fbpx
Share

Crafting an Identity-based Security Strategy for Cloud

By Richard Dornhart, National Security Practice Manager, Data#3 Limited

As most of IT professionals would agree, cyber security is a massive issue in today’s digital world. And yet, organisations of all sizes are struggling to address an increasingly complex threat landscape.

IT SecurityIn the context of enterprise Cloud security, Identity and Access Management (IAM) tools play a greater and more critical role. For instance, in a recent TechTarget article the author suggests that whilst it’s not difficult to build new security approaches into new Cloud-based applications, the harder aspect of IAM is to extend this security model into traditional IT.

Furthermore, the selection and implementation of an IAM procedure for Cloud security requires a different security approach, with identifying common patterns and technologies being a key first step.

The key takeaway, is that IT leaders need to consider their industry and its particular compliance regulations for Cloud – before the implementation of identity governance to avoid potential pitfalls or challenges in the retrofitting of policies.

Read the full TechTarget article.


Contact Richard on LinkedIn

Tags: Security

Featured

Related

Managed Services eBook
Your guide to Data#3 Managed Services

Digital disruption is causing significant changes in the workplace, leading to higher expectations for access, security, and support regardless of…

JuiceIT Guest Blog | How XDR can help when time is of the essence

The only thing worse than cyber threats is an inability to detect those threats in time. Organisations need the…

JuiceIT Guest Blog | Veeam Platform: Reliable and Fast Recovery from Ransomware in a Hybrid World.

Ransomware attacks have become a growing concern for organisations of all sizes in Australia and New Zealand, resulting in significant…

Customer Story: Pernod Ricard Winemakers

Azure Migration gives Pernod Ricard Greater Flexibility and Improved Performance Download Customer Story Contact a Specialist…

Why would you deploy SASE?
If Secure Access Software Edge (SASE) with Cisco Meraki is the destination, what does the journey to get there look like?

Firstly, let’s set the scene. The term SASE was first mentioned by Gartner Analysts in July 2019 and Gartner continues…

Data#3 named (HPE) Platinum Partner of the Year and Aruba GreenLake Partner of the Year
Data#3 enjoys double scoops at HPE/Aruba awards night

December 08, 2022; Brisbane, Australia: Leading Australian technology services and solutions provider, Data#3, is proud to announce that it has…

Azure BaaS
Protecting Data in a Cloud World: Will Backup as a Service be what Keeps Your Business Online Through a Crisis?

Very few organisations could run in a technology-free environment, so naturally, strong IT departments put considerable effort into business continuity…

Azure Site Recovery
Beyond Backup: The Role of Azure Site Recovery in Business Continuity

In the first of our Azure Backup blog series, we discussed the value of data, and the critical importance…