Intelligent CIO Middle East Issue 88 | Page 46

CIO OPINION
Networking services should route traffic efficiently and securely while complying with all data sovereignty laws . Storage services should inherently comply with data residency regulations . And processing should adhere to relevant data localisation standards .
Remote browsers resolve device complaints
Browser Isolation is a clever piece of technology that essentially provides security through physical isolation .
The cloud takes on compliance
Governments around the world are rolling out new privacy regulations . In Europe , the General Data Protection Regulation ( GDPR ) which became enforceable in 2018 gives individuals more control over their personal data and how it ’ s used . Other countries worldwide are following suit and using GDPR as a model . In the US , there are five states with new consumer privacy laws that take effect in 2023 and more states are considering legislation . And at the federal level , lawmakers are slowly putting forward their own privacy regulations with the American Data and Privacy Protection Act ( ADPPA ) which is an online privacy bill that aims to regulate the gathering and storing of consumer data .
Companies must now understand and comply with this patchwork of regulations as they do business globally . How can organisations hope to stay current and build compliance into their applications and IT systems ?
We believe the majority of cloud services will soon come with compliance features built in . The cloud itself should take the compliance burden off companies . Developers shouldn ’ t be required to know exactly how and where their data can be legally stored or processed . The burden of compliance should largely be handled by the cloud services and tools developers are building with .
Security policies , privacy laws and regulations require all companies to protect their sensitive data ; from where it ’ s stored and processed , to where it ’ s consumed in end-user applications . In the past , it was relatively straightforward to fully control end-user devices because they were often issued by and dedicated to company use only . But with the increasing use of personal smartphones and tablets , the bring-yourown-device ( BYOD ) trend has been picking up steam for several years and was even more readily embraced during the various stages of the global pandemic .
Looking ahead , it ’ s our belief that this pendulum of BYOD will swing back toward tighter security and more control by the IT organisation . The need to consistently enforce security policies and privacy controls will begin to outweigh the sense of urgency and demand for convenience we encountered during the last few years . But because so much of our digital lives live in a web browser , this control may take a different form than in the past . This new form will mean more control for IT administrators AND a better user experience for employees .
Browser Isolation is a clever piece of technology that essentially provides security through physical isolation . This technique creates a ‘ gap ’ between a user ’ s web browser and the endpoint device thereby protecting the device ( and the enterprise network ) from exploits and attacks . Remote Browser Isolation ( RBI ) takes this a step further by moving the browser to a remote service in the cloud . Cloud-based remote browsing isolates the end-user device from the enterprise ’ s network while fully enabling IT control and compliance solutions .
Some say in this remote browsing model that ‘ the browser is the device ’. Instead of BYOD , it might be appropriate to call this ‘ BYOB ’ or Bring Your Own Browser . Most companies are looking to better balance the security and privacy needs of the company with the user experience and convenience for employees . At Cloudflare , we use our remote browser isolation in conjunction with Zero Trust access to protect our users and devices . It ’ s completely transparent to users and strikes a perfect balance between security and user experience . We believe remote browser isolation will be embraced broadly as IT leaders become more aware of the benefit and just how well it works . p
46 INTELLIGENTCIO MIDDLE EAST www . intelligentcio . com