Connect with us

Finance

Security Models of Tomorrow for Work From Anywhere

contact

Published

on

By Sean Duca, Regional CSO, JAPAC

In the early spring of 2020, as the world shifted to work remotely, security models used by many organizations were put to the test.

Remote work was not a new thing, but never before had it been needed at the same scale and urgency. While many organizations used to have some employees working remotely, few were ready for everyone to be remote. The big question facing all organizations was how to maintain business continuity.

Falling back on using VPN to enable secure remote connectivity worked in some instances. Few were lucky and ordered additional licensing, but many were not, as compute infrastructure could not meet such an increased workload. For the many, it was too late to make any significant changes, so they had to ride the storm, work within the constraints of what they had, and plan for a refresh of technology at the first given moment of respite. With scalability being a significant challenge around VPNs, the bigger issue is that many applications used in organizations today reside in the public cloud or are SaaS applications. Perhaps due to these shortcomings, in recent months, an increasing number of organizations have started to examine different ways of enabling secure connectivity out to the edge and the cloud.

Yesterday’s Security Model Isn’t Right for Tomorrow

In the past, secure remote connectivity was fixed and finite. Organizations would typically allow only a certain number of people to connect to the VPN appliances, restricted by licenses. Those remote connections were also fixed, but the applications were set in terms of their location.

Things move far too rapidly to have fixed resources in place in the modern world, and no one knows what tomorrow holds. As a result, flexibility will reign wherever people work, whether in the office, at home, or anywhere in between, for the foreseeable future.

Applications are also on the move. Gone are the days when most of an enterprise’s applications reside entirely within the four walls of its own data center. Instead, applications and data today reside everywhere: on-premises, in the cloud, and at the edge. As a result, a single enterprise perimeter no longer exists.

Securing the Pervasive Perimeter

If the enterprise uses 25 different SaaS-based applications, the enterprise needs to secure each of those tiny data islands out there. Every application and data source needs to be secured. The enterprise must have visibility into how every user is accessing resources, whether they are in the office or remote.

For me, the whole work-from-anywhere model in the hybrid workplace that we have now got comes down to two key things: the need to secure user access and to provide users with what they require to connect to whatever resources are necessary. The remote connectivity needs to be as secure as if the user was sitting in the corporate office. They need to consume everything the same way, at that same level of security.

Inside the four walls of the enterprise, there are typically various security solutions protecting users. That is part of the reason the notion of just having a VPN for providing connectivity to enable remote work falls short. Instead, enterprises must have a degree of inspection and a level of security rigor to minimize the risk that organizations face every day.

Get Out of the Shadow (IT)

To be fair, all the controls that enterprise IT placed on users didn’t always work either. For example, a common challenge with centrally secured IT resources is the issue of shadow IT, where users would go around their IT departments if they couldn’t get the resources they needed.

As we’re thinking about the security models of tomorrow, it’s an opportunity to try and step out of the shadows. Now is the moment to work closely with our users to determine which applications they use and want—ones that will make them more productive—by leaning in, talking to users, and soliciting as much feedback as we can. Why? Because sometimes, we don’t know all the answers until we ask.

Shadow IT was always about productivity. Embracing a security model that supports the way users want to work, with the applications they need, will let them do their jobs better.

Survive. Thrive. Optimize.

The first phase of enabling remote work in the face of the pandemic was just about survival and making sure work could continue. The second phase was all about making the best of the situation and attempting to thrive. Now it’s time to optimize and build out the security model of tomorrow for work from anywhere to reality.

Providing a secure model for hybrid work requires agility, and it demands scalability. Gone are the days when security and remote work was only enabled by boxes and fixed licenses that limited the ability of organizations to support hybrid work properly.

What is needed is an always-on model that is cloud-delivered, available on-premises and at the edge. In addition, it is a model that should scale up in terms of resources and capabilities as needed

The secure access service edge (SASE) approach is a great model for enabling hybrid work with software-enabled paths. Layering in Zero Trust with SASE helps protect the pervasive perimeter and the various silos of applications and data that users access every day.

It is unknown what the world of tomorrow will be. Who knows what it will throw at us, but we know that there is a need to be nimble and agile. Security needs to be flexible and elastic to wrap around users’ needs, wherever they are, and no matter how they access applications.

Learn more about maintaining a secure hybrid workforce with a holistic cybersecurity platform.

Article: cio.com

Finance

Bangladesh’s Smartphone City Gathers Chinese Manufacturers

contact

Published

on

© Provided by Xinhua

DHAKA, July 21 (Xinhua) — Kohinoor Akhter Shikha never thought that someday she could make smartphones in her neighborhood well known as Bangladesh’s textile industry hub.

This was a dream coming true for S

Original Source: bignewsnetwork.com

Continue Reading

Finance

Scaling One Peak After Another

contact

Published

on

By

Cloudera has appointed Remus Lim as vice president of Asia Pacific and Japan, to drive adoption of the hybrid data platform across the region and support customers in their journey to become more data-driven. We’ve asked him to share his vision for Cloudera in APAC and reflect on his past few months since taking up the mantle.

What drew you to the tech space and attracted you to the roles you’ve held? 

Being able to uncover the full potential of what tech can do has always been an aspect that excites me. The latest developments in the cloud space are pushing existing boundaries, especially now with how machine learning and AI are transforming business intelligence. The tech space evolves so rapidly that it’s impossible to remain static.

Having spent over two decades in the industry, it has been fulfilling to see how the data and analytics solutions we deliver are helping customers realize their business outcomes.Each journey that we embark on with our customers, reaching one project milestone after another until the vision and strategy become reality, gives me a great sense of achievement.   

Why did you choose Cloudera as your latest destination? What was your impression of the company before you joined and was it any different after you started?

Open source reinforces ecosystem growth, and drives adoption and innovation. That was my impression before I joined Cloudera. Was it any different after I started? Absolutely! The pace of innovation is way faster than I expected.

What was your first order of business when you took over as vice president of APAC? 

Rally the team towards Cloudera’s next phase! We are out on our multi-function hybrid data platform journey with our customers and partners, focused on driving great business outcomes.

Exploring new opportunities, such as cloud native, is an exciting venture for us.

We are renewing our commitment to the channel by decentralizing our channels team so our channel strategy is more closely aligned to each market.. 

Working alongside capable leaders to steer high-performing teams is also essential in driving overall growth for the region. Wing Leong Ho has been promoted to vice president of solutions engineering in Asia Pacific, and the team collaborates closely to ensure that our customers are successful. 

Wee Tee Lim is the newest addition to our team and he now leads the Association of South East Asian Nations (ASEAN) region, which I was responsible for previously. Wee Tee has a strong solution sales background and is extremely customer focused. I am excited to have him on board to lead our ASEAN team.

I find it important for leaders to have a clear sense of what’s on the ground, and also for the team to be aware of our progress. I’m very focused on making sure the teams have a holistic perspective of the work we do. 

As we have adopted a hybrid working mode, there are now more frequent and direct communications among my team on focus areas and opportunities for the quarter. Constant communication and validation through data keep us working together seamlessly while celebrating customer wins across teams and sustaining our momentum. 

What are your plans for Cloudera in the region, and what are the top priority projects that you will be starting or leading?

Now that borders are open I’ve been spending time connecting with team members in person. Visiting our different offices gives me a clearer picture of the landscape in which our business operates, from cultural nuances to regulations. Interacting with customers face to face also paves the way for a better working relationship as we develop a more intimate understanding of their goals and how we can work together to achieve them. 

Our ultimate aim is to make data and analytics easy and accessible for everyone, and you’ll see new products from us in the coming months that bring this into view for medium-sized companies and cloud native businesses. 

It’s common for businesses to think that they will have to sacrifice performance if they choose to be cost efficient, or to forgo control when they opt to move at speed. We believe that with the Cloudera Data Platform we can help customers drive value with both performance and cost efficiency, while fueling growth with speed and control.     

Can you share more about the trends you are seeing in the cloud space and how Cloudera can tap onto these trends?

Data volumes and data sources continue to expand at breakneck speed. This influx demands a greater emphasis on leveraging data, and we anticipate that this will accelerate the adoption of a hybrid, multi-cloud approach to APAC businesses. The future data ecosystem should leverage distributed data management components, on multiple clouds and/or on-premises, that operate as a cohesive whole with a high degree of automation. 

At Cloudera, we deliver multi-function data analytics integrated with secure and governed data management, for hybrid and multi-cloud data, that is open and extensible and operates as a cohesive system. Being the only hybrid data platform that supports modern data architectures places us in the best position to support enterprises in transforming complex data into actionable insights to become more data-driven.

As enterprises identify more use cases for their data, democratizing access to data and enabling a low-code or no-code approach to data and analytics will be a fit for these needs. 

What are your hobbies, and what do you do to recharge?

Like many others, I acquired new hobbies during the “stay home” pandemic. I’m proud to say that I have amassed quite an impressive collection of rare plants including some varieties like the variegated Monstera, Florida ghost, Philodendron Gloriosum, etc. I adopted three cats during the pandemic, a Bengal, a Siberian, and a Maine Coon, and set up a new aquatic tank. My wife is glad that I’m not stuck at home anymore!

Before the pandemic changed nearly everything, I would frequently go on hikes overseas around the Himalayas region in places like Nepal, Ladakh, and China. In fact, adventure invigorates me, because every trip is different and it does not always go as planned. That’s the fun of it.

After seeing Nepalese mountaineer Nirmal Purja share his story of scaling 14 peaks, I’m even more inspired! 

As the VP of APAC, you must be very busy. How do you maintain balance between family and work?

It might be easy to lose sight of the boundaries between life and work, even more so if you’re passionate about what you do. Outside of working hours I make it a point to be present when I’m spending time with my family. There are some regular activities we do together, such as attending musicals and art exhibitions. We are art lovers and strong supporters of local artists.

It also helps to have a partner who is aligned on family commitments and who has a shared understanding. This goes a long way in ensuring that both of us can pursue our career aspirations while nurturing our family. 

The Unplug Days at Cloudera, which happen every few weeks, give me more leeway for personal time outside of work, and I treasure having these extra moments with my family. 

In your opinion, what are the traits of an effective leader? 

People follow leaders who they can trust and who can lead them out of adversity. Mountaineers have always inspired me in the way they are fearless in facing challenges, calm when navigating uncertainty, and stellar at mastering teamwork. Once they have scaled one peak, they are ready to conquer the next. 

I believe in leading by example and forging a clear path for the team. Leaders must be decisive even as the conditions shift, and muster the courage to make a judgment call. We shouldn’t shy away from making tough decisions because we are afraid to fail, and I encourage my team to have this same mindset. This is only possible if leaders create a safe environment for their teams to realize their potential, built on a strong foundation of trust.

Trust is paramount in the workplace, especially in this hybrid work environment. Managers need to set clear goals and expectations, while providing employees autonomy to raise morale, collaboration, and productivity. Two-way communication is key and it is where I will discover insights for me to grow as a leader too.

We all know that “change is the only constant,” and the fast-paced tech sector means we must always think on our feet. Speed is of the essence and we need to be able to adapt and evolve to the environment to remain relevant. This applies to both work and life. 

Cloudera is hiring for roles across the APAC region. To join our stellar team, refer to opportunities at https://www.cloudera.com/careers/locations/apac.html.

Data Center

Source: cio.com

Continue Reading

Finance

Protecting Your Supply Chain With Data-Aware Security

contact

Published

on

By

In a previous article, we talked about the need for organizations to secure data wherever it resides. The complexity of today’s supply chains brings that need into sharp focus, while highlighting some of the challenges of successfully protecting data.

Many organizations today depend on a complex web of partners, vendors, and suppliers to run their business. As the size and complexity of the digital supply chain grows, so does an organization’s vulnerability.

One need only look at the infamous Target breach of 2014, which exposed the data of nearly 110 million individuals due to a backdoor that a contractor inadvertently created, to realize that an organization is only as secure as the weakest link in its supply chain.

The scope of this problem is serious enough that it has gotten the attention of the US government’s Department of Commerce, which released new guidelines for addressing cybersecurity supply chain risk in May 2022.  

The bottom line? If organizations are going to be sharing sensitive data with an extended supply chain, they need to take the proper steps to do so in a secure manner. 

“Collaboration within and across company boundaries is pushing sensitive data around the globe at record speed, which means that securing how data is used, shared, and created is just as important as how it’s accessed. At Skyhigh Security, we protect your critical data anywhere you do business,” said Anand Ramanathan, Chief Product Officer, Skyhigh Security.

Securing the cloud

To collaborate across the extended enterprise, many organizations have turned to the cloud. It’s not uncommon to create a link to content in a system that can easily be shared with a third-party contractor or supplier, or to invite them to be a member of a specific Teams group or Slack channel.

Those collaboration models are all fine and well, but what are the security implications?

First and foremost, the security professionals at organizations need comprehensive visibility into who has access to a particular set of sensitive data that is made available through a cloud solution. Not only who has access, but what level of access they have, what they are doing with the sensitive data when they interact with it, and whether their access can easily be revoked once the project comes to an end or circumstances change.

“Skyhigh Security’s solutions help data protection professionals gain visibility into what data’s being shared with the larger supply chain, while better understanding dataflows and ensuring adherence to security policies,” said Ramanathan.

Don’t forget internal applications

Securing the supply chain is further complicated by the fact that partners and vendors often need access to any number of an organization’s internal, proprietary applications. Historically, access has been managed by requiring third parties to work on the official company network or to work on a company-issued device.

In today’s hybrid work model, where people are just as likely working from home on a personal device as from an office, that approach doesn’t work. The new model is all about working from anywhere and working from any device – while having the right security controls in place to allow third parties to access internal applications.

Manage the risk

The simple fact is that partners and suppliers need access to an organization’s data in order to be productive. It’s up to organizations to make sure they’re managing the risk that comes with sharing sensitive data with their supply chain.

“While malware gets most of the attention in the public imagination, users remain a bigger risk when it comes to security. Organizations don’t just have their own users to worry about, but the users in their entire supply chain. Skyhigh Security has an approach that follows data and users wherever they are, inside and outside the organization,” said Ramanathan.

Data that resides across an extended supply chain requires a new approach to security. To minimize risk, CIOs and CISOs should ensure that they have full visibility into their data, regardless of whether it resides in the cloud or in a proprietary system, as well as the ability to effectively govern and secure that data – all without hampering their ability to seamlessly collaborate with the vendors, suppliers, and other third parties that they rely on to get business done.

For additional details about data-aware security, click here. 

IT Leadership, Supply Chain Management Software

Original Article: cio.com

Continue Reading

Trending

Top100Biz.com