Securing IT Infrastructure in the Cloud Era

Securing IT Infrastructure in the Cloud EraMoving to cloud infrastructure has helped organizations save on costs, increase productivity, and improve agility. That’s why the public cloud market is expected to be worth $178 billion in 2018. However, a rapidly changing IT environment has introduced new security concerns that make traditional methods for securing the network inadequate. So how should organizations go about securing IT infrastructure in the cloud era?

After 20 years of IT experience, my answer would be to consider shifting to a cloud native IT infrastructure. Cloud native refers to a resource that utilizes public cloud infrastructure that wasn’t available twenty years ago. Cloud native doesn’t just mean moving resources to the cloud, though. A cloud native resource is designed specifically for cloud computing architecture and is created with security and scalability in mind. When applied to IT infrastructure, organizations can take advantage of the efficiencies, scalability, and security that cloud native resources have to offer. At InsideTrack, Inc., we have successfully transitioned over to a cloud native IT infrastructure, and have recently released a whitepaper that discusses the advantages of doing so. You’re welcome to read that here.

Below, I discuss some of the disadvantages of traditional IT infrastructure, and the elements to consider when shifting to a cloud native approach.  

So, let’s take a look at IT infrastructure in the past, and how IT admins used to secure their network.  

Securing IT Infrastructure in the Past

Securing IT Infrastructure in the pastTwo decades ago, IT environments consisted of on-prem resources that were mostly Microsoft-based. Because virtually every product a user leveraged was from Microsoft, authentication and authorization was managed by Microsoft® Active Directory®. A user would simply login to their Windows® system that was wired into the network, and then they would have access to their email (Exchange®), productivity software (Office®), and files (Windows File Server®). To secure this environment, IT admins relied heavily on the firewall to keep intruders out and to secure communication within. Their method for securing the network was very much “hard on the outside, soft on the inside”.

However, the IT landscape today is radically different than it was (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Chris Borte. Read the original post at: