Mobilk - UAE organizations face a major disconnect between cloud aspirations and secure cloud infrastructure, with two-thirds (64 percent) of CIOs in the region ranking cloud security as important, but one-third (34 percent) admitting that they do not know if their cloud is secure, according to newly released research from Palo Alto Networks®, the next-generation security company.
In the UAE and across the Middle East, cloud adoption is seeing strong take-up. Currently, 48 percent of UAE CIOs say that their organizations use public, private or hybrid clouds, according to Palo Alto Networks 2017 survey of cloud security.
According to 451 Research, 60 percent of workloads worldwide will run in the cloud by 2018, driving greater agility and scalability, higher performance, and faster access to innovative technologies, all of which enable organizations to gain a competitive edge.
“Cloud is driving digital transformation and businesses’ competitiveness across the Middle East. For a company to truly reduce cyber risk and protect data, they need integrated, automated, and effective controls to detect and prevent known and unknown threats across their entire architecture from the endpoint, to the network, to the cloud,” said Tarek Abbas, systems engineering director, Emerging Markets at Palo Alto Networks.
Cognizant of this shift to the public cloud, Palo Alto Networks outlined its top five priorities for CIOs to secure their public cloud workloads in 2018:
1.Embrace the shared security model. Public cloud providers make it clear that security is a shared responsibility. Organizations are in complete control of what security to implement and must take steps to safeguard content, be that customer data or intellectual property.
2.Engage with business groups and DevOps early. CIOs need to work with DevOps to understand the scope of public cloud projects and ensure the architecture of the application deployments meets business development needs while mitigating security risks.
3.Knowledge is power. By utilizing a virtualized next-generation firewall as part of a natively integrated, comprehensive security platform, organizations gain necessary insight into traffic identity and characteristics, so they can make more-informed policy decisions to protect applications and data from threats.
4.Take a cloud-centric approach. To take full advantage of the cloud, recommended best practices include applying the concepts of the data center to your deployment while leaving the traditional constructs behind. This way, organizations can achieve high availability and scalability.
5.Use automation to eliminate bottlenecks. By seeking cloud-enabled next-generation security with automated orchestration, organizations can eliminate operational “friction,” and take advantage of the flexibility and agility benefits offered in the public cloud. As data and applications reside everywhere, organizations need an automated, consistent security posture from the network, to the cloud, and the endpoint to effectively keep up with automated attackers.
The Telecommunications Regulatory Authority (TRA) concluded its participation in the 38th edition of GITEX Technology Week with a well-attended award..
Cisco today announced the signing of a Memorandum of Understanding (MoU) with Data Mount, a leading data center hosting services company in Oman...