Intelligent CIO Middle East Issue 86 | Page 76

t cht lk

t cht lk

The major benefit of cloud adoption is that cloud services are fully automated and can be spun up and down instantly allowing organisations to be nimbler and accelerate their time to market depending on their industry .
The major benefit of cloud adoption is that cloud services are fully automated and can be spun up and down instantly allowing organisations to be nimbler and accelerate their time to market depending on their industry .
How do traditional networks and security stacks cope with cloud adoption ?
Our journey at Zscaler , supporting over 150 global data centres and processing over 250 billion secured transactions per day , has proven that traditional hubs and spoke networks are architected to protect users only when they are on the network connecting to applications in the self-managed data centre . This means all traffic is sent through a security stack comprising various products before heading out to the Internet or data centre .
Now that users are often working remotely and applications are increasingly residing in various locations , the better solution will be to adopt a Zero Trust architecture to unify access across cloud and onprem apps that will effectively adapt to the complexity of the modern environment , embrace hybrid workplace and protect their people , devices , apps and data wherever they ’ re located .
What in your opinion is the biggest risk an organisation will face with reluctance in utilising the Zero Trust approach and expanding their cloud adoption solutions ?
The most common use case is user experience being traded off to maintain security in a hub and spoke network . This means users will often bypass any security inspection and connect straight to the Internet when they ’ re off the corporate network and this heavily increases the risk of cyberthreats .
Also , the increasing use of VPN technology preand post-Covid has become a threat vector for organisations as it connects users to random networks which increases the risk of lateral movement and attacks from infected devices or bad actors .
76 INTELLIGENTCIO MIDDLE EAST www . intelligentcio . com