• CERTIFICATE
    • Eminent VARs of India
    • Best OEM 2023
  • SYNDICATION
    • AMD
    • DELL TECHNOLOGIES
    • HITACHI
    • LOGMEIN
    • MICROSOFT
    • RIVERBED
    • STORAGECRAFT
    • THALES
  • EVENTS
  • GO DIGITAL
  • INFOGRAPHICS
  • PRESS
    • Press Release PR News Wire
    • Press Release Business Wire
    • GlobeNewsWire
  • SPECIAL
    • WHITE PAPER
    • TECHNOMANIA
    • SME
    • SMART CITY
    • SERVICES
    • EDITOR SPEAK
    • CSR INITIATIVES
    • CHANNEL GURU
    • CHANNEL CHIEF
    • CASE STUDY
  • TECHTREND
    • VAR PANCHAYAT
    • TELECOM
    • SOFTWARE
    • POWER
    • PERIPHERALS
    • NETWORKING
    • LTE
    • CHANNEL BUZZ
    • ASK AN EXPERT
  • SUBSCRIBE
  • Apps
  • Gaming
  • KDS
  • Security
  • Telecom
  • WFH
  • Subscriber to Newsletter
  • April Issue
  • Blogs
  • Vlogs
  • Faceoff AI
    

HOME
NEWS

The post-pandemic world reshaping the security challenges


By VARINDIA - 2021-05-29
The post-pandemic world reshaping the security challenges

Plus, there are many advantages in storing data centrally and off-premise when it comes to mobility, remote working, collaboration, and flexibility. Many organisations prefer the combination of both cloud and edge computing suits. At the same time, some businesses opt for the networking architecture known as fog computing, whereby instead of collecting and analysing their data in ‘the’ cloud, or at the edge, it is hosted on a local area network.

 

 

 

The advantage of edge solutions includes low latency, high bandwidth, device processing and data offload as well as trusted computing and storage. Cloud solutions are often cheaper, more powerful, easier to implement, integrate, scale and shift the cost burden from capital to operational expenditure. Plus, there are many advantages in storing data centrally and off-premise when it comes to mobility, remote working, collaboration, and flexibility.

 

 

 

 

 

Many organisations prefer the combination of both cloud and edge computing suits. At the same time, some businesses opt for the networking architecture known as fog computing, whereby instead of collecting and analysing their data in ‘the’ cloud, or at the edge, it is hosted on a local area network. On this backdrop VARINDIA has recently hosted an event on the importance of cloud, importance of hybrid computing in reshaping the corporate data centre, on cyber-crimes etc. The event was moderated by Dr. Deepak Kumar Sahu, Chief Editor, VarIndia.

 

 

 

On the importance of cloud, Prasad T, CISO, InstaSafe says, “Initially, it is becoming a big challenge to the cloud technologies organizations, because data is very costly. So, even one security threat can cost millions for companies. Technology is coming up to protect these. Companies are moving to cloud because of scalable factors and the cost can scale to any mode dynamically on the requirement basis, and then scale down and pay only for what is used. Due to this capability, more hybrid capable solutions are getting in the cloud and beyond. At the same time, security post shows also need to be taken care of, that is like the biggest challenge today. I would also say zero trust here because I am hearing it daily. These kinds of technologies of protecting the assets of the organizations are being watched from outside. Today, we have a lot of automated boards running around. So as long as we have a proper protection in place, then I think it is completely possible. Cloud is the way to go, what I would suggest, that it is the future, this is the place where we can do a lot more innovative and use resources only when we need.”

 

 

On cloud infrastructure he also depicts, “According to me, there are two angles, one how your cloud infrastructure is structured and configured because the cloud has its own way of getting into and way of hacking. They have their own ways. There are security policies, DPC configurations and stuff. Each cloud has its own settings and other things. Once you remove that layer, then it is the same as the Data Center. You have your service application so that the same way you keep it in the data center, however the security posture of these is the responsibility of the company. Many believe, once you move your infrastructure into the cloud that is the cloud provider’s responsibility to take care of it. That is not true. Make sure whatever you want, even in your data center for that matter, get it tested by some security researchers and have your own routine of scanning policies, you have in place, and if you can keep them behind a firewall gateway.”

 

 

On the importance of edge over hybrid cloud Vivek Ahuja, Head-IT, IDEMIA says, “It is not very easy for an enterprise but it is easy for a startup, as it can be born in the cloud. But for the enterprise it is a game. For some government projects and some private banking projects it worked well. Whenever they want to ramp up, we can do that within minutes. If we had purchased the hardware in our data center we could have never maintained that business. Hybrid computing, and choosing where to use the cloud or not to use it is very important.

 

From my point of view, software defined networks are used when we look at security or lateral blocking of traffic or monitoring of it but if we look vertical my experience is not very nice so far. We have used software defined networks for regular traffic and as well as for vertical traffic also, with options from virtualization providers.”

 

 

Talking on the importance of edge over hybrid cloud, Bharat B Anand, Head It & Security- EC Council points out, “People are right now looking at a combination of both, hybrid and cloud because of regulatory for one reason, and the second industry to industry. This is a transitional phase before we have probably a time to count where they compromise changes to hybrid to serverless. Probably more people have started talking about serverless architecture. If you look at reports by Gartner or IDC, you will see those who have been talking about on-premise have transitioned to hybrid. And those who have gone hybrid about 60% of them and started talking about how to go into the serverless architecture.

 

For sure, technology innovation brings in a lot of use cases, in terms of availability, ease of doing business on and so forth, the most important one is the pandemic, which acted as a catalyst.

 

When the lockdown happened and people had to be augmented, then the business came really handy. Most of Microsoft or AWS is a clear indicator of this while the rest of the businesses took a hit. Major shift is happening and it is going to happen, as the organizations will start looking at their business from a business-focused point of view, rather than an IT-focused point of view. My core business is to manufacture automobiles, So I will be focused on how to deliver a positive management system, which should have inherent limitations of saying so, so I would prefer, and move into a space where I have anytime, anywhere availability.”

 

 

Whereas, Guru Prasad Rath, Business Analyst & Senior Advisor - Applications focuses on the challenges of cloud, he comments, “Being a person from the application, I find the biggest challenge is the cyclic use of data. And when you move to the cloud, how much the data is being used, particularly an industry like FinTech or BPO look at a simple example where the invoice image needs to be downloaded a number of times for verification, modification and data entry, the cost of cloud becomes more.

 

When We shifted from on premises to the cloud, we got a bill almost double. Optimizing the usage and the cyclic use of data is of great challenge. As cyclic use of data is more particular, clients have to look at how to optimize the implemented product.”

 

 

 

On the rising cybercrimes and to decipher away from it, Pankaj Khare, HEAD-IT, PINE LAB elaborates, “We may or may not gain the immediate benefit from cloud computing. Definitely one has to take security measures. I would say that are data breaches, applications via cloud, but by having proper security controls in place we can have it in our hands.

 

There are so many authentication layers while using cards. As I work for Fintech, we ensure that all the CVV numbers are confidential whenever we secure, we have to follow the norms of changing the password and the pin regularly.

 

These are some basic things I would suggest one should do in order to avoid the vulnerability of using cards, and we should never use the systems which is kind of remote and vulnerable, because we need to have a proper system, even the mobile devices, by which we are using anything related with our financial transactions should be properly secured enough. That is the point number one. Changing passwords, pin numbers regularly is a secondary option.”

 

Representing the common man’s interest Advocate Dattatray B. Dhainje raises concern for the cloud-based environment and its challenges. He says, “Multi-factor authentication is a beautiful way in which we can detain the security. Crypto-jacking is like a cyber security challenge which might occur in a cloud-based environment. Many have experienced data breaches, hijacking accounts even when people are using the cloud.

 

Training is also an important factor in providing cloud security. If we want to make sure that our cloud-based environment needs to be secured then ideas like intrusion detection systems, intrusion prevention systems are the basic dividers.”

The event ended here with a happy note.

See What’s Next in Tech With the Fast Forward Newsletter

SECURITY
View All
Zscaler announces AI innovations to its Data Protection Platform
Technology

Zscaler announces AI innovations to its Data Protection Platform

by VARINDIA 2024-05-20
SHIELD to enhance Swiggy’s fraud prevention and detection capabilities
Technology

SHIELD to enhance Swiggy’s fraud prevention and detection capabilities

by VARINDIA 2024-05-20
Axis Communications announces its first thermometric camera designed for Zone/Division 2
Technology

Axis Communications announces its first thermometric camera designed for Zone/Division 2

by VARINDIA 2024-05-20
SOFTWARE
View All
Hitachi Vantara and Veeam announce Global Strategic Alliance
Technology

Hitachi Vantara and Veeam announce Global Strategic Alliance

by VARINDIA 2024-05-16
Adobe launches Acrobat AI Assistant for the Enterprise
Technology

Adobe launches Acrobat AI Assistant for the Enterprise

by VARINDIA 2024-05-11
Oracle Database 23ai offers the power of AI to Enterprise Data and Applications
Technology

Oracle Database 23ai offers the power of AI to Enterprise Data and Applications

by VARINDIA 2024-05-10
START - UP
View All
Data Subject Access Request is an integrated module within ID-REDACT®
Technology

Data Subject Access Request is an integrated module within ID-REDACT®

by VARINDIA 2024-04-30
SiMa.ai Secures $70M Funds from Maverick Capital
Technology

SiMa.ai Secures $70M Funds from Maverick Capital

by VARINDIA 2024-04-05
Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure
Technology

Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure

by VARINDIA 2024-02-08

Tweets From @varindiamag

Nothing to see here - yet

When they Tweet, their Tweets will show up here.

CIO - SPEAK
Automation has the potential to greatly improve efficiency and production

Automation has the potential to greatly improve efficiency and production

by VARINDIA
Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

by VARINDIA
Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

by VARINDIA
Start-Up and Unicorn Ecosystem
GoDaddy harnesses AI power for new domain name recommendations

GoDaddy harnesses AI power for new domain name recommendations

by VARINDIA
UAE’s du Telecom selects STL as a strategic fibre partner

UAE’s du Telecom selects STL as a strategic fibre partner

by VARINDIA
JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

by VARINDIA
Rapyder partners with AWS to accelerate Generative AI led innovation

Rapyder partners with AWS to accelerate Generative AI led innovation

by VARINDIA
ManageEngine integrates its SIEM solution with Constella Intelligence

ManageEngine integrates its SIEM solution with Constella Intelligence

by VARINDIA
Elastic replaces traditional SIEM game with AI-driven security analytics

Elastic replaces traditional SIEM game with AI-driven security analytics

by VARINDIA
Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

by VARINDIA
Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

by VARINDIA
Dassault Systèmes to accelerate EV charging infrastructure development in India

Dassault Systèmes to accelerate EV charging infrastructure development in India

by VARINDIA
Tech Mahindra and Atento to deliver GenAI powered business transformation services

Tech Mahindra and Atento to deliver GenAI powered business transformation services

by VARINDIA
×

Reproduction in whole or in part in any form or medium without express written permission of Kalinga Digital Media Pvt. Ltd. is prohibited.

  • Distributors & VADs
  • Industry Associations
  • Telco's in India
  • Indian Global Leaders
  • Edit Calendar
  • About Us
  • Advertise Us
  • Contact Us
  • Disclaimer
  • Privacy Statement
  • Sitemap

Copyright varindia.com @1999-2024 - All rights reserved.