For many businesses, move Cloud computing There has been more than just a need for support Remote working Over the past year, leaders have also become more aware of the value of delivering business results. In fact, a recent study by IBM IBV found that 74% of CEOs think that adopting the cloud in the next two to three years will be important for their business.
About the Author
Marc Cox, Public Cloud Leader, UK and Ireland, IBM.
But as digital transformation accelerates, the threat of global cybercrime due to recent catastrophic causes is greater than ever. ransomware Attacks, from the JBS meat plant before them to the colonial pipeline and the solar winds.
According to IBM and Ponyman, each attack costs organizations an average of 6 8.6m and takes 284 days to identify and contain. But the value of lost trust is incalculable.
There are 22 organizations of all sizes. To survive in our digital age, they need to accelerate digital transformation, but in the rush to do so, they’re exploring complex systems of unstructured parts together and building a web of backdoor hackers. ۔ Can be easily exploited.
This complexity is the enemy of security. Some companies are forced to come up with more than 50 different security solutions from up to 10 different sellers to protect their vast technology assets.
There is a great opportunity and responsibility to update our infrastructure IT infrastructure To deal with the dangers facing today’s world. Achieving this requires two key steps.
Hybrid Cloud architecture offers a unified view of security throughout your IT state
The first open, hybrid cloud is embracing architecture. With Hybrid Cloud, organizations can integrate and standardize security in all types of infrastructure, from private data centers to public clouds, to the edges of networks. This integrates security workflow and increases the visibility of threats across the entire network (including third- and fourth-party networks where data runs) and archives responses. It eliminates weak links without transferring data or applications.
The second step is to close the remaining gaps in the data security supply chain, and in particular, to protect it when it is in use as well as at rest or in storage. As more organizations outsource their data storage and processing to cloud providers, expect real-time data. Analysis In turn, it represents an area of danger.
This requires encrypted computing technology, which encrypts the transit and the rest of the data in the process.
Your own secure enclave inside the cloud
When the data in a common cloud platform is encrypted when it is stationary or in motion, it will be decrypted when it is being processed. This means it could potentially be viewed by a third party, be it a hacker or a cloud provider. With secret computing, data is hidden in a secure enclave during processing, so it cannot be accessed by anyone – not even the cloud provider.
In a hybrid cloud environment, this is possible by sending data using a hardware-based Trusted Execution Environment (TEE), which is isolated from other workloads in the same cloud. Data remains encrypted unless the application instructs the TEE to decrypt it for processing, in all enclaves.
It’s like offices in a tower block. You can share the same building with other tenants, but your office is safe and private. Neither the building owners nor other tenants know what happens in your office. In the case of undercover computing, the cloud tower is the block and the enclave is the office.
IBM takes privacy computing one step further, supporting its own key feature which means that there is only one key to encrypted data and no one can access it. , Including the cloud provider. Our HyperProtect Cloud Services suite is the only industry solution built on FED 140-2 level 4-certified hardware, which is the highest standard for hardware cryptography modules.
These capabilities are especially important for highly regulated industries such as financial services, telecommunications and public sector businesses. In the case of a bank, for example, keep your own key encryption together with the secret computing enables compliance with industry rules and regulations, while allowing users to trust them. Data Stays private Even when using the cloud with other users.
Secure collaboration in the cloud
In addition to data security, an important advantage of covert computing is that organizations are able to collaborate with other parties on the cloud, while keeping their data private and secure. This makes it possible for the bank to verify a transaction with an airline, for example, to identify cases of fraud without sharing any sensitive business information with either party.
Successful adoption of the cloud has been hampered by reasonable concerns surrounding data security. With state-of-the-art encryption technologies, businesses can now effectively deal with this risk.
In a world where the frequency and power of cyber-attacks is increasing, and where data privacy is important to many, businesses have a responsibility to ensure their customers’ data and protect their own intellectual property. ۔ Much of their survival depends on it.