As companies scramble to the cloud, security takes center stage

  • I’m extremely delighted to share some information of an occasion we have coming up, which gives clean perception on securing hybrid and multi-cloud environments.

    Cloud security may perhaps look a well-worn matter. But as the technology and the use scenarios evolve, so do the issues for securing networks and information. We transitioned as a group from skeptical, figuring that no virtual surroundings could be as protected as a single confined to the four walls of a details middle, to apprehensive – dipping in our toes with lessen risk workloads like storage and email. And now most each company, from modest to significant, relies at the very least in element on cloud to support the IT infrastructure.

    But apparently, the really methods that lead to the two agility and security inside of the cloud – hybrid and multi-cloud models – can introduce vulnerabilities if not effectively locked down. Which is what our prolonged roster of professionals and practitioners will tackle through our eSummit, “Closing security gaps in hybrid and multi-cloud environments,” Oct. 21-23. How diligent was implementation planning? Was access administration correctly addressed? How are legacy devices and applications managed? Are you compliant with info-privacy criteria? Among the featured speakers: Bob Kolasky of Homeland Security’s Cybersecurity and Infrastructure Security Agency Fredrick “Flee” Lee of Gusto Steve Lukose of Clari Tee Patel of Iron Oak Security and extensive-time cloud security and facts protection qualified Umesh Yerram.

    Particularly in the latest setting, where by companies are fast adapting to the distributed workforce, cloud computing can be the biggest enabler, but also a critical security problem. Join us starting up at 10:30 a.m. on Wednesday, Oct. 21, to hear how to strike the good harmony. I’ll see you there.