Cloud Services and Vendor Strategy

Noman Qadir, acting country manager, MEA at Citrix discusses the cloud and how this trend is influencing securing strategy for vendors

Tags: Citrix Systems Incorporation
  • E-Mail
Cloud Services and Vendor Strategy IT must build and enforce end-to-end trust in the cloud through security, says Qadir.
By  Noman Qadir Published  May 31, 2013

Noman Qadir, acting country manager, MEA at Citrix discusses the cloud and how this trend is influencing securing strategy for vendors.

Cloud services, consumerisation and bring-your-own device (BYOD) have forever changed the notion of information security, as end-to-end IT control gives way to workers making decisions about resources and how they are used. The rise of the cloud era presents both risks and opportunities for IT.

10. Design for your fears
Instead of traditional approaches to information security, IT needs to recognise the new requirements, threats and tactics that arrived with cloud computing. By implementing a secure-by-design architecture, you can simultaneously optimise productivity.

9. Embrace consumerisation
IT has long resisted the use of consumer technologies in the enterprise, and for just as long, people have used them anyway. People are often more productive with these tools, and no wonder; consumer technologies are more advanced and engaging than their corporate counterparts.

8. Make IT personal
In the cloud era, the computing experience is tailored to the individual – not defined by IT’s need for standardisation and control. Allowing personalisation in devices, applications and data enables a fit-to-purpose work experience that improves productivity and job satisfaction.

7. Refocus on networking
It’s not enough for enterprise networks to be high-speed, highly redundant, resilient and secured against compromise. To enable full mobility and anywhere - anytime access to resources, it’s essential to maximise secure portability as well.

6. Re-factor access
The cloud and BYOD don’t have to destroy information security; in fact, they create both the need and the opportunity to make security much more specific and relevant. IT can gain greater control over complex data relationships by making access decisions based on the five W’s of information access: who (identity), what (device), when (situation), where (location) and why (usage case).

5. Define relationships
Relationships are the new networking. Viewing your network as a complex set of connections and policies for relationships between entities, not just simple ports and subnets, will help build and scale to meet the networking demands of the cloud era.

4. Virtualise to secure
Virtualisation unlocks new opportunities and innovations to address business needs, including the transformation of security. Effective virtualisation security protects mobility, collaboration and social computing through isolation of sensitive resources, and is essential to the success of BYOD.

3. Presume multi-tenancy
Shared-ownership computing architectures are an important part of the cloud, with implications for ownership, management and security. A proven design that protects administrative, tenant and external services from each other is essential for maintaining security and compliance.

2. Own your own
By managing access to data and apps, rather than the device itself, IT can avoid encroaching on the ownership rights of BYOD participants while ensuring security policy on any device.

1. Enforce end-to-end cloud trust
People need to be able to pick up any device and know what kinds of work they can do securely on it, with an automated security experience for BYOD and cloud services. By ensuring that people, processes and technologies support core principles of trust at every level from architecture to audit, IT can allow the organisation to say, “In cloud we trust.”

Add a Comment

Your display name This field is mandatory

Your e-mail address This field is mandatory (Your e-mail address won't be published)

Security code