As more and more enterprises move to the cloud, IT managers have their hands full when it comes to ensuring they do not become exposed to security breaches, data privacy exposures, and compliance issues.
[easy-tweet tweet=”IT managers have their hands full they do not become exposed to security breaches” hashtags=”tech, cloud, IT”]
In the last year alone, thereโs been a significant increase in the number of CIO mandates only to adopt cloud applications. Research from IDC claims that by 2019 IT managers and enterprises will be spending more than ยฃ100 billion annually on cloud services. Of course, when approached in the right way, the cloud can deliver considerable benefits to organisations, but there are some challenges facing IT managers along the way:
Covering all the bases
As agencies move to the cloud, they will likely continue to have many critical applications that remain on-premises, some for many years to come. So even if a โcloud-firstโ mandate exists, any cloud-based identity management solutions must provide comprehensive coverage to this hybrid IT environment.
Dissolution of the โnetwork perimeter.โ
Employees today can use their personal devices to access corporate accounts in the cloud. This means that IT managers need visibility into and control over that. Often, the only link IT has between the end-user on a smartphone and an account for a SaaS application is the userโs identity.ย So actually managing that identity is the key to managing the perimeter-less enterprise.
Data, data and data
Weโre seeing an explosion of unstructured data in the enterprise and out to the cloud in storage systems such as DropBox.ย More often than not this is data that was previously kept secure in a database or application but in the name of convenience and collaboration it has now been distributed in a largely uncontrolled fashion. With potentially sensitive data making the move to cloud storage services, it is crucial for organisations to understand and manage where this data exists and who has access to it.
For IT managers to make the most of the cloud without exposing themselves to security and privacy concerns there needs to be a shift in organisationsโ overall approach to IT security. Since understanding โidentityโ is often the most critical element in linking all this together enterprises need to ensure that identity is at the centre of their IT and security approach.
To do this effectively, the important barriers and separate silos of security and operations processes need to be broken down, to provide better visibility into who is doing what, what kind of risk that represents, and to be more proactive in dealing with threats in real-time โ across the entire hybrid IT enterprise infrastructure.
The ability to manage and control identities across the hybrid IT environment while securely migrating to a cloud company requires sound identity governance. And fortunately for those cloud-savvy enterprises, there is a new generation of cloud-based identity management solutions that meet the needs of managing this hybrid IT environment while extending the benefits of the cloud. However, as with all new markets, there will be technology claims that may exceed a vendorโs ability to deliver.
[easy-tweet tweet=”IT managers need visibility into all the information about an identity” hashtags=”tech, IT, cloud”]
A comprehensive cloud-based identity governance must be able to connect to all enterprise systems, from the legacy applications that have been in use for years to the SaaS applications that are being adopted today. IT managers need visibility into all the information about an identity, across all the applications an enterprise uses, all the data they have, and across all users โ no matter where they are located or what devices they may use. Cloud-based identity governance should also be able to govern everything. Organisations must have a grasp of who should have access, who does have access, and what users are doing with their access to all applications and data for all your users. This requires the ability to define the desired state and continually assess where access is not aligned with the model. Finally, IT managers must empower their users to work how they like to work, wherever they are and on whatever device they want to use. This enables organisations to increase collaboration both inside and outside of the network safely.
By treating identity as a company-wide initiative, organisations can ensure visibility, control and governance to all data and applications. Only by taking an โidentity-firstโ governance approach can IT managers help their bodies become โcloud-firstโ over time, maintaining a safe IT environment while keeping identity management at the foundation of it all.
Kevin Cunningham, President & Founder at SailPoint
In his role as president of SailPoint, Kevin oversees product development, marketing, sales, operations and services. As co-founder of SailPoint, Kevinโs goal from the beginning was to build a forward-looking, agile company with the experience to deliver better service and superior innovation to customers. SailPoint combines all the flexibility of a small entrepreneurial company with a seasoned, experienced management team that brings deep expertise to the identity management space.
Under Kevinโs leadership, SailPoint has achieved landmark growth, posting significant revenue gains, expanding the customer and employee base, and building a global presence. Kevin works continuously to sharpen SailPointโs strategic focus and to align strategic partnerships and corporate development with long-term expansion opportunities.
Kevin previously served as founder and vice president of marketing for Waveset, where he turned ground-breaking innovation into tangible market results. Following the acquisition of Waveset by Sun Microsystems, Kevin led strategic product initiatives for Sunโs software portfolio. Kevin has also brought innovative technologies to market for companies including IBM/Tivoli Systems and UniSQL.
Comments are closed.