Express Computer
Home  »  Columns  »  4 key strategies to secure cloud migration in APAC

4 key strategies to secure cloud migration in APAC

0 554

Cloud computing adoption in Asia Pacific markets has been growing at an unprecedented pace over the past decade, driven by businesses which demand speed and flexibility in delivering applications and services.

Gartner Research projects IT spending on public cloud-based infrastructure services to surpass US$24 billion in 2016, with associated management and security expected to exceed US$8 billion. Private cloud infrastructures, including server and network virtualization and software-defined networking (SDN), are rapidly transforming on-premise data centers into agile software-defined data centers (SDDC).

“As local businesses require more speed and flexibility in delivering applications and services, cloud computing has emerged as the model best aligned to meet the needs of many organizations in India said Rajesh Maurya, Fortinet’s Regional Director for India & SAARC. “Data centers are evolving especially rapidly into both private and public clouds, along with customer demands for fast and secure cloud infrastructure and services.

The cybersecurity firm Fortinet has outlined 4 key strategies to help organizations in Asia Pacific protect their businesses while migrating to private and public clouds:

1. Maintain a Strong Security Posture
Organizations need to maintain a strong security posture in private and public clouds. With the IT efficiencies gained by pooling compute, storage, and network resources through virtualization, SDN, and other technologies, private and public clouds have become increasingly aggregated environments, where not just servers but entire data centers have been consolidated into fewer but more efficient cloud environments.

The mix of data center traffic has further shifted from north-south, which now only accounts for about 20% of data center traffic, to east-west, which represents over 70% of traffic, especially as new software-defined environments continue to optimize underlying hardware utilization and efficiency on scale-out architectures. All of this means it is more critical than ever to isolate business units from applications. Organizations must also segment east-west traffic to minimize the impact of a hacker or advanced threat that manages to breach the cloud perimeter via a single weak or vulnerable application.

2. Segregate & Secure Applications in Hybrid Clouds
Many organizations are starting to employ hybrid cloud strategies, where public clouds are used to host more exposed public-facing workloads with less sensitive data. Public clouds with persistent VPN connections should be segmented from private clouds that need to be more secured.

Conversely, some organizations may use the public cloud to host some sensitive data, such as credit card data subject to
PCI compliance, in order to alleviate strict industry compliance and regulations on the private cloud. Segmentation between the public and private portions of the hybrid cloud are equally important in this approach.

3. Employ end-to-end segmentation strategy
Organizations need to employ an end-to-end segmentation strategy, starting with micro-segmentation within the software-defined data center, and complementing that with internal segmentation firewalling within and across the physical network layers of data centers, campuses, and branch offices. Within the private cloud, advances in network virtualization and orchestration mean organizations should consider a fine-grained micro-segmentation strategy that can uniquely firewall and secure workloads irrespective of physical network topology, even down to a single virtual machine or workload.

4. Activate Data Leakage Protection (DLP) and Monitoring
Besides firewalling and intrusion prevention, data leakage protection (DLP) and monitoring are equally important in either or both directions, to ensure that sensitive data does not cross cloud boundaries. This is to limit the damage or loss of a breach in a single-cloud environment.

“Having a comprehensive security strategy for the hybrid cloud, including a single pane-of-glass view of security management and policy across both private and public clouds, is essential in establishing a consistent security posture for an organization, regardless of whether a given workload is running in an internal software-defined data center or on provider-hosted multi-tenant infrastructure,” added Rajesh Maurya.

Get real time updates directly on you device, subscribe now.

Leave A Reply

Your email address will not be published.

LIVE Webinar

Digitize your HR practice with extensions to success factors

Join us for a virtual meeting on how organizations can use these extensions to not just provide a better experience to its’ employees, but also to significantly improve the efficiency of the HR processes
REGISTER NOW 
India's Leading e-Governance Summit is here!!! Attend and Know more.
Register Now!
close-image
Attend Webinar & Enhance Your Organisation's Digital Experience.
Register Now
close-image
Enable A Truly Seamless & Secure Workplace.
Register Now
close-image
Attend Inida's Largest BFSI Technology Conclave!
Register Now
close-image
Know how to protect your company in digital era.
Register Now
close-image
Protect Your Critical Assets From Well-Organized Hackers
Register Now
close-image
Find Solutions to Maintain Productivity
Register Now
close-image
Live Webinar : Improve customer experience with Voice Bots
Register Now
close-image
Live Event: Technology Day- Kerala, E- Governance Champions Awards
Register Now
close-image
Virtual Conference : Learn to Automate complex Business Processes
Register Now
close-image