CIO opinion
CIO OPINION
“
. . . USERS WANT
TO DO THE RIGHT THING TO
GET THEIR JOBS DONE BUT
IF SECURITY BECOMES TOO
CUMBERSOME, USERS WILL
FIND A WAY AROUND IT.
/////////////////
Rob Koeten, Chief Software Architect, Pulse Secure
Orchestrating secure
access in a multi-cloud
IT environment
Rob Koeten, Chief Software
Architect for Pulse Secure gives
us an insight into the steps
businesses can take to ensure
secure networking in a multi-
cloud environment.
D
riven by multiple technology, market and social trends, the world
of application and cloud information access is evolving and
expanding rapidly. Simply trusting a device connected to the
corporate LAN with proper perimeter security is no longer sufficient in the
multi-cloud environment used by agile enterprises today. Let’s explore a
next-generation, future-proof approach to Secure Access and learn how
you can incorporate and transform your current environment for the next
decade. By leveraging context and analytics driven trust, you can get to
ubiquitous secure connectivity for your multi-cloud environment.
Secure Access
When thinking about Secure Access, it is important to have a common
understanding of the problems addressed and the key value it provides:
Secure the access such as to provide one or more connections to
applications and information, at any time, anywhere and from any
originating network.
Access is secured from the application provider perspective; how can
they establish and maintain trust with users and devices, to prevent
being compromised while avoiding information leakage.
Securely access the cloud/enterprise application from an end-user
(or IoT device) perspective; can they trust the service and application
www.intelligentcio.com
INTELLIGENTCIO
51