Intelligent CIO Europe Issue 01 | Page 51

CIO opinion CIO OPINION “ . . . USERS WANT TO DO THE RIGHT THING TO GET THEIR JOBS DONE BUT IF SECURITY BECOMES TOO CUMBERSOME, USERS WILL FIND A WAY AROUND IT. ///////////////// Rob Koeten, Chief Software Architect, Pulse Secure Orchestrating secure access in a multi-cloud IT environment Rob Koeten, Chief Software Architect for Pulse Secure gives us an insight into the steps businesses can take to ensure secure networking in a multi- cloud environment. D riven by multiple technology, market and social trends, the world of application and cloud information access is evolving and expanding rapidly. Simply trusting a device connected to the corporate LAN with proper perimeter security is no longer sufficient in the multi-cloud environment used by agile enterprises today. Let’s explore a next-generation, future-proof approach to Secure Access and learn how you can incorporate and transform your current environment for the next decade. By leveraging context and analytics driven trust, you can get to ubiquitous secure connectivity for your multi-cloud environment. Secure Access When thinking about Secure Access, it is important to have a common understanding of the problems addressed and the key value it provides: Secure the access such as to provide one or more connections to applications and information, at any time, anywhere and from any originating network. Access is secured from the application provider perspective; how can they establish and maintain trust with users and devices, to prevent being compromised while avoiding information leakage. Securely access the cloud/enterprise application from an end-user (or IoT device) perspective; can they trust the service and application www.intelligentcio.com INTELLIGENTCIO 51