The Doppler Quarterly Fall 2019 | Page 3

THE DOPPLER EFFECT Cloud transformations create opportunities for your organization to do things you've never done before – deploy applications in minutes, pay only for what you consume, and rapidly scale resources on demand and around the globe. Throughout the years, we have written extensively about digital transformations and offered guidance about how you can position your company to take advantage of the many benefits cloud can deliver. However, one subject remains a top concern, often impeding progress at many stages of a cloud pro- gram: Security. According to a new 451 Research survey of 1,001 enterprise IT decision-makers, 68% see security and compliance challenges as the biggest barrier to public cloud adoption. IT leaders are concerned about threats across their ecosystems – and for good reason. It’s rare to go a month or more with- out hearing about a major breach or data disclo- sure. Moving to the cloud increases the size of the threat vector and adds another variable to the already formidable challenge organizations face when protecting their critical assets. But what if we look at cloud security another way? What if security in the cloud isn’t seen as an obsta- cle but rather as an opportunity to further trans- form your organization? What if moving to the cloud presents a chance to rethink your entire approach to security? This edition of The Doppler Quarterly explores the different roles security plays in cloud transfor- mations – as a hurdle to be scaled and a catalyst to be embraced. Our cover article, “The Hidden Opportunity of Security in the Cloud,” looks at how moving to the public cloud can help compa- nies accelerate innovation, while also reducing the burden on already overworked IT security staff. What if security in the cloud meant: • I  mplementing automation: Minimizing the opportunities for human error and ensuring your team is complying with relevant data regu- lations and corporate policies. • E  mbracing immutable infrastructure: Once deployed, a server or infrastructure is baselined, with patching happening via deployment pipe- line, thus making it much easier to detect and enforce when a resource has been maliciously or accidentally modified. • R  evisiting who has access to what informa- tion: Creating new policies that work both in the cloud and on-premises can clarify privileges and streamline processes that may have been muddied by organizational and technological changes over the years. • C  hanging your mindset: Assume you will be breached, and gear up for a fast remediation. Moving to the cloud enables you to be more agile, ready to respond quickly and proactively. From adopting best practices for securing hybrid cloud and multicloud environments to developing the right alerting strategy, we hope you find our security-focused Doppler Quarterly helpful in your own cloud transformation. If you’re unsure about how resilient your cloud security strategy is, or are looking for guidance on how best to protect your apps and data across all edges, clouds, and data centers, we’re here to help. Mark Gilmor Principal Architect & Director, Cloud Security Practice Lead, CTP HPE Pointnext Services FALL 2019 | THE DOPPLER | 1