news

Building a Multi-Cloud Security Strategy for the Work-from-Anywhere World

Spread the love

The widespread shift to remote work brought on The Rise of Hybrid and Multi-Cloud and the Impact on Cybersecurity

Even though cloud adoption has become mainstream, many enterprises still depend on their on-premises data centers for a number of reasons, ranging from protecting intellectual property and regulatory compliance, to cost optimization and resilience. The resulting hybrid computing model is going to be with us for some time. Indeed, Gartner predicts that organizations will spend $200 billion on data center infrastructure in 2021, resulting in a growth rate of 5.2%. The return to offices will also likely drive greater data center transformation spend.

Today’s enterprise data centers are undergoing a transformation to increase cloud usage. With cloud-connected data centers, enterprises benefit from the cloud’s control, scalability and cost savings. At the same time, organizations gain value from on-premises investments, highlighting the importance of hybrid cloud environments. A recent report Enterprises today need an adaptive network architecture that traditional models for securing on-premises data centers lack. Bringing a company’s data center up to date typically means connecting it to one or more cloud service providers, including public and private clouds. As the organization begins to plan out the modernization of its data center security to meet these new demands, it should consider a three-pronged approach that includes zero-trust access (ZTA) and converged networking and security solutions.

Implementing Zero-Trust Access

As IoT devices flood networks and operational environments, and users continue to work from anywhere, organizations need continuous verification of all users and devices as they access corporate applications and data. ZTA operates on the concept of trusting no person and no device automatically, and it requires identification for all requests for network access. This provides additional identity assurance As remote and hybrid work models become standardized across all industries, secure remote access becomes more important than ever before. Applying the zero-trust model to application access makes it possible for organizations to avoid relying as much on the use of a traditional virtual private network (VPN) tunnel that provides unrestricted access to the network. Zero-trust network access (ZTNA) connections grant access on a per-session basis to individual applications only after devices and users are verified. This ZTNA policy is also applied when users are on the network, which provides the same zero-trust approach no matter where a user is connecting.

And since user identification, authentication, validation, and access permissions have become critical, it is essential for enterprises to restrict access strategically to ensure that only legitimate users can access appropriate network resources. This is what zero trust is all about: never assume anything can be trusted simply because it is “inside the perimeter”. This is especially relevant today, with more users and computing outside of the traditional enterprise perimeter.

The Convergence of Security and Networking

Organizations can secure both their on-premises data centers and cloud deployments Looking Beyond Today

Enterprises today must consider security to be an extension of connectivity because it should be integrated into every technology decision. The infrastructure that supports a work-from-anywhere policy requires connectivity plus security. This kind of connectivity means companies need a security model rooted in connectivity. However, this must be done in a way that makes sense for the organization’s future business plans.

CISOs must make sure that workforce mobilization technologies are scalable and eliminate security blind spots. This will enable greater protections for the remote workforce as attackers shift their focus to the expanded threat landscape created Securing the Future of Work Takes a Strategic Approach

Hybrid and multi-cloud strategies have become a necessity for most organizations today, and their security has become paramount as cybercriminals have switched their focus to attacking the less-secure home networks. The proliferation of IoT devices has also added to the complexity of securing the network. ZTNA addresses today’s security needs so that employees can work from anywhere, using any device, without putting the organization’s network in jeopardy.

Learn how Fortinet’s adaptive cloud security solutions provide increased visibility and control across cloud infrastructures, enabling secure applications and connectivity from data center to cloud.

Jonathan_Nguyen-Duy-fortinet.jpg

Jonathan_Nguyen-Duy-fortinet.jpg

Jonathan Nguyen-Duy is a Vice President in Fortinet’s global Field CISO team. He is a well-known cybersecurity author and industry speaker with unique global public sector and commercial experience with a deep understanding of threats, technology, compliance and business issues. Jonathan holds a BA in International Economics and an MBA in IT Marketing and International Business from the George Washington University.