+
EDITOR’S QUESTION
DRAGAN PETKOVIC,
SECURITY PRODUCT
LEADER ECEMEA ORACLE
///////////////////
O
ne of the biggest complaints with
cloud services is that there are
perception problems of security,
latency and governance. Why would I put
my data on a computer that I don’t control?
However, today’s borderless enterprises are
increasingly turning to cloud computing in
an effort to protect themselves against the
rising tide of external cyberthreats.
Companies respond in several ways to
mitigate the threat of cyberattacks which
includes hiring CEOs who come from a
cybersecurity background, as they know how
to manage risk and speed up migration to
the cloud.
By 2025, 80% of risks to cloud operations
will vanish entirely and a higher degree of
intelligent automation will permeate the
cloud platform – becoming the catalyst that
further accelerates enterprise cloud adoption.
Machine versus machine, battling
sophisticated cybercrime with
autonomous cloud solutions
Cybercrime is becoming increasingly
sophisticated and organisations are finding
it difficult to effectively detect, prevent and
respond to modern cyberattacks.
Last March, Oracle announced its
Autonomous Data Warehouse Cloud Service,
a solution that protects systems from external
attacks and malicious internal users by
automatically applying security updates with
no downtime while also encrypting data.
Best practice to ensure security in
the cloud
No cloud service should be without data
encryption. It is one of the easiest technical
controls to implement and a number of
organisations opt for it as a quick win since
www.intelligentcio.com
it requires minimum human intervention.
It has been used for decades and it is a big
concern that some organisations are still not
using it to protect their confidential data.
Many enterprises are also implementing
security solutions that analyse user behaviour.
Rather than focusing solely on identifying
attack objects such as viruses, malware or
beating the hackers to the punch with early
discovery of vulnerabilities.
Unfortunately, many IT administrators lose
their security precautions with the adoption
of cloud services; there is no longer any
perceived network separation, physical
separation or unique login procedures.
Losing the controlled administrative access
the IT teams are accustomed to can
represent a significant void in the security
posture. UBA solutions fill this void by
acting as another layer of security beyond
simple credentials.
As mobile users proliferate and the network
edge moves into the cloud, your IT resources
are vulnerable to new threats. Businesses
need consistent security controls that span
cloud and on-premises environments. These
controls must apply identity context to
better predict, prevent, detect, and respond
to threats.
Oracle’s security cloud services make these
leading security technologies available
everywhere to organisations, large and small.
INTELLIGENTCIO
25