructure. At MSC, software and security updates are now done automatically and deployed without delay across the cloud. Information about possible threats and breaches can quickly be shared across devices and identities, speeding up response and recovery times so that employees can focus on other issues.</p>
<p><strong>Security with flexibility to grow</strong></p>
<p>Scalability is another factor driving adoption. A cloud environment can easily scale to accommodate spikes in traffic, additional users, or data-intensive applications. A patchwork of third-party security solutions tends not to be so nimble. At MSC, security controls are integrated into multiple levels of the existing IT infrastructure—from the operating system to the application layer—and can be dynamically sized to meet new business needs. For example, continuous compliance controls can be established to monitor regulatory activities and detect vulnerabilities as they grow.</p>
<p><strong>A unified security approach: becoming the standard</strong></p>
<p>The best security solutions perform quietly in the background, protecting users without them noticing. Unified cloud security does this while also reducing the resources required to keep things running smoothly. “Once you have true defense in depth, there’s less chance of having to single out a user and impact their productivity because you have to reimage an infected machine,” said Aaron Shvarts, chief security officer at MSC Technology North America.</p>
<p>After moving its workloads to Azure and upgrading its previous third-party security solutions to the native protection of Windows Defender, MSC now has a defense strategy that suits the complexity of its business. <u><a href="https://azure.microsoft.com/en-us/product-categories/security/" target="_blank" rel="noopener">Learn more</a></u> about Azure security solutions and how Microsoft can help you implement unified security across your cloud.</p>
<p>To stay up to date on the latest news about Microsoft’s work in the cloud, bookmark <u><a href="https://cloudblogs.microsoft.com/" target="_blank" rel="noopener">this blog</a></u> and follow us on <u><a href="https://twitter.com/mscloud" target="_blank" rel="noopener">Twitter</a></u>, <u><a href="https://www.facebook.com/MicrosoftCloud/" target="_blank" rel="noopener">Facebook</a></u>, and <u><a href="https://www.linkedin.com/showcase/microsoft-cloud-platform/" target="_blank" rel="noopener">LinkedIn</a></u>.</p>
<p>*Gartner, Smarter with Gartner, Is the Cloud Secure?, 27 March 2018, <a href="https://www.gartner.com/smarterwithgartner/is-the-cloud-secure/" target="_blank" rel="noopener">https://www.gartner.com/smarterwithgartner/is-the-cloud-secure/</a></p>
</div>
Reply



Forum Jump:


Users browsing this thread:
2 Guest(s)

Forum software by © MyBB Theme © iAndrew 2016