Cloud Use is On the Rise; Is Security Catching Up?
There’s plenty of evidence to suggest that cloud adoption is trending up. For instance, Gartner analyst Ed Anderson, in the March 2015 report Cloud Adoption Trends Highlight Buyer Preferences and Provider Opportunities, states that “Gartner has observed steady yet aggressive uptake of cloud services, sometimes complementing legacy systems and sometimes replacing them outright. The key drivers for cloud adoption are organizational agility, cost benefits and increased innovation.” However he also cautions, “These drivers are offset by persistent concerns about security and privacy, which continue to inhibit adoption, particularly of public cloud services.”
Louis Columbus’ article in Forbes early this year states “42% of IT decision makers are planning to increase spending on cloud computing in 2015, with the greatest growth in enterprises with over 1,000 employees (52%).” Perhaps the most telling of the bright future of the cloud, more than 60% of enterprises will have at least half of their infrastructure on cloud-based platforms according to Bill McNee, Founder and CEO, Saugatuck Technology, in a Cloud Business Summit keynote presentation said that by 2018.
Let’s flip this coin. What about the security concerns the Gartner analyst alludes to? Clearly cloud and hybrid deployments are further eroding the network perimeter that used to be secured through the use of switches, routers, jump hosts, firewalls, VPNs, and network access control for private networks. As this trend continues, these older, perimeter-focused security solutions can’t possibly work effectively in the new perimeterless world in which we live in.
And there is evidence that suggests that IT personnel are worried. In an article in PivotPoint titled Top Security Concerns: Employee Misuse and Access Control by Kelley Katsanos, she quotes a recent Bitglass study of more than 1,000 IT professionals that found that “90 percent of respondents still express concern over public cloud security.” Top cloud security concerns involve employee misuse and access control, according to the report, such as “unauthorized access (63 percent), hijacking of accounts (61 percent) and malicious insiders (43 percent).”
With unauthorized access as the top security risk factor, doesn’t it make sense to think about how access is restricted to both your on premises AND cloud-based services and applications? What if you could create a 1:1 mapping between a user and cloud-based (or on-premises) application or service by dynamically generating a firewall rule? What if you could also factor in the user’s context and security posture? Users could then securely connect DIRECTLY to the requested resource – making everything else effectively invisible. Cryptzone is doing just this with AppGate.
There is a new way to manage user access to corporate network and cloud-based resources. Google has realized this and is blazing a new path forward. Solutions like AppGate are helping enterprises remain competitive and make sure their networks and cloud-based services and applications are secure and accessible as they move outside of their old network’s perimeter to take advantage of all that the cloud has to offer.
Learn about AppGate, an ‘Invisible Infrastructure’ and Access Management Solution for Cloud and Hybrid Environments.