How to Retain the Right Kinds of Control in the Cloud

Man holding hologram projection displaying cloud technology symbols

The last several years have seen an unprecedented shift in the way that businesses conduct their operations and employees perform their work. Users are no longer confined to working on premises from desktop computers. Data is being accessed, stored, shared, and processed in new ways. While these changes have enhanced productivity and collaboration in the enterprise, organizations must consider how they are affecting cybersecurity.

AWS Builder Community Hub

Software-as-a-service (SaaS) applications like Office 365, Box, and Salesforce have forever changed the IT landscape. Likewise, infrastructure-as-a-service (IaaS) platforms like Amazon Web Services (AWS) have had massive impacts on organizations around the world. However, all too often, their native security functionality is lacking. Making matters more challenging is the fact that traditional, on-premises tools are unable to extend their protections to cloud environments. When the above is combined with the fact that employees are accessing corporate IT resources and performing their work from personal and mobile phones around the world, the picture becomes even more complex.

Security measures must be tailored to this new environment as well as granular enough to provide the intelligent, contextual security that modern organizations need. Securing access to data based on who, what, why, how, and where is now critical. Some users may not be authorized to view certain kinds of files, while some data should only be accessed from certain geographical regions or types of devices––there are a multitude of considerations that must now be addressed. Fortunately, solutions like cloud access security brokers (CASBs) are designed to protect data in our cloud-first, mobile world.

Want to see everything Gartner has to say about this all-important subject? Click the link below to view the full report “How to Retain the Right Kinds of Control in the Cloud.”

View Report


Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Gartner How to Retain the Right Kinds of Control in the Cloud, Steve Riley, 23 December 2019


*** This is a Security Bloggers Network syndicated blog from Bitglass Blog authored by Jacob Serpa. Read the original post at: