- Cloud security
- Press
Along the Path: How can we boost our fiber deployment plans for 2023
Welcome to the Q4 edition of Along the Path. In this edition, we focus on ways to boost our fiber deployment plans for 2023 as we wrap up 2022.
FILTER
Choose area
Welcome to the Q4 edition of Along the Path. In this edition, we focus on ways to boost our fiber deployment plans for 2023 as we wrap up 2022.
Welcome to the 2022 Q3 edition of Along the Path. This edition focuses on cloud security, lift and shift best practices, and how desktop and cloud deployments compare.
According to predictions in The 2020 Data Attack Surface Report1, by 2025 there will be around 100 zettabytes of data stored in the cloud globally. That’s 100 billion (100 followed by 9 zeros) GBs. Total global data storage is projected to exceed 200 zettabytes by 2025. This includes data stored on private and public IT infrastructures, on utility infrastructures, on private and public cloud data centers, on personal computing devices — PCs, laptops, tablets, and smartphones — and on IoT (Internet-of-Things) devices.
I'd like to focus on cyber security in times of heightened threats today. As we are in unprecedented times, we need to stay alert and be smarter about how we respond.
Cloud environments change fundamental assumptions in how to perform threat detection and response. A growth of new infrastructure and deployment models results in new environments with new security models and attack surfaces. In particular, shared responsibility with a cloud service provider creates potential threat visibility gaps in the attack lifecycle.
Whenever you manage users who require access to multiple types of data in order to do their job or purchase a product, you need a strong set of standards to help you implement access controls and protect your information systems from cybersecurity threats. This is commonly known as Identity and Access Management (IAM). Not only does IAM grant secure access to what you and your applications do, it also grants access to the many service-to-service calls that occur behind the scenes. An example of IAM in action is Amazon Web Service (AWS) IAM service handling more than 400 million API calls per second worldwide. Nonetheless, even if your organization only handles a single call per second, or minute, or even hour, IAM has never been more important than present day.
$74.6 billion. That’s the estimated amount to be spent on cloud IT infrastructure in 2021, according to Statista1. The explosive growth of cloud services is creating a unique set of challenges for enterprises seeking improved ways to secure their data.
It should go without saying that many, if not most, companies have had to make some changes in the last 18 months. In an era when most facets of life are marked by a pandemic, remote-first culture, the ideology of having employees work from home, has had widespread adoption. In order for this to work, employees need access to data and work files from wherever they are working. This has led many companies to either adopt, or increase, working from the cloud. Whether or not this was the case previously, there are many reasons a company should not rush into it without a strategy and some specific considerations.