Security

4 cloud adoption challenges for the Asia-Pacific region

Share this post:

Asia-Pacific-Cloud-Challenges-500x333Business leaders must weigh a number of options in the process of choosing a cloud computing platform or service. Not only do they have to pick the service that will best fit their business needs, but they also have to find just the right mix of options to ensure security, accessibility, meet regulatory requirements, and so on.

Those decisions can be tough to navigate for any business leader, but for those outside the United States and Europe, there are yet even more considerations. In an article on the site Security Intelligence, author Preethy Soman lists these added challenges specific to Asia-Pacific:

1. Data location

Data centers often reside in the U.S. and Europe, which can complicate the transmission and decryption process, as well as efforts to head off attacks, without a strong strategy.

2. Lack of standards

There are many different cloud providers with many different available security features with no unifying guidelines. Users must look closely at what features providers offer and ensure continuity if they work with more than one cloud provider.

3. Regulatory requirements

Different countries have different data regulations, so businesses based in countries other than where their data resides must be aware of multiple legal requirements. A few options, such as Box Zones from IBM, do enable organizations to make use of data centers closer to home. That’s something for business leaders in the Asia-Pacific region to keep in mind.

4. Integration

Not only must business leaders ensure their cloud providers comply with their country’s regulations and meet their business needs, they also must ensure that a provider’s cloud technology is compliant with their on-premises systems.

Overall, Soman says, data security is a responsibility to be shared between provider and customer. Everyone must stay diligent.

For more, read Soman’s full article on Security Intelligence.

More stories

7 pillars of a strong hybrid cloud security strategy

Hybrid cloud environments give companies the best of both worlds. They offer the elasticity and operational expenditure of public clouds with the data sovereignty, security and control found in a private cloud environment. By combining the two, companies can allocate workloads to the environment that makes the most sense for them. As organizations build these […]

Continue reading

5 data security techniques that help boost consumer confidence

These days, it seems like hardly any time passes between headlines about the most recent data breach. Consider the revelation in late September that a security intrusion exposed the accounts of more than 50 million Facebook users. For that matter, not much time goes by without a new survey or study that confirms the difficulty of […]

Continue reading

Machine learning: A key weapon in the cybersecurity battle

Since the dawn of the internet, companies have been fighting to stay ahead of cybercriminals. Artificial intelligence (AI) and machine learning have made this job easier by automating complex processes for detecting attacks and reacting to breaches. However, cybercriminals are also using this technology for their own malicious purposes. More and more hackers are exploiting […]

Continue reading