Data Security in the Cloud Skip to main content

Gartner Forecasts Security and Risk Management Spending in India to Grow 12% in 2024

  GenAI-Driven Attacks Require Changes to Application and Data Security Practices and User Monitoring End-user spending on security and risk management (SRM) in India is forecast to total $2.9 billion in 2024, an increase of 12.4% from 2023, according to a new forecast from Gartner, Inc. Indian organizations will continue to increase their security spending through 2024 due to legacy IT modernization using cloud technology, industry demand for digital platforms, updated regulatory environment, and continuous remote/hybrid work. “In 2024, chief information and security officers (CISOs) in India will prioritize their spending on SRM to improve organizational resilience and compliance,” said  Shailendra Upadhyay , Sr Principal at Gartner. “With the introduction of stringent government measures mandating security breach reporting and digital  data protection , CISOs are facing heightened responsibility in safeguarding critical assets against evolving cyber threats.” Gartner a...

Data Security in the Cloud


Cloud computing services, which is marketing speak for virtual hosting, is becoming increasingly popular as the speed and reliability of the public Internet increases. smcloud

This article covers the security concerns around moving applications and services into the public domain and how to minimise the threat of data loss and security breaches. Cloud computing services comes in two flavours. They are application hosted and virtual machine hosting.

With application hosting, many customers operate in silos and connect to a common hardware infrastructure storing their data in separate database objects. An example of this type of hosted application is Microsoft Exchange. For a nominal monthly fee, you can have a complete corporate presence without any investment in infrastructure. Your clients can connect from anywhere and the communication is secured with SSL.

However, in this scenario a security breach could occur from an external source, such as a denial of service attack or a vulnerability in the application itself. This kind of breach could have potentially devastating ramifications for an organisation not only in terms of downtime, but if the information was commercially sensitive, could have even greater ramification to the business.

When you use the cloud, you probably won't know exactly where your data is hosted. In fact, you might not even know what country it will be stored in. For this reasons most established organisations prefer to host their own application, connect their clients using VPN services and avoid cloud services altogether, the business risk is too great.

However, the cloud can now address those concerns, using virtualisation. Cloud service providers supply a virtual instance where the customer has a complete virtual server installed on shared hardware. The operating system and storage can be encrypted and firewall connections provided by the service provider control access to the server. This arrangement overcomes some of the security concerns which application hosting has.

  • The customer controls all software installation and configuration. The customer can decide whether to encrypt the installation volume for additional security.Customers are ultimately responsible for the security and integrity of their own data, even when it is held by a service provider.
  • Traditional service providers are subjected to external audits and security certifications. Cloud computing providers who refuse to undergo this scrutiny are "signaling that customers can only use them for the most trivial functions," according to market analyst Gartner.
  • Firewall and VPN services can be deployed to limit exposure to security vulnerabilities.
  • Virtual snapshots can be made of the running machine to restore service instantly in the event of a failure or a security problem.
  • Virtual machine instance can be load balanced across multiple sites, which scales to hundreds of connections. Get as much information as you can about the people who manage your data. Ask providers to supply specific information on the hiring and oversight of privileged administrators, and the controls over their access.
  • Additional storage, CPU and memory can be added instantly, something a physical footprint can not do.
  • Reduced support costs, in terms of hardware maintenance and tech support, software updates.

Therefore, for the reasons provided above the flexibility, ease of use and other supporting benefits, starts to outweigh the few security concerns regarding hosting corporate information offsite.

By Angela Sutherland

Comments

Popular posts from this blog

Mobile Phones Sales Plummet

Details Published on Thursday, 16 August 2012 06:34 Worldwide sales of mobile phones reached 419 million units in the second quarter of 2012, a 2.3 percent decline from the second quarter of 2011, according to Gartner. Smartphone sales accounted for 36.7 percent of total mobile phone sales and grew 42.7 percent in the second quarter of 2012. "Demand slowed further in the second quarter of 2012," says Anshul Gupta, principal research analyst at Gartner. "The challenging economic environment and users postponing upgrades to take advantage of high-profile device launches and promotions available later in the year slowed demand across markets. Demand of feature phones continued to decline, weakening the overall mobile phone market. "High-profile smartphone launches from key manufacturers such as the anticipated Apple iPhone 5, along with Chinese manufacturers pushing 3G and preparing for major device launches in the second half of 2012, will drive the smartpho...

Now facebook hit with international class action privacy suit

An Austrian privacy activist has launched a wide-reaching class action suit against Facebook Ireland for breaching European data protection law. Anyone outside of the US and Canada can join activist and law student Max Schrems' suit via the website fbclaim.com, since they will have signed up to Facebook's terms and conditions via the Dublin-based European subsidiary. That amounts to around 82 percent of all Facebook users. After being live for just one hour, the site has collected 100 participants. The suit is seeking damages of €500 ($537) per user, and injunctions to be levied on the company for the following breaches:     Failing to get "effective consent" for using data     Implementing a legally invalid data use policy     Tracking users online outside of Facebook via "Like" buttons     Using big data to monitor users     Failing to make Graph Search opt-in     The unauthorized passing of use...

Cabling and Data Explosion

Details     Published on Tuesday, 13 November 2012 05:39 The explosion of 'big data' and the seemingly limitless demand for bandwidth are driving trends in today's IT-centric world. The 'faster, better, most cost effective' mentality has led enterprises of all sizes to closely scrutinize their communications networks and networking infrastructure. network-cables The need to deploy high speed network backbones that meet future requirements, while simultaneously reducing costs, present conflicting interests. With the need for higher bandwidth and flexibility for growth, organizations are looking at the network's physical layer and its overall life cycle as a capital investment that is essential to the business. Throw into this conundrum the increasing focus on sustainability and the task of designing a network high-performance, high-efficiency network seems almost insurmountable. Addressing efficiency at a physical infrastructure level has fueled the growing ado...