Saudi medical aid convoys arrive in Gaza    Over 48 million postal parcels delivered in 4Q 2024    RCRC announces 8 road projects costing over SR8 billion in Riyadh    GCC residents, with tourist or transit visa, can perform Umrah    Sudden deviation tops the causes of traffic accidents in Riyadh    Lendo's $690 million deal with J.P. Morgan: A Game-Changer for Saudi SMEs Osama Alraee on driving SME Growth, Job Creation, and Financial Innovation in Saudi Arabia    Maintenance workers die in fire in Yanbu steam turbine unit    Saudi Minister to visit India for industrial and mining discussions    Saudi Crown Prince receives Syrian President in Riyadh    Israeli forces raid northern West Bank, impose curfew in Tammun and Al-Far'a camp    Canada, Mexico, and China vow retaliation as Trump imposes sweeping tariffs    Ukraine reports 14 killed in Russian missile strike on Poltava    Imavov knocks out Adesanya in second round as Riyadh Season hosts thrilling UFC night    Museum Authority to open second edition of 'Art of the Kingdom' exhibition in Riyadh    Al Ittihad stages dramatic comeback to defeat Al Kholood 4-3 in thriller    Al Hilal returns to winning ways with a dominant 4-0 victory over Al Okhdood    Al Nassr signs Colombian striker Jhon Durán from Aston Villa    Saudi composer Nasser Al-Saleh passes away at 63    Saudi drama icon Mohammed Al-Towayan passes away at 79    Singer and actress Marianne Faithfull dies at 78    Bollywood star Saif Ali Khan 'out of danger' after attack at home in Mumbai    Order vs. Morality: Lessons from New York's 1977 Blackout    India puts blockbuster Pakistani film on hold    The Vikings and the Islamic world    Exotic Taif Roses Simulation Performed at Taif Rose Festival    Asian shares mixed Tuesday    Weather Forecast for Tuesday    Saudi Tourism Authority Participates in Arabian Travel Market Exhibition in Dubai    Minister of Industry Announces 50 Investment Opportunities Worth over SAR 96 Billion in Machinery, Equipment Sector    HRH Crown Prince Offers Condolences to Crown Prince of Kuwait on Death of Sheikh Fawaz Salman Abdullah Al-Ali Al-Malek Al-Sabah    HRH Crown Prince Congratulates Santiago Peña on Winning Presidential Election in Paraguay    SDAIA Launches 1st Phase of 'Elevate Program' to Train 1,000 Women on Data, AI    41 Saudi Citizens and 171 Others from Brotherly and Friendly Countries Arrive in Saudi Arabia from Sudan    Saudi Arabia Hosts 1st Meeting of Arab Authorities Controlling Medicines    General Directorate of Narcotics Control Foils Attempt to Smuggle over 5 Million Amphetamine Pills    NAVI Javelins Crowned as Champions of Women's Counter-Strike: Global Offensive (CS:GO) Competitions    Saudi Karate Team Wins Four Medals in World Youth League Championship    Third Edition of FIFA Forward Program Kicks off in Riyadh    Evacuated from Sudan, 187 Nationals from Several Countries Arrive in Jeddah    SPA Documents Thajjud Prayer at Prophet's Mosque in Madinah    SFDA Recommends to Test Blood Sugar at Home Two or Three Hours after Meals    SFDA Offers Various Recommendations for Safe Food Frying    SFDA Provides Five Tips for Using Home Blood Pressure Monitor    SFDA: Instant Soup Contains Large Amounts of Salt    Mawani: New shipping service to connect Jubail Commercial Port to 11 global ports    Custodian of the Two Holy Mosques Delivers Speech to Pilgrims, Citizens, Residents and Muslims around the World    Sheikh Al-Issa in Arafah's Sermon: Allaah Blessed You by Making It Easy for You to Carry out This Obligation. Thus, Ensure Following the Guidance of Your Prophet    Custodian of the Two Holy Mosques addresses citizens and all Muslims on the occasion of the Holy month of Ramadan    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



Businesses in KSA urged to get a grip on cloud security
Published in The Saudi Gazette on 13 - 07 - 2016

JEDDAH — Cloud use continues to grow rapidly in the enterprise and has unquestionably become a part of mainstream IT – so much so that many organizations now claim to have a "cloud-first" strategy. That's backed up by a recent Intel Security survey of 1200 respondents which showed that 80% of respondents' IT spend will go to cloud services within just 16 months.
Even if that outlook overestimates cloud spend, it still shows a dramatic shift in mindset, and it's often the business, rather than the IT department, that is driving the shift. In today's digital world, the pull of the cloud and its benefits of flexibility, speed, innovation, cost, and scalability are now too great to be dismissed by the usual fears. To compete today, businesses in KSA need to rapidly adopt and deploy new services, to both scale up or down in response to demand and meet the ever-evolving needs and expectations of employees and customers.
This newfound optimism for the cloud inevitably means more critical and sensitive data is put into cloud services. And that means security is going to become a massive issue. Unfortunately, the same survey revealed that the picture isn't great when it comes to how well organizations are ensuring cloud security today. Some 40% are failing to protect files located on Software-as-a-Service (SaaS) with encryption or data loss prevention tools, 43% do not use encryption or anti-malware in their private cloud servers, and 38% use Infrastructure-as-a-Service (IaaS) without encryption or anti-malware.
Many organizations have already been at the sharp end of cloud security incidents. Nearly a quarter of respondents (23%) report cloud provider data losses or breaches, and one in five reports unauthorized access to their organizations' data or services in the cloud. The reality check here is that the most commonly cited cloud security incidents were actually around migrating services or data, high costs, and lack of visibility into the provider's operations.
Trust in cloud providers and services is growing, but 72% of decision makers in the survey still point to cloud compliance as their greatest concern. That's not surprising given the current lack of visibility around cloud usage and where cloud data is being stored. The wider trend to move away from the traditional PC-centric environment to unmanaged mobile devices is another factor here. Take a common example: an employee wants to copy data to their smartphone from a CRM tool via the Salesforce app. The problem is that they have the credentials to go to that cloud service and access that data, but in this case, they are using an untrusted and unmanaged device. Now multiply that situation across all of an organization's cloud services and user devices.
There is clearly a need for better cloud-control tools across the stack. Large organizations may have hundreds or even thousands of cloud services being used by employees – some of which they probably don't even know about. It is impossible to implement separate controls and polices for each of them.
To securely reap the benefits of cloud while meeting compliance and governance requirements, enterprises will need to take advantage of technologies and tools such as two-factor authentication, data leakage prevention, and encryption, on top of their cloud services and applications.
Increasingly, organizations are also investing in security-as-a-service (SECaaS) and other tools that can help orchestrate security across multiple providers and environments. These help tackle the visibility issue and ensure compliance needs are met. That's why I believe we are starting to see the rise of so-called "broker" security services. These cloud access security brokers (CASBs) will enable consolidated enterprise security policy enforcement between the cloud service user and the cloud service provider. In fact, Gartner predicts that by 2020, 85% of large enterprises will use a CASB for their cloud services, up from fewer than 5% today.
The key to this is for companies to be able to seamlessly push and enforce their own security policies from an on-premise proxy infrastructure to a public infrastructure. For the enterprise, this provides the ability, if required, to encrypt corporate data that sits in a public cloud service and offer complete protection for every endpoint. It means the same security policy is applied to the end users regardless of how or where they have connected, whether that's through a public or private cloud, from a smartphone in a coffee shop or a Wi-Fi hotspot at the airport. Another example of hybrid security in action is where a company is using the infrastructure of a public cloud provider, such as Amazon, but retains control and ownership of the server in that infrastructure. It can be managed by themselves and, using an Amazon API, enables encryption of the whole server within that public cloud environment.
Cloud adoption in the enterprise is rapidly approaching a tipping point and now more than ever, there is need for organizations in KSA to adopt a new model of ‘cloud-first' integrated security that enables the centralized control or orchestration of the myriad of cloud services and apps employees use across the enterprise. Cloud security is now a critical element of any business, and it needs to be taken seriously from the boardroom right down to the end users.


Clic here to read the story from its source.