Rapid changing environments
One in four attacks worldwide in 2021 were concentrated in the Asia-Pacific area, one of the most targeted by cybercriminals. According to research, server access and ransomware are two of the most common ways of attack. The top three countries facing the consequences of the attacks are India, Japan, and Australia. However, the fact that Indonesia, Vietnam, Malaysia, Singapore, and Thailand are also at risk for assault shows that no place is safe.
Businesses have been forced to quickly change the way they do business as a result of the global pandemic in order to keep up with the environment. For Vijendra Katiyar, Country Manager, India, and SAARC, Trend Micro discuss their business as they have outlined a few security issues on the cloud. Of particular concern are misconfigurations, exploitation of serverless and container workloads, and less dependable third-party resources. To confront this diverse list of security challenges, a cloud security services platform approach is necessary for safeguarding servers, resources, and applications in the cloud. “Organizations will shift gears once more this year, putting their digital transformation and hybrid work journeys as a priority, This will be driven by a focus on hybrid cloud strategy, AI in cloud computing, and a rise of serverless which will help businesses create new user experiences that make innovation more accessible”, he adds.
Organizations are placing more emphasis on and trust in third parties as they adopt cloud and hybrid cloud strategies. Supplier risk has always been and will continue to be a problem in cybersecurity. Businesses and outside parties are expected to work together more closely to develop shared responsibility frameworks and put into practice solutions that promote compliance, trust, and openness. “Security will become everyone’s job, and it is crucial to deploy zero-trust environments than integrate all departments for complete digital visibility and control. We also predict and encourage more investment and innovation in the cybersecurity industry to build frictionless solutions for users”, this is what Michael Montoya, Senior Vice President & Chief Information Security Officer, Equinix had to say.
Organizations are placing more emphasis on and trust in third parties as they adopt cloud and hybrid cloud strategies. Supplier risk has always been and will continue to be a problem in cybersecurity. Businesses and outside parties are expected to work together more closely to develop shared responsibility frameworks and put into practice solutions that promote compliance, trust, and openness. Akshat Jain, CTO & Co-Founder, Cyware also shares his opinion on this, stating that “As assets are spread across multiple environments, organizations need a holistic cybersecurity strategy involving security automation solutions that provide their security teams the ability to take response actions across cloud, on-premise, or hybrid environments”. Additionally, security teams must gather threat intelligence from security technologies installed on cloud platforms in addition to other internal and external sources of threat data in order to enable proactive detection and response to threats. Additionally growing in popularity are cloud-native applications, which necessitate new cutting-edge security solutions to protect such deployments.
Innovation, scaling, and speed
“The speed of composable platforms is a game-changer; businesses can connect data that predict a customer’s need and delivers the next-best action at the moment. These platforms can orchestrate customer and employee experiences in real-time, routing calls to the agent predicted most likely to deliver a positive outcome. In the fast-approaching future, composability will be a key requirement for CX cloud platforms”, Raja Lakshmipathy, Managing Director-India and SAARC, Genesys opined. The real-time assembly, integration, and orchestration of capabilities across four fundamental building blocks—development, ecosystem, marketplace, and product—is made possible by compostable platforms. The API-first, continuous deployment, global availability, and integrated security features of contemporary clouds were the ancestors of these safe and adaptable platforms, which they now complement.
Micheal Montoya addresses the growing number of cyberattacks and explains that with threat actors becoming more sophisticated, innovative, and collaborative, cybersecurity responsibilities today extend beyond security professionals – Now more than ever, cybersecurity must be a primary focus for all digital and technology executives. He continues by saying that hacks are unavoidable as long as businesses continue to use cloud services and undergo digital transformation. “The question now turns from ‘if’ to ‘when’. Digital leaders will play a more prominent and vital role in helping companies navigate threats and risks as they anticipate what’s next”, he explained.
The more groups organizations create, the more complicated security becomes. Many firms still handle security through segregated functions. They might believe that this is a benefit, but threat actors really benefit from complexity in security because it makes it easier for them to find flaws in the system. Significant attention will be given to integrating security for better visibility and management. “At Cisco, we are expanding our cloud strategy across areas to help businesses connect, secure, and automate to deliver a seamless digital experience. Our full-stack observability moves beyond domain monitoring into full-stack visibility, insights, and actions across the technology stack in the multi-cloud environment so that operation teams can deliver and optimize customer experiences”, Trideeb Roy, Director – Sales, Data Center, Cisco India & SAARC said, Adding to this, he also talks about the value of having Cisco Intersight onboard, stating “ Cisco Intersight provides a portfolio of services that enable intelligent visualization and orchestration to bring teams, infrastructure, and applications together. And our Workload Optimization Manager, powered by AI/ML, assures application performance by giving workloads the resources they need at the time of requirement”. Lastly, he concludes with about how their Secure Cloud Insights also track and normalizes data across multi-cloud environments and is integrated with SecureX, their cloud-native security platform, to strengthen cloud security posture.