According to the 2019 Cloud Security Report, 93% of cybersecurity professionals are either extremely or moderately concerned about cloud security. Nearly 30% said they experienced a public cloud-related incident in the last 12 months. Top security issues are data loss, data privacy, compliance, accidental exposure of credentials, and data sovereignty.
The level of concern about cloud security is not surprising. With more applications and data moving to the cloud, the impact of a security breach can be devastating. The average cost of a data breach is now USD 3.92 million, per the 2019 Cost of a Data Breach Report by the Ponemon Institute.
The good news, however, is there are ways to mitigate the impact of a breach, either pre-emptively or after a breach occurs. Foremost among these, according to Ponemon, is “extensive use of encryption.” Other key mitigating factors include data loss prevention, threat intelligence sharing, and business continuity management.
First, you have to recognize and acknowledge that any time you are using public cloud, you are using a shared responsibility model—this means that you are responsible for security to and from the cloud and the cloud provider is responsible for security within its cloud infrastructure.
Second, you should choose a cloud provider that offers the highest levels of protection and expertise—particularly in areas that have a significant effect in reducing risk, such as encryption, access control, monitoring and visibility, along with data sovereignty and other compliance requirements.
Third, you should use a public cloud platform that is tightly integrated with your on-premises virtualized environment, specifically VMware. With tight integration, you can run VMware workloads in the cloud with a high uptime availability at the virtual machine (VM) level while leveraging innovations such as stretched clusters to reduce risk and improve availability of mission critical applications.
With those three considerations in mind, here are five additional important security factors to consider in choosing a public cloud provider:
Perhaps it is inevitable that business and IT leaders will have concerns about cloud security. The idea of trusting your mission critical data and applications to another company can be somewhat daunting.
Today’s reality, however, is that you can mitigate risk—and concern—by choosing a public cloud provider that is focused on security leadership and trust, offering enterprise grade protections in key areas such as encryption, control, compliance, data sovereignty, and business continuity.
Learn more about IBM’s security leadership and how to most securely migrate your mission critical VMware workloads to IBM Cloud.
Access essential insights on cloud migration with IBM's latest report. Discover the top 10 facts every tech leader needs to know.
Learn about the key differences between infrastructure as a service (IaaS), platform as a service (PaaS) and software as a service (SaaS). Explore how each cloud model provides varying levels of control, scalability and management to meet different business needs.
Discover the process of migrating applications across platforms or environments while ensuring minimal disruption and optimized performance. Learn the strategies, use cases and stages of migrating legacy and modern applications.
Learn how to transition your applications to the cloud quickly with the lift and shift strategy, retaining your existing infrastructure while gaining cloud benefits. Explore the advantages, VMware workloads and use cases that make this approach the preferred choice for many businesses.
Migrate VMware vSphere workloads to IBM Cloud with RackWare Management Module (RMM), a self-service migration tool offering automated migration.
Efficiently plan and accelerate your cloud migration projects with IBM Turbonomic. Gain actionable insights into application workloads, optimize performance and save costs while ensuring seamless cloud transitions.