wonderfully unique software solutions

Threat prevention and users must work in balance: Stormshield

Security cannot be just the responsibility of technology vendors if organisations want to stay ahead of advanced persistent threats to cloud computing, according to endpoint and firewalling specialist Stormshield.

Matthieu Bonenfant, chief marketing officer at Stormshield, has warned that users also have a role to play as cloud services continue to advance — implying that for best results, a balancing of roles may be required.

“Outsourcing in the cloud does not work on any sort of ‘click and forget’ basis: customers need to remain alert and take on several safety responsibilities, or else serious incidents may occur,” Bonenfant says.

He notes that an increased need for online services during the pandemic has cemented the public cloud as a key tool when transforming business operations. However, as organisations move data and applications to the cloud, they also create a larger attack surface.

“Like it or not, the cloud does not offer the option of completely outsourcing the security of migrated IT assets,” Bonenfant says.

“The trust that we bring to our cloud environment must operate at all levels, from outsourced service providers to security applications and solutions managed directly by the customer.”

And when it comes to who secures what in the cloud, there is no single answer, he warns — not least because cybersecurity providers themselves can be attacked.

“It all depends on the model offered by the cloud provider. This is why the company needs to understand what its supplier is responsible for in terms of security, and what it is required to secure itself,” Bonenfant says.

With IaaS, the cloud provider is responsible only for the physical infrastructure underlying the cloud and its security — leaving the customer in charge of security at all other levels, he says.

PaaS adds virtual infrastructure security to the responsibilities of the provider, with the customer taking care of identities and data.

“Finally, in a SaaS model, the bulk of the responsibility for security rests with the supplier; however, the customer must always keep control over identities and their own data,” Bonenfant explains.

Customers should talk to every supplier about which other security responsibilities they have, in line with contract terms — especially when it comes to hybrid or multi-cloud strategies, he says.

According to the UK’s Department for Digital, Culture, Media and Sport, cybersecurity breaches remain a serious threat to all types of businesses and charities.

“Among those identifying breaches or attacks, their frequency is undiminished, and phishing remains the most common threat vector,” it said in its 2021 cybersecurity breaches survey.

“Four in ten businesses (39%) and a quarter of charities (26%) report having cybersecurity

breaches or attacks in the last 12 months.”

Click here to read his full blog post.

( Photo by Edu Lauton on Unsplash )

Recent Articles

TeamViewer solves worldwide customer service complexity for Ford

When Ford technical assistance wanted to streamline customer vehicle repairs globally, it turned to TeamViewer. Bryan Jenkins, powertrain operations...

How Trustpilot and Macrium work together via paid subscription

For consumers of all types of technology, it can be hard to know which online reviews to trust. That's...

How Swiss civil engineers saved money and time with Bluebeam Revu

Ribuna, a civil engineering firm in Switzerland's Interlaken, has rationalised its document management by decentralising and digitising planning and project collaborations with...

Cybersecurity worries a third of IT managers in Snow survey

The top infrastructure management challenge for the many organisations working with hybrid cloud could be cyber threat, a poll by Snow Software...

Sales of digital recording systems for education and training to soar

The global market for recording technologies that can capture lectures and lessons has been forecast to expand by another third over the...

Related Stories

Leave A Reply

Please enter your comment!
Please enter your name here

Weirdware monthly - Get the latest news in your inbox