/////////////////////////////////////////////////////////////////////////////////////////// FINAL WORD
Louise McCarthy , Zscaler , Consultant and former HSBC COO
powerful business enabler , it is continuously compelling businesses to fundamentally change their technology ecosystems .
However , as a result of the rapid cloud adoption necessary to drive Digital Transformation , the corporate perimeter is being eroded . This is turning the traditional security model on its head . Visibility across the entire enterprise network , as well as connected device traffic , is now critical in defending corporate assets from hackers . While traditional network security made sense when every application was hosted in the data centre and users were connected to the network , applications are now moving to the cloud and users are increasingly embracing mobile , making the stacks of appliances sitting in the data centre more and more irrelevant . This traditional security model forces all traffic through the centralised data centre for security and access controls – a complex configuration that often results in a terrible user experience .
The move to the cloud showcases how transformation has changed over time . As a
As the geometry of the network changes with the move to implement cloud-based applications , a lot of other screws have to be adjusted as well . It starts with adapting the network infrastructure , which allows local Internet breakouts for every subsidiary and continues with Internet security and new policies . As applications are no longer physically located in the enterprise perimeter , but instead stored in the cloud , a perimeter-based approach is no longer appropriate . The more mobile workforce also compounds the need for a new longer-term solution that takes advantage of today ’ s sophisticated technology and is able to control risk while considering user experience at the same time .
While there are multiple challenges to be faced with the current complexity of Digital Transformation , organisations need to be looking at cloud-centric solutions when it comes to their Digital Transformation as opposed to quick fixes that save costs in the short run . With the cloudification aspect of Digital Transformation , businesses will see continuous cost reduction and customer service improvement , greatly increasing their digital readiness . • www . intelligentcio . com INTELLIGENTCIO
105
///////////////////////////////////////////////////////////////////////////////////////////
FINAL WORD
Louise McCarthy, Zscaler, Consultant and
former HSBC COO
powerful business enabler, it is continuously
compelling businesses to fundamentally
change their technology ecosystems.
As the geometry of the network changes
with the move to implement cloud-based
applications, a lot of other screws have to
be adjusted as well. It starts with adapting
the network infrastructure, which allows
local Internet breakouts for every subsidiary
and continues with Internet security
and new policies. As applications are no
longer physically located in the enterprise
perimeter, but instead stored in the cloud,
a perimeter-based approach is no longer
appropriate. The more mobile workforce also
compounds the need for a new longer-term
solution that takes advantage of today’s
sophisticated technology and is able to
control risk while considering user experience
at the same time.
However, as a result of the rapid cloud
adoption necessary to drive Digital
Transformation, the corporate perimeter is
being eroded. This is turning the traditional
security model on its head. Visibility
across the entire enterprise network, as
well as connected device traffic, is now
critical in defending corporate assets from
hackers. While traditional network security
made sense when every application was
hosted in the data centre and users were
connected to the network, applications
www.intelligentcio.com
are now mo ٥���Ѽ�ѡ�����Ր������͕�́�ɔ)���ɕ�ͥ���䁕��Ʌ�������������������)ѡ���х��́������������́ͥ�ѥ������ѡ����ф)����ɔ���ɔ�������ɔ���ɕ��م�и�Q���)�Ʌ��ѥ�����͕��ɥ�䁵�������ɍ�́�����Ʌ����)ѡɽ՝��ѡ������Ʌ��͕����ф�����ɔ����)͕��ɥ�䁅��������́����ɽ�̃�L����������)�������Ʌѥ���ѡ�Ё��ѕ��ɕ�ձ�́�����ѕ�ɥ���)�͕ȁ����ɥ�����)Q�����ٔ�Ѽ�ѡ�����Ր�͡�ݍ�͕́���)�Ʌ�͙�ɵ�ѥ�����́���������ٕȁѥ����́�)]�����ѡ�ɔ��ɔ��ձѥ�������������́Ѽ���)������ݥѠ�ѡ�����ɕ�Ё��������䁽�����х�)QɅ�͙�ɵ�ѥ�����ɝ���ͅѥ��́�����Ѽ���)���������Ё���Ր�����ɥ��ͽ��ѥ��́ݡ�����)����́Ѽ�ѡ��ȁ���х��QɅ�͙�ɵ�ѥ�����)����͕��Ѽ��ե������́ѡ�Ёٔͅ�����́���ѡ�)͡��Ё�ո��]�Ѡ�ѡ�����Ց�����ѥ��������Ё��)���х��QɅ�͙�ɵ�ѥ������ͥ���͕́ݥ���͕�)���ѥ�ս�́���Ёɕ�Սѥ����������ѽ���)͕�٥������ɽٕ���а��ɕ�ѱ䁥��ɕ�ͥ���ѡ���)����х��ɕ������̸��)%9Q11%9Q
%<(���