Four Reasons Why Data Protection, AI, And The IoT Are Changing The Cloud And IT Security

Ulrich Kreitz

Do you use a cloud? Or maybe even several clouds? If you own a smartphone, you probably use a cloud for your personal data. Have you ever been concerned about the data that you save there or even had to deal with data theft? The risk of data loss affects not only private cloud users, but also – and especially – companies.

The dichotomy with the cloud

Cloud users still have concerns about cloud services. Companies and private individuals are worried about hacker attacks and the data loss that can result. In contrast, however, confidence in cloud computing is growing thanks to the increased prevalence of IT security solutions that offer ever-greater transparency and control.

German companies spend around a third of their IT budgets on IT security, and this figure is rising. It’s not only about increasing security, but also creating new strategies and solutions to protect cloud computing.

There are four good reasons for a paradigm shift in cloud computing and IT security.

1. General Data Protection Regulation (GDPR)

Enforcement of the EU General Data Protection Regulation’s (GDPR‘s) new data-protection guidelines means increased documentation, organization, and transparency – mandatory not only for cloud users but also for cloud providers, because the GDPR divides responsibility between both parties.

In reality, however, the lion’s share of responsibility lies with cloud users, with cloud providers often remaining on the outside.

Addressing the following seven key questions can keep companies using the cloud on the safe side:

  1. Is there a legal basis for data transmission to the cloud provider, and are all cloud services documented and organized?
  1. Are the cloud locations known, and do they have security measures and certification?
  1. Do the cloud providers act in accordance with Article 28 of the GDPR, and are agreements on deleting data properly complied with?
  1. Are the cloud services resilient, and is data transmission safe and secure?
  1. Is it possible to prevent data manipulation, and are standardized procedures in place for reporting data-protection violations?
  1. Does the cloud user (that is, your company) have full control of and access to your security status?
  1. Are security measures in place for checking identities, managing weaknesses, and encrypting and transmitting data?

As you can see, companies have to change their way of thinking. Transparency must increase to meet data protection obligations.

2. Hybrid-cloud computing and multi-cloud computing

How is your IT structured? Do you also use hybrid-cloud (a combination of private and public cloud) and multi-cloud (simultaneous use of different cloud providers) computing? Or are you not entirely sure what your IT team actually does, how it does it, and where?

The fact is that cloud computing is being transformed through a series of separate, individual approaches. This makes centralized management more difficult but all the more necessary, because this is the only way that IT security will work smoothly and effectively.

More and more companies have recognized the importance of IT security and the difference that a transparent and clearly structured IT landscape can make, so they increasingly want consistent IT security and control.

Therefore, instead of multiple small, solutions (island solutions), uniform cloud security platforms acting as interfaces with a wide range of security solutions are necessary to enable central security management.

The possibility of more agile business makes cloud computing extremely popular, but IT security must be able to keep up.

3. Edge computing and the Internet of Things

In the era of the Internet of Things, data analysis is increasing the weight on specialized hardware, such as devices and sensors. This distributed IT infrastructure now contains more hardware than ever, so it also offers a larger scope for attackers. It is therefore vital that endpoints are protected.

IT security solutions must also be able to deal with different cloud and edge computing combinations, which can be configured in any number of ways and where data protection is vital at all times. Comprehensive IT security therefore also involves the interaction of edge security and security solutions.

4. Automation, AI, and machine learning

Cloud management has now reached the automation phase. An increasing number of processes have become standardized. Artificial intelligence (AI) and machine learning are being integrated and deployed for self-driving, self-securing, and self-repairing equipment. Since the system is learning all the time, it can resolve threats more quickly. AI also supports personnel for targeted innovation. As a result, AI has become an essential component of the cloud.

Summary

GDPR, hybrid-cloud/multi-cloud computing, and edge computing, combined with the Internet of Things, automation, and AI pose new challenges for cloud users and providers, and they have no choice but to respond.

Digital transformation is not only based on the cloud, but it also changes the cloud. And this changes the way we work.

Interested in more information on the cloud and IT security issues? Contact us to learn how we can help you to find the right cloud solution for you.

This article originally appeared on itelligence.com and is republished by permission. itelligence is an SAP platinum partner.


Ulrich Kreitz

About Ulrich Kreitz

Ulrich Kreitz is head of ERP Cloud Business at itelligence. He started his professional life in 2003 as a mechanical engineer in the automotive environment. Since 2007 he has been working as a consultant on SAP software, and since 2011 has been responsible for the itelligence process consulting team. Ulrich has substantially influenced itelligence’s present-day project and process consulting methods. One of his focal points is leading complex ERP implementation projects in the large-enterprise environment. His projects have been recognized with the SAP Quality Award Gold and the NTT Data SE Grand Award.