Our site uses cookies to make it work and to help us give you the best possible user experience. By using our site, you agree to our use of cookies. To find out more about cookies and how you can disable them, please read our cookies statement. 

Cookie Settings

You can manage your cookie settings by turning cookies on and off.

Click on the different cookie  headings to find out more about the types of cookies we use on this site and to change your settings. Please be aware that if you choose to turn off  cookies, certain areas of our site may not work and your browsing experience may be impacted.

For further information on how we use cookies, please see our cookies statement. 

Strictly Necessary Cookies

(Req)

These cookies are essential for the technical operation of and proper functioning of our site  and enable you to register and login, to easily move around our site, and to access secure areas. Without these cookies our site won't function properly.  

These cookies are required

Performance Cookies

Performance cookies allow us to collect aggregated and anonymous data on how our site is used, such as the number of visitors to our site, how you navigate around and the time spent on our site and also to identify any errors in functionality. These cookies also help us to improve the way our site works by ensuring that you can find what you’re looking for easily, to better understand what you are interested in and to measure the effectiveness of the content of our site. 

Marketing Cookies

These cookies allow us to advertise our products to you and allow us to pass this information on to our trusted third parties so that they can advertise our products to you on our behalf. All information these cookies collect is aggregated and therefore anonymous. No personal information is shared to third parties. Any personal information collected while using our website could be used for direct marketing from Dimension Data only.

Hybrid IT security governance risk and compliance

Blog
Sheer complexity. That’s what  I’d say is the main challenge of cybersecurity in relation to hybrid IT.

Don’t get me wrong. It is perfectly possible to secure hybrid IT. But it’s complex, and quite different in many ways from traditional IT security.

That complexity shouldn’t deter you from using hybrid IT, and getting the operational and commercial benefits you want out of it. But there are a few things you need to bear in mind.

55% of enterprises interviewed in our new research into hybrid IT said that a concern around security and compliance was the biggest factor inhibiting adoption.

First get visibility

The most common issue I hear from clients is, ‘I just don’t know what’s going on’. You can’t secure what you can’t see. You need to know what SaaS services other lines of business are buying, what VLANs and servers DevOps are spinning up, even when a new device is connected to the network.

So getting detailed visibility of your entire infrastructure is step one, and to do that you will need an automated discovery capability. Once you know what’s going on, then you can apply appropriate security controls at every level, from the macro domain level right down to individual service containers.

Then get in control

The next most common issue I hear is, ‘I can’t control where my data is in the cloud’. That’s true – up to a point. In a standard public cloud your data could be anywhere. And as long as the cloud has basic security, and your data isn’t subject to any particular compliance requirements, why should it matter where it’s located?

But in sectors like financial services or government, it’s essential to be able to control where the data resides. So, does that mean you shouldn’t use the cloud? No, you can…

With some cloud providers, you can specify the physical geography where your data resides. For example, with Microsoft Azure, or Dimension Data’s own Managed Cloud Platform, you can specify that your data should remain in, say Eastern Australia, but not which city. And that may be enough, even in financial services.

First Choice Global got the economic and operational benefits of cloud, with control over where data resided, so that they could run their money transfer service in Africa, while remaining compliant with their US partner’s regulatory requirements. Watch their story.

Keep up with new products

I have the privilege to talk to one new start up every two days – and that’s following two prior stages in the screening process. Not only do I get to understand their product, but I have the privilege of seeing how they can change the industry.

Our legal department tells me that Dimension Data’s security practice has twice as many vendors as any other practice. And that’s because there are so many point products we need to use to properly secure our clients.

I’ve realised that the more virtualised an infrastructure becomes, the harder it gets to secure. For example, there is a whole mini-sector of cloud access security brokers (CASB) that can help secure SaaS services.

CASB can identify specific corporate users that are using personal SaaS (e.g. Dropbox). CASB can identify how many files, of what size they’re uploading, and how often. These tools can even prevent users from doing so – but allow access to a corporate approved alternative like Microsoft OneDrive instead. With the rise of shadow IT, it’s becoming very important to keep up with developments in CASB.

Integrate and automate

Hybrid IT moves faster than traditional IT, and sometimes security can struggle to keep up. You have to be able to roll out security as quickly as you can spin up servers and micro-services. How do you do that? The answer is through automation.

There are tools that can secure every server and micro-service. But these tools need to be integrated into your operations, and automated to secure them as fast as they are spun up.

80% of enterprises interviewed in our new research use a managed service to do the automation of hybrid IT security.

Evolve your skills

There is a recognised global shortage of cybersecurity skills, and the more your company tries to embrace hybrid IT, the more you’re going to run into it.

One approach, which follows the trend in IT operations generally, is to outsource your security operations, so you can concentrate more on planning and innovation.

I’ve seen my own job evolve a lot over in just the last six months. It used to be about tactical management and planning of our managed security services. Now it’s more about research and strategic innovation.

Take one step at a time

Another sensible strategy when faced with the scale, complexity, and urgency of hybrid IT security, is to prioritise.

Get IT, security, and all the different business functions (HR, Sales, Marketing) who want to use hybrid IT, in a room together and workshop through what really needs to be tackled immediately, and what you can live with or work around. Then you agree to a roadmap, and tackle it one step at a time.

The commercial and operational advantages of hybrid IT are too good to let security get in the way. It may be complex, but securing hybrid IT is definitely possible.

Previous Article: How we're using technology to protect the planet Next Article: Facing the challenges of hybrid IT

You may be interested in

Wind turbines
Blog

IT Trends 2018: It has become critical to leverage tools that support innovation and differentiation

Enterprises must embrace innovation and enable developers, by providing them with the tools and flexibility they need to create new business models, and support new application types.

Read blog
Aerial view of buildings
Blog

IT Trends 2018: Managing the business value of data

Data is defining the digital enterprise. Today it is essential that businesses maximise value by implementing incremental strategies that allow for the elegant use of data.

Read blog
People in an office
Blog

Bridging the digital transformation skills gap

Today’s programmable networks automate many of the routine network management tasks that engineers once performed manually.

Read blog
Golden Gate Bridge
Blog

When moving to the cloud don't forget the network

Enterprises today are embarking on digital transformations that are causing the greatest changes to wide area networking (WAN) in the past 20 years.

Read blog