As a tech company, you're probably using the cloud to share files and backup data. But many are now migrating mission-critical applications and databases to the cloud too. Migrating these workloads to the cloud is a strategic move for more agile and business-aligned operating model for IT. Furthermore, the cloud enables effective disaster recovery and high availability —limiting downtime and supporting geographically-distributed tech businesses respectively.
We recommend an IMS strategy (Identify, Match and Secure) as you mature your cloud infrastructure:
- Identify your business goals
- Match with the right cloud infrastructure
- Secure endpoint devices
Identify & Match
If efficiency and collaboration is your goal, then move email to the cloud if you haven’t already. This will reduce the burden on IT as well as the costs of outdated third-party email servers.
Are you using more than one public cloud provider for storage and collaboration? Consolidate rather than creating data silos or make use of publicly available APIs to link services together.
Further down the collaboration path, you can deploy "virtual desktops" to your users with a solution such as Lenovo Unified Workspace. This workspace aggregation solution makes it possible to access public or private web-based apps, legacy Windows apps, remote desktops, cloud storage and file shares—all in a user-friendly, cost-effective, web-based workspace.
Migrating on-premises or hosted databases to the cloud? Private cloud is optimal if you have legacy applications or security requirements that mandate an on-premises solution. Otherwise, consider "hybrid cloud," which combines private and public services. Sensitive data and complex workloads can leverage on-premises infrastructure, improving control and reducing latency, while collaboration services on the public cloud enable scale and efficiency.
Finally, if your needs are file sharing, database storage and backup, don’t over-engineer. Public cloud enables you to realize cost and efficiency benefits without investing in infrastructure.
Three quarters of cloud data breaches are caused by malicious acts or human error,* with most of those targeting endpoint devices through malware, or because data was stored inappropriately on unsecured devices.
Protecting endpoint devices is a critical aspect of cloud security.
- Issue endpoint devices that support multi-factor authentication (e.g., biometric security factors) and enable MFA policies.
- Full-disk encryption of devices will protect them from giving up their cloud access credentials in the event of theft or loss.
- And there are ways to improve the security of users’ connections to cloud services. For example, Lenovo Vantage detects and analyzes in real-time any threats or attacks that are present near the laptop and enables the PC to distinguish between legitimate and possibly malicious networks.
* Ponemon, 2017 Cost of Data Breach Study