Warning – cloud congestion, too many flying blind

Cloud has never been so congested. According to a recent Gartner report, through 2022 the market size and growth of the cloud services industry will be nearly three times the growth of overall IT services.

Dave Shephard, Bitglass Australia, says: “Clearly it is imperative that cloud-powered enterprises gain visibility into threats beyond the network perimeter and implement comprehensive cloud security strategies that proactively protect sensitive business information.”

As this momentum for cloud computing continues to build, relying on traditional  IT security strategies means ‘flying blind’ in the cloud.

A Bitglass report found that 75 percent of organisations leverage multiple cloud solutions, but only 20 percent have visibility over cross-app anomalous behaviour. With more and more organisations storing sensitive information in the cloud – information like customer data (45 percent), employee data (42 percent) and intellectual property (24 percent) – adopting proper cloud security measures is critical.

In a world where employees are performing more and more of their work in the cloud and outside corporate headquarters, it’s time for organisations to use tools that allow them to fill the security gaps that put data and users at risk. Typically, this involves addressing three key concerns: shadow IT,  mobile devices, and data  access.

  1. Shadow  IT

In the cloud, users can access specialised applications that help them to complete their work more quickly and efficiently than ever before. Unfortunately, this is not always done with the permission (or even the knowledge) of IT departments.

For users, this may entail utilising a private Dropbox account to copy company documents and complete tasks away from the office; alternatively, it might involve circumventing IT to leverage unsanctioned applications that can jeopardise a company’s overall cybersecurity.

These kinds of user behaviours introduce a host of security concerns. Regrettably, they can prove challenging to address, since IT  cannot manage what it cannot see. Consequently, discovering shadow IT is critical.

  1. Mobile  devices

The increased use of mobile devices in the enterprise represents a significant security headache for IT professionals, who are now faced with the two-pronged challenge of mobile data access and BYOD (bring your own device).

Typically, organisations have no control over the security of external networks that employees might use when working remotely from mobile devices. With respect to BYOD, users now demand anywhere, anytime access to corporate data and reject security tools that impair device functionality.

These issues are compounded by the fact that today’s cloud apps encourage users to synchronise all of their accounts and data across all their devices. This can increase the likelihood of data leakage and expose corporate data to any malware that may be infecting said endpoints.

To  address these issues, organisations need to find technical solutions and governance protocols that minimise cybersecurity threats.

  1. Beyond endpoint security

Preventing external intruders from gaining access to the corporate network is no longer sufficient for enterprise security. Today’s cloud-first organisations need to implement comprehensive protections capable of securing data when it is at rest in the cloud, when it is stored in any device, and when it is in transit between the two.

Users can now view, use, download and share data in more ways than ever before. So the enterprise must implement access management systems that verify user identities, block unauthorised access, identify traffic heading to high-risk destinations, and remediate risky or malicious employee behaviours.

Tired of flying blind?

As enterprise cloud usage continues to grow, organisations need take steps to ensure they are adequately protecting data within the cloud. Fortunately, specialised  solutions termed cloud access security brokers (CASBs) have emerged as the security tools of choice for today’s business world.

CASBs grant thorough visibility through activity logs that detail all data access, as well as shadow IT discovery that reveals the unmanaged applications used by employees. The solutions also provide identity and access management capabilities that authenticate users and govern data access by a variety of factors.

Features like data loss prevention (DLP) and encryption offer robust data security, while advanced threat protection (ATP) can defend against zero-day malware.

For enterprises that recognise the need to go beyond traditional, on-premises security measures, CASBs offer the protections that make it possible to soar through the cloud without flying blind.

Each year, Bitglass conducts research on the state of enterprise cloud security in order to identify key trends and common vulnerabilities. This year’s report found that 75 percent of organisations leverage multiple cloud solutions, but only 20 percent have visibility over cross-app anomalous behaviour. With more and more organizations storing sensitive information in the cloud – information like customer data (45 percent), employee data (42 percent) and intellectual property (24 percent) – adopting proper cloud security measures is critical.