Like most organizations, you are using Cloud to share files and backup data. But over the next year, 33% of manufacturing businesses are planning to move mission-critical applications and databases to the cloud*. It's not surprising, because the Cloud offers scalability, operational efficiency, and better partner integration - for both suppliers and distributors. It can facilitate the development of new products, for example through more efficient data and engineering analysis.
We recommend an IMS strategy (Identify, Match and Secure), as you mature your Cloud infrastructure: (1) Identify your business goals, (2) Match with the right Cloud infrastructure, (3) Secure endpoint devices.
Identify & Match
If efficiency and collaboration is your goal, move email to the Cloud if you haven’t already; this will reduce the burden on IT, or the costs of outdated 3rd party email servers.
Are you using more than one public cloud provider for storage and collaboration? Consolidate rather than creating data silos or make use of publicly available APIs to link services together.
Furthering collaboration, you can deploy ‘virtual desktops’ with a solution like Lenovo Unified Workspace. This makes it possible to deliver on any device, access to public or private web-based apps, legacy Windows apps, remote desktops, cloud storage and file shares - all in a user-friendly, cost effective, web-based workspace.
Migrating on-premises or hosted databases to the cloud? Private cloud is the right solution if you have legacy applications, or security requirements that mandate it. Otherwise, consider ‘hybrid cloud’ which combines private and public services. Sensitive data and complex workloads - such as modelling and simulations - can leverage on-premise infrastructure, improving control and reducing latency. Meanwhile public cloud can be utilized for scale and efficiency; for example, big data analysis, or managing partner channels through portals that can track sales and speed up order processing.
Finally, if your needs are only file sharing, database storage and backup, don’t over-engineer; public cloud is probably the right way to go, enabling you to realize cost and efficiency benefits without investing in infrastructure. Around 50% of organizations like yours are using a public cloud solution* only.
Three quarters of cloud data breaches are caused by malicious acts or human error** with most of those targeting endpoint devices through malware, or because data was stored inappropriately on unsecured devices.
Protecting endpoint devices is a critical aspect of Cloud security. Issue endpoint devices that support multi-factor authentication (e.g. biometric security) and enable MFA policies.
Full-disk encryption of devices will protect them from giving up their Cloud access credentials in the event of theft or loss.
And there are ways to improve the security of users’ connection to Cloud services. For example, Lenovo Vantage detects and analyzes in real-time any threats or attacks that are present near the laptop and enables it to distinguish between legitimate and possibly malicious networks.
* Lenovo research, 2017 ** Ponemon, 2017 Cost of Data Breach Study