TECH BUYER Dec 2019 - IDC Perspective - Doc # US45678519
Cybersecurity Is a Daunting Challenge That Requires a Holistic Solution: Implications from Cloud Pulse 1Q19 Survey
This IDC Perspective reviews the unique cybersecurity challenges related to cloud computing and discusses tools and strategies to protect data and enterprise resources from malware, hackers, and other threats based on insights gained from enterprise customers that took part in IDC's Cloud Pulse, 1Q19 survey. Cybersecurity has become extremely complex as IT architecture rapidly evolves beyond the old paradigm of datacenters, secure perimeters, and on-premise employees. The new architecture is extremely decentralized with geographically dispersed datacenters, colocation facilities, multiple public clouds, edge computing, remote employees, and assorted endpoint devices. Thus while enterprises now benefit from greater agility, scalability, and productivity, they are also more vulnerable to malicious actors due to increased attack surface. To overcome this daunting challenge, executives need to understand how to secure their core, edge, and the cloud using newer security paradigms.
"Insights from IDC's Cloud Pulse, 1Q19 survey have shown that there is a tectonic shift of data and applications from on-premises to a multicloud environment, and this shift has rendered many traditional security tools ineffective," said Chris Kanthan, research manager, Infrastructure Systems, Platforms and Technologies Group, at IDC. "There is no single product to resolve this cybersecurity challenge. Instead, enterprises need a holistic strategy that comprises next-generation applications, pertinent frameworks, robust policies, cloud-specific security architecture, and comprehensive processes to secure their data."
Cloud Pulse 2019: Gold , Cloud Pulse 2019: Platinum , Cloud Pulse 2019: Silver
Advanced authentication, Analytic applications, Cognitive/artificial intelligence, DevOps, Hybrid clouds, Integration and process automation middleware, Legacy authorization, Public cloud services, Security management, Technology buyer