+
EDITOR’S QUESTION
INDI SIRINIWASA, VICE
PRESIDENT FOR TREND MICRO,
SUB-SAHARAN AFRICA
///////////////////
T
he cornerstone of a multi-cloud
strategy is that business and their
users benefit from factors that
extend better performance and speed,
cutting costs and allowing for better
resource management
The biggest challenge business faces when
adopting a multi-cloud strategy is the art of
keeping various cloud environments secure,
it is an exceptionally involved process as
each cloud comes with a different set of
security protocols, tools and even policies.
Now if you factor in multi-tenancy in a cloud
the process becomes even more complex for
you the user.
The answer to how one manages all of this
is not that different to how you have always
approached security. Ensure your policies
are in place, then map your cloud framework
and architecture, define user access across
and within these environments, but then also
make security intrinsic to everything you do.
The days of bolting on security after the fact
are long passed – in today’s world we need
to build infrastructure with security, not place
security on the infrastructure.
It is still important to keep an eye on unusual
user log ins as well as large amounts of
data being imported or exported. But it is
easier to do this if you deploy security at the
hypervisor level in the cloud – which is what
Trend Micro does for clients with its Deep
Security solution.
www.intelligentcio.com
This forms part of what we call a multi-
layered approach to security, namely
security that goes beyond just the endpoint,
right into the heart of the hypervisor and
then automates the security health of all of
your infrastructure namely clouds, physical
infrastructure and virtual environments
– and allows an organisation to continue
running smoothly without downtime.
Ultimately if building a secure environment
could be equated to baking a cake, then
security needs to be the eggs you put in
the recipe. The eggs (security) need to be
baked directly into your cloud environment
with auto-generated deployment scripts for
your configuration management tools. Once
this is in place you will not only be able to
better secure all aspects of your business,
but you will be able to layer your security
policies across multiple environments and
differing clouds, that you can now monitor
and manage from a centralised environment
– without having a dashboard, team or
security system per cloud. n
INTELLIGENTCIO
27