THE DOPPLER EFFECT
Cloud transformations create opportunities for
your organization to do things you've never done
before – deploy applications in minutes, pay only
for what you consume, and rapidly scale resources
on demand and around the globe. Throughout the
years, we have written extensively about digital
transformations and offered guidance about how
you can position your company to take advantage
of the many benefits cloud can deliver.
However, one subject remains a top concern, often
impeding progress at many stages of a cloud pro-
gram: Security.
According to a new 451 Research survey of 1,001
enterprise IT decision-makers, 68% see security
and compliance challenges as the biggest barrier
to public cloud adoption. IT leaders are concerned
about threats across their ecosystems – and for
good reason. It’s rare to go a month or more with-
out hearing about a major breach or data disclo-
sure. Moving to the cloud increases the size of the
threat vector and adds another variable to the
already formidable challenge organizations face
when protecting their critical assets.
But what if we look at cloud security another way?
What if security in the cloud isn’t seen as an obsta-
cle but rather as an opportunity to further trans-
form your organization? What if moving to the
cloud presents a chance to rethink your entire
approach to security?
This edition of The Doppler Quarterly explores
the different roles security plays in cloud transfor-
mations – as a hurdle to be scaled and a catalyst
to be embraced. Our cover article, “The Hidden
Opportunity of Security in the Cloud,” looks at
how moving to the public cloud can help compa-
nies accelerate innovation, while also reducing the
burden on already overworked IT security staff.
What if security in the cloud meant:
• I mplementing automation: Minimizing the
opportunities for human error and ensuring
your team is complying with relevant data regu-
lations and corporate policies.
• E
mbracing immutable infrastructure: Once
deployed, a server or infrastructure is baselined,
with patching happening via deployment pipe-
line, thus making it much easier to detect and
enforce when a resource has been maliciously
or accidentally modified.
• R
evisiting who has access to what informa-
tion: Creating new policies that work both in the
cloud and on-premises can clarify privileges and
streamline processes that may have been
muddied by organizational and technological
changes over the years.
• C
hanging your mindset: Assume you will be
breached, and gear up for a fast remediation.
Moving to the cloud enables you to be more
agile, ready to respond quickly and proactively.
From adopting best practices for securing hybrid
cloud and multicloud environments to developing
the right alerting strategy, we hope you find our
security-focused Doppler Quarterly helpful in
your own cloud transformation.
If you’re unsure about how resilient your cloud
security strategy is, or are looking for guidance on
how best to protect your apps and data across all
edges, clouds, and data centers, we’re here to help.
Mark Gilmor
Principal Architect & Director,
Cloud Security Practice Lead, CTP
HPE Pointnext Services
FALL 2019 | THE DOPPLER | 1