ChannelLife Australia logo
Industry insider news for Australia's technology resellers
Story image

What the channel needs to know about cloud security

Mon 24 Apr 2017
FYI, this story is more than a year old

The benefits of cloud computing are undeniable and it’s changing the way we consume, share, and use digital information. The cloud makes access to information and computing power easier, faster and more scalable, but it fundamentally changes the way we have to think about cyber security.

As cloud adoption is accelerating rapidly, resellers are, in turn, busy migrating infrastructures for their customers. However, many resellers are failing to consider how security has to change as part of this migration.

Many customers simply extend the existing perimeter security to the cloud by routing all of their traffic back from the cloud through the on-premise perimeter security. This approach is inefficient and doesn’t take into account the new architecture the cloud delivers. There is a clear opportunity for partners to educate and consult to their customers, specifically about how moving to the cloud needs a different security approach.  

How much security is sufficient for the cloud?

There is an assumption the security provided as part of a cloud ‘package’ is sufficient. However, in many cases the level of security provided is inadequate to deal with the myriad viruses and security breaches which are on the rise.

Telstra’s Cyber Security Report 2017 found that almost 60% of local organisations surveyed detected a security incident on at least a monthly basis in 2016.

The report also found that more than half of all businesses experienced a ransomware attack last year – 30% of Australian businesses surveyed have had a business email compromise and the number of Distributed Denial of Service (DDoS) networks attacks are up by more than 200%.

Not adjusting your security approach as you migrate to virtual and cloud environments can lead to security gaps, lost ROI, performance lag and difficulty proving compliance.

As a reseller, you need to understand the opportunities and risks of cloud computing, and how to make the move that’s right for your customer. Having the right security strategy can help your customers take advantage of the amazing potential of the cloud to control their data, maintain compliance and decrease costs. In order to do so though, you’ll need to provide them with a solid security foundation that spans all of their platforms – physical, virtual and cloud.

Elastic security

The best practice solution is to provide smarter protection that travels with your customers’ data as it moves across physical, virtual and cloud environments. Security in the cloud is a shared responsibility. That means customers and cloud service providers must work together to protect applications and data, meet compliance regulations, and ensure business continuity. If their security doesn’t go beyond the native cloud, then they probably are not meeting their shared responsibility. You can increase overall protection and reduce administration by building elastic security into your cloud architectures.

When selecting a security provider, resellers should be considering security capabilities that are completely integrated with cloud services such as Amazon Web Services (AWS), Microsoft Azure and VMware vCloud Air. When the security is integrated with the leading cloud services platforms, cost and complexity go down, making it faster and easier to meet security requirements while realising the operational benefits of the cloud.

To be effective, security in the cloud must be able to dynamically follow the servers, conduct real-time monitoring, and provide instant protection for the data and applications on the instances as they spin up and down with on-demand workload. You should choose a solution that has a broad set of security capabilities to support the critical needs of security in the cloud. This integrated solution prevents data breaches and business disruptions, provides easy deployment and administration, and helps achieve cost-effective internal and regulatory compliance across hybrid cloud deployments, and across multiple cloud providers.

While the vehicle for cyber criminals is now clearly ransomware, the objective hasn’t changed. It’s first and foremost about access to your data which resides on your customers’ servers, whether they are physical, virtual, cloud or a hybrid combination.

A good security solution should offer server security for physical, virtual, and cloud environments, thereby giving you the most complete set of security capabilities with automated management, to dramatically reduce both risk and cost.

Benefits of a good cloud security solution

By choosing a leading security solution, businesses are able to:

  • Protect data and applications running in the cloud with broadest range of security capabilities to meet security and compliance requirements.
  • Dramatically reduce cost and complexity with automated security provisioning and workload-aware security policies.
  • Support government or industry standards with security built to the highest standards, including common criteria EAL 4+ and the ASD top 4
  • Integrate seamlessly with cloud management tools such as AWS CloudFormation, Chef, Puppet, and SaltStack to automate security deployments.
  • Minimise administrative cost and complexity with a single security console to manage server security across hybrid cloud environments, including multi-cloud deployments.

Resellers can meet their customers’ shared security responsibility requirements when deploying sensitive applications to the cloud with elastic security. Whether you’re operating in the data center, the cloud, or rolling out web applications—you can manage a broad set of security capabilities across multiple environments all from one single platform, thereby minimising your risk of being impacted by a data breach or ransomware.

By Peter Hewett, Channel Director, Trend Micro ANZ

Related stories
Top stories
Story image
Employment
Tech job moves - Forcepoint, Malwarebytes, SolarWinds & VMware
We round up all job appointments from May 13-20, 2022, in one place to keep you updated with the latest from across the tech industries.
Story image
Vectra AI
Understanding the weight on security leader’s shoulders, and how to shift it
Millions of dollars of government funding and internal budgets are being funnelled into cybersecurity to build resilience against sophisticated threats, indicating how serious this issue has become.
Story image
Broadband
Telstra enters into new RSP agreement with Opticomm
Telstra has entered into an RSP agreement with Opticomm (A Uniti Group Limited subsidiary) to provide network fibre services to customers.
Story image
Ransomware
Alarming surge in Conti Ransomware Group activity - report
A new report has identified a 7.6 per cent increase in the number of vulnerabilities tied to ransomware in Q1 2022.
Story image
Amazon Web Services / AWS
RedShield leverages AWS to scale cybersecurity services
"Working with AWS gives RedShield the ability to mitigate significant application layer DDoS attacks, helping leaders adopt best practices and security architectures."
Story image
Ransomware
A third of companies paying ransom don’t recover data - report
Veeam's report finds 76% of businesses who are victims of cyberattacks paid the ransom to recover data, but a third were still unable to get their information back.
Story image
Testing
Google and CSIRO use AI to help protect the Great Barrier Reef
Google has partnered with CSIRO in Australia to implement AI solutions that help protect the Great Barrier Reef.
Story image
Remote Working
Australia’s remote workers face connectivity and security issues
SOTI's new report finds better video conferencing technology and improved security measures are top concerns for remote workers in Australia.
Story image
Artificial Intelligence
SAS launches human-focused responsible innovation initiative
SAS has launched a responsible innovation initiative, furthering its commitment to equity and putting people first.
Story image
Data solutions
South Australia state satellite makes significant progress
South Australia’s first state satellite has successfully completed the Critical Design Review (CDR), moving it closer to providing tangible data solutions.
Story image
Cybersecurity
Noname Security partners with Netpoleon to target API issues
Specialist API security firm Noname Security has appointed Netpoleon as its distributor in Australia and New Zealand.
Story image
Cybersecurity
Infoblox's State of Security Report spotlights Australian remote work hazards
Attackers exploit weak WiFi, remote endpoints, and the cloud, costing 50% of organisations over $1.3 million in breach damages.
Story image
Telstra
Telstra, Google and Accenture launch 5G AR experience for AFL
Telstra, Google and Accenture are developing a new 5G powered augmented reality (AR) experience at Melbourne's Marvel Stadium for the footy season.
Story image
Nozomi Networks
Nozomi Networks, Siemens reveal software integration
Nozomi Networks and Siemens have extended their partnership by embedding Nozomi Networks’ software into the Siemens Scalance LPE local processing engine.
Story image
Cybersecurity
Hard numbers: Why ambiguity in cybersecurity no longer adds up
As cybersecurity costs and risks continue to escalate, CEOs continue to struggle with what their investment in cyber protection buys. Getting rid of ambiguity becomes necessary.
Story image
Apple
Apple previews new features for users with disabilities
Apple says new software features that offer users with disabilities new tools for navigation, health and communication, are set to come out later this year.
Story image
Mobility
Tyson Beckford partners with Element Case on new AppleWatch band
Celebrity Tyson Beckford has collaborated with STM Brands' Element Case brand to create a rugged new accessory.
Story image
Gaming
Hands-on review: WD_Black SN770 NVMe SSD Game Drive
Western Digital expands its WD_Black range of NVMe solid-state drives with the WD_Black SN770 Game Drive.
Story image
Cybersecurity
Managed service providers: effective scoping to avoid costly vendor pitfalls
Managed security services are outsourced services focusing on the security and resilience of business networks.
Story image
Ransomware
Cybersecurity starts with education
In 2021, 80% of Australian organisations responding to the Sophos State of Ransomware study reported being hit by ransomware. 
Story image
Phishing
KnowBe4 celebrates reaching 50,000 customers worldwide
KnowBe4 has reached the milestone of 50,000 customers, adding nearly 2,500 in the first quarter of 2022 alone.
Story image
Wireless
Cradlepoint expands its Cellular Intelligence capabilities
Cradlepoint has announced additional Cellular Intelligence capabilities with its NetCloud service.
Story image
ChildFund
ChildFund launches new campaign to protect children online
ChildFund says WEB Safe & Wise aims to protect children from sexual exploitation and abuse online while also empowering them to become digitally savvy. 
Story image
Workato
Workato unveils enhancements to enterprise automation platform
"The extra layer of protection with EKM, zero-logging, and hourly key rotation gives customers a lot more visibility and control over more sensitive data."
Story image
Alteryx
Decision Inc. Australia enters partnership with Alteryx
Independent data and analytics consultancy Decision Inc. Australia has partnered with automated analytics company Alteryx, expanding its offering to clients.
Story image
Application Performance Monitoring / APM
Why SolarWinds Partners will have big wins in 2022
We summarise the key recent changes that the monitoring software vendor has made to accelerate its channel business.
Story image
Sift
Sift shares crucial advice for preventing serious ATO breaches
Are you or your business struggling with Account Takeover Fraud (ATO)? One of the latest ebooks from Sift can provide readers with the tools and expertise to help launch them into the new era of account security.
Story image
WolfVision
WolfVision announces new range of visualisers
WolfVision has announced a new range of visualisers to help meet multiple industry demands for remote learning and educational solutions.
Story image
Cybersecurity
The 'A-B-C' of effective application security
Software applications have been a key tool for businesses for decades, but the way they are designed and operated has changed during the past few years.
Story image
Microsoft
New Relic enters multi-year partnership with Microsoft Azure
New Relic has announced a strategic partnership with Microsoft to help enterprises accelerate cloud migration and multi-cloud initiatives. 
Story image
Application Security
What are the DDoS attack trend predictions for 2022?
Mitigation and recovery are vital to ensuring brand reputation remains solid in the face of a Distributed Denial of Service (DDoS) attack and that business growth and innovation can continue.
Story image
Manufacturing
HINDSITE wins Aerospace Xelerated Pitch Challenge with solution to support Boeing
Brisbane-based startup HINDSITE was the winner of the first ever Pitch Challenge organised by Aerospace Xelerated in partnership with Queensland XR Hub. 
Story image
Data Protection
Barracuda launches new capabilities for API Protection
"Every business needs this type of critical protection against API vulnerabilities and automated bot attacks," Barracuda says.
Story image
Wireless
Hands-on review: Technics EAH-A800 Noise Cancelling Wireless Headphones
Designed in Osaka, Japan, these headphones just exude quality. They aren’t heavy, but they feel well built and solid.
Story image
Lightspeed
Lightspeed launches all-in-one marketing platform in A/NZ
ECommerce provider, Lightspeed has launched a new all-in-one marketing solution, Lightspeed Marketing & Loyalty in Australia and New Zealand.
Story image
Artificial Intelligence
SAS unveils AI experience to improve kids' batting abilities
SAS has created The Batting Lab, an interactive experience using AI, computer vision and IoT analytics to help kids improve their baseball and softball swings.
Story image
Cloud Security
Aqua Security createa unified scanner for cloud native security
“By integrating more cloud native scanning targets into Trivy, such as Kubernetes, we are simplifying cloud native security."
Story image
Surveillance
Motorola Solutions acquires Videotec S.p.A for security portfolio
Motorola Solutions has acquired Italian ruggedised video security company Videotec S.p.A, along with its portfolio of highly versatile cameras.
Story image
Artificial Intelligence
AI-based email security platform Abnormal Security valued at $4B
"A new breed of cybersecurity solutions that leverage AI is required to change the game and stop the rising threat of sophisticated and targeted email attacks."
Story image
Gaming
PNY launches XLR8 Gaming EPIX memory products in A/NZ
PNY has launched its XLR8 Gaming EPIC-X RGB™ DDR4 Silver 3200MHz and 3600MHz memory products in Australia and New Zealand.
Story image
Sustainability
Legrand unveils Nexpand, a data center cabinet platform
Legrand has unveiled a new data center cabinet platform, Nexpand, to offer the necessary scalability and future-proof architecture for digital transformation.
Story image
Fortinet
Fortinet's Security Fabric hits new record for integrations
The Fortinet Security Fabric has surpassed 500 technology integrations with more than 300 Fabric-Ready Technology Alliance Partners.
Story image
Cybersecurity
BlackBerry offers Kaspersky replacement cybersecurity for the channel
BlackBerry advises that users of Kaspersky software in Australia and New Zealand undertake a rigorous risk analysis of their current security posture.
Story image
Fintech
Airwallex launches new bank feed integration with NetSuite
Airwallex has launched a new bank feed integration with NetSuite, developed in partnership with NetSuite solution partner, Onlineone.