June 19, 2013 By Gretchen Marx 2 min read

We’ve reached the point that most enterprises have moved past “If we deploy a Cloud,” to “When we deploy a Cloud.” Often the next statement is, “We’re going to start small, try it out and see how it goes, before we expand to broader deployment, more users and applications.” What’s the challenge? Usually it is a concern over security, and that may be coming all the way from the Boardroom.

Cloud is seen as very important for business innovation while at the same time there is increasing executive awareness and scrutiny over how the Cloud will be secured. You can start thinking about Cloud security by asking seven questions:

  1. How can we manage the registration and control the access of thousands or even millions of users of our Cloud in a cost-effective way?
  2. Can we ensure the safety and privacy of critical enterprise data in Cloud environments without disrupting operations?
  3. How can we make sure that Web applications are secure and are not vectors for attacks?
  4. How do we manage patch requirements for thousands of virtualized systems?
  5. Can we provide protection against network threats and vulnerabilities in the Cloud?
  6. How do protect virtual machines?
  7. Can we achieve visibility and transparency in Cloud environments to find advanced threats and meet regulatory and compliance requirements?

With all of these questions, it is no wonder that organizations are reluctant to embark on a Cloud journey.

From our work with thousands of customers over the years, we believe that with integrated solutions that cover the security domains of People, Data, Applications, Infrastructure, supported by Threat Information and Security Intelligence, organizations can safely reap the benefits afforded by Cloud innovation.

Check out future blogs as we answer each of these questions in turn. You can also learn more about IBM’s approach to Cloud security in this Solution Brief: Safeguarding the Cloud with IBM Security Solutions.

 

More from Cloud Security

What is data security posture management?

3 min read - Do you know where all your organization’s data resides across your hybrid cloud environment? Is it appropriately protected? How sure are you? 30%? 50%? It may not be enough. The Cost of a Data Breach Report 2023 revealed that 82% of breaches involved data in the cloud, and 39% of breached data was stored across multiple types of environments. If you have any doubt, your enterprise should consider acquiring a data security posture management (DSPM) solution. With the global average…

Endpoint security in the cloud: What you need to know

9 min read - Cloud security is a buzzword in the world of technology these days — but not without good reason. Endpoint security is now one of the major concerns for businesses across the world. With ever-increasing incidents of data thefts and security breaches, it has become essential for companies to use efficient endpoint security for all their endpoints to prevent any loss of data. Security breaches can lead to billions of dollars worth of loss, not to mention the negative press in…

The importance of Infrastructure as Code (IaC) when Securing cloud environments

4 min read - According to the 2023 Thales Data Threat Report, 55% of organizations experiencing a data breach have reported “human error” as the primary cause. This is further compounded by organizations now facing attacks from increasingly sophisticated cyber criminals with a wide range of automated tools. As organizations move more of their operations to the cloud, they must also become increasingly aware of the security risks and threats that come with it. It’s not enough anymore to simply have a set of…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today