You've requested...

Four Steps to Improving Cloud Security and Compliance

If a new window did not open, click here to view this asset.

Download this next:

Managed Print Services in the Cloud

The office workplace has undergone a dramatic change in recent years. The key trends of mobility, BYOD and the cloud have driven users to expect more rapid access to corporate applications and services. The traditional IT delivery model is adapting to support these requirements, with businesses increasingly turning to cloud computing and managed services, attracted by the cost and efficiency benefits.

This report from analyst group Quocirca discusses how extending managed print services (MPS) to the cloud, through standardisation of infrastructure, virtualised server resources and automated processes, will be a major paradigm shift.

Contents:

  • The need for MPS
  • Tackling print server sprawl
  • What is MPS in the cloud

These are also closely related to: "Four Steps to Improving Cloud Security and Compliance"

  • The great IAM - time to modernise?

    The discipline of information security is about letting the good guys in as well as keeping the bad guys out. But it is inevitably less “sexy” than its cyber-security twin.

    Nevertheless, Identity and Access Management is of a high strategic order importance, especially for large, complex corporate organisations with many types of employee requiring specific levels of access to particular kinds of information. And this has been accentuated in recent years by the need to be in compliance with the EU’s General Data Protection Regulation.

    In this e-guide we offer a refresher in IAM and highlight some of the trends that have an impact on it.

    Consumer identity and access management is a more recent sub-category with in IAM, with the first systems for this appearing in 2014. It still an “early-days” market, according to specialist analyst firm KuppingerCole. The business cases for this technology include targeted marketing to increase revenue, authentication of customers to enable single sign-on, providing a better user experience, and regulatory compliance.

    As with other areas of enterprise software, IAM is being reshaped, at least to some degree, by the rise of artificial intelligence in tandem with the maturation of big data analytics. And so, user behaviour analytics is becoming a link between identity management and “keep the bad guys out” security. Instead of focusing only on what is happening in a network, UBA is – again according to KuppingerCole, about users and what they are doing, and analysing that to identify anomalies that can be investigated as potential indicators of risk or threat.

    Cloud computing is another big vector of transformation in corporate IT and it, too, is having an effect on IAM. As this “tip” article discusses, the more cloud services we use, the more identities security professionals have to provision within these environments. Many SaaS [software as a service] scenarios often betoken a lack of control over account lifecycles.

    The British Red Cross and online auction platform Catawiki are among organisations wrestling with the complexities of modern identity and access management, with SaaS applications in play at both. The former has to manage access for 2,500 permanent internal users and a further 20,000 volunteers. The latter is an auction platform for rare and hard-to-find objects and experienced rapid early-stage growth that necessitated on-boarding new employees to a variety of business applications more quickly than anticipated. Both have turned to single sign on technology.

    As employee workstyles change beyond the “9 to 5 on a single site” paradigm of old, enterprises are having to cope with evermore complex access patterns. For many organisations it might be time to revisit their identity and access management strategies and modernise them.

  • UK IT Priorities 2016

    Every year, Computer Weekly and TechTarget conduct a global survey of our readers to understand their technology spending priorities for the coming 12 months. Our research offers a unique insight into the purchasing decisions of IT decision-makers worldwide - and as such it's a valuable benchmark for IT leaders to compare and contrast their plans with their peers. 

    The IT Priorities survey looks in depth at the technologies under consideration in the key areas of IT infrastructure - from datacentres to storage, from software to networking, security, mobile, information management and cloud services. 

    The study is conducted with senior IT professionals and presents real-life insights into how organisations are spending their IT budgets.

Find more content like what you just read:

  • Essential Guide: Securing hybrid IT infrastructure

    In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud.

    Download

  • Getting expense management right

    Analysts Clive Longbottom and Rob Bamforth look at the benefits that every organisation should be looking to gain from a travel and expenses management system.

    Download

  • CW APAC, June 2020: Trend Watch - data protection

    Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.

    Download

  • Europe IT Priorities 2016

    Every year, Computer Weekly and TechTarget conduct a global survey of our readers to understand their technology spending priorities for the coming 12 months. Our research offers a unique insight into the purchasing decisions of IT decision-makers worldwide.

    Download

  • Middle East IT Priorities 2016

    Computer Weekly's annual global survey of readers has once again revealed what CIOs around the world, including an increasing number of Middle East based IT leaders, are planning over the next 12 months.

    Download

  • Computer Weekly – 15 November 2022: How to protect against ransomware attacks

    In this week's Computer Weekly, we look at how to prepare for and protect against ransomware, and what to do if you're hit by an attack. We gauge industry reaction to Ofcom's plan to investigate the big three cloud providers. And we find out how travel giant TUI is implementing self-service analytics. Read the issue now.

    Download

  • CW Benelux ezine August 2016

    In this issue of CW Benelux we describe how data scientists in the Netherlands have applied technology to art.

    Download

  • Safeguard documents at every touchpoint

    Dive into this eBook to discover how Adobe Document Cloud for enterprise mitigates risks across document lifecycles with a robust, multi-layered security approach. You’ll learn how these solutions help teams maximise their technology investment.

    Download

  • SWG: Answering FAQs

    To battle proliferating web-based threats, many organizations have adopted a secure web gateway (SWG) in order to filter malicious content. For leaders interested in augmenting their SWG knowledge, this e-book can serve as a comprehensive guide. Tap into the book to unlock answers to FAQs about SWGs.

    Download

  • Computer Weekly - 5 November 2019: The benefits of API-first software development

    In this week's Computer Weekly, we find out how organisations are using an API-based approach to software development to boost digital initiatives. We examine the potential pitfalls in using cloud storage. And we talk to the Department for Work and Pensions about its four-year project to move from outsourced IT to the cloud. Read the issue now.

    Download

  • Effectively leveraging cloud-based contracts

    Cloud contracts offer great benefits, but they can put organisations at significantly greater risk than conventional IT service contracts. This report by consultant Bob Fawthrop explains how to mitigate the risks.

    Download

  • Computer Weekly - 7 April 2020: Adapting IT to the new normal

    In this week's Computer Weekly, we talk to four top IT leaders to find out how they are supporting their organisations through the coronavirus crisis. We look at the security best practices recommended by experts to ensure safe remote working for staff. And the CISO of Equifax explains why the firm is moving to public cloud. Read the issue now.

    Download

  • Application security: More important than ever

    In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.

    Download

  • CW Nordics August 2016

    The Nordic countries are renowned for being home to thriving tech startup scenes so it is hardly surprising that IT is a disruptive force in the region.

    Download

  • How SASE can protect your digital assets

    Between skyrocketing amounts of data and the IT skills shortage, organizations encounter significant obstacles on their path toward securing their digital assets. Along with digging into those challenges, this white paper explores how businesses can surmount them with SASE. Keep reading to unlock these insights.

    Download

  • IT Project: Migration to cloud

    The benefits of using cloud are well-known, but the challenges and barriers enterprises come up against during their move off-premise can be wide, varied and unexpected. Knowing how best to negotiate these issues can help speed up the process of shifting workloads and applications to the cloud immeasurably.

    Download

  • 3 key use cases of AI-powered SASE

    In the face of increasing IT costs and widening security gaps, many organizations have adopted a SASE tool, such as AI-powered SASE. So, what should you know about AI-powered SASE? For a quick introduction to the topic, continue on.

    Download

  • 8 actions for stronger OT cybersecurity

    Along with digging into the major cybersecurity threats troubling OT, such as IoT botnets and malware attacks, this e-book outlines 8 actions that organizations can take to defend their OT environments. Review the book and elevate your OT security preparedness.

    Download

  • MicroScope January 2014: A special issue looking at software defined networking

    The first issue of 2014 provides some insight in managed services, software defined networking, security and data centres

    Download

  • Computer Weekly – 26 February 2019: Delving into viewer data at the BBC

    In this week's Computer Weekly, we talk to the BBC about how the UK broadcaster is using data analytics to better understand its viewers and grow its audience. We look at how CERN is using IT automation in its quest to unravel the mysteries of the universe. And we examine the impact of GDPR on cloud storage. Read the issue now.

    Download

  • Your GDPR guide

    Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.

    Download

  • Trust no one: Why zero trust security is taking the world by storm

    As zero-trust strategies continue to grow, we take a look into the history and evolution of the zero-trust approach, the main challenges involving zero-trust implementation in 2022, and what APAC firms can do to stay ahead of cyber threats.

    Download

  • Computer Weekly – 15 October 2019: Securing the internet of things

    In this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.

    Download

  • Data Analytics in Healthcare: Opportunities & Challenges

    In this e-guide, read about the promises of healthcare data analytics, the challenges faced by healthcare providers in digital transformation and what some cloud providers are doing to assuage the security concerns of cloud among healthcare service providers.

    Download

  • CW Europe – March-May 2019: Robots deliver savings for Dutch postal service PostNL

    European businesses have bought into the digital revolution, with the adoption of the latest technologies like automation enabling companies to transfer their internal operations.

    Download

  • Getting Cloud Security Right

    In this e-guide, we will consider how to do cloud security right. Regular Computer Weekly contributor Peter Ray Allison explores this issue, weighing up the questions organisations should be asking of their cloud service providers, and whose responsibility cloud security should be.

    Download

  • Print security: An imperative in the IoT era

    Analyst group Quocirca gives the perspective on the risks and best practices of print security.

    Download

  • Information Risk Management – Expectations Versus Reality

    Many businesses have identified a gap between their ideas of information risk management strategies and the maturity of their implementations. Through considering the experiences of 12 security professionals, the “Information Risk Management—Expectations Versus Reality” report explores this gap. Continue reading to unlock insights.

    Download

  • Computer Weekly Buyer's Guide: Identity and Access Management

    When used effectively, identity and access management can streamline business processes. In this 17-page buyer's guide, Computer Weekly looks at the challenges it can bring large companies, the implications of cloud and how to pick the right service for your firm.

    Download

  • Cloud computing storage key management

    Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.

    Download

  • Crucial considerations for implementing a SIEM solution

    Outsourcing SIEM management to cybersecurity specialists eliminates infrastructure costs, simplifies compliance, and provides 24/7 protection. Read more on outsourcing SIEM so you can scale securely.

    Download

  • Top OT cybersecurity risks & how to defend against them

    As cybercriminals continue to target older operational technology (OT) systems, security leaders are pressed to bolster defenses. To help them do so, this e-book details the top risks associated with OT systems and the ways that businesses can strengthen their security stances. Read on to access these insights.

    Download

  • CW Benelux - August-October 2020: Problems with critical security systems at Schiphol Airport

    Schiphol Airport in Amsterdam is one of Europe's main access points, so you might be surprised to read that IT systems such as those controlling the Dutch borders are rarely tested. In this issue, read about a critical report from the Dutch Court of Audit.

    Download

  • CW Benelux - August-October 2020: Problems with critical security systems at Schiphol Airport

    Schiphol Airport in Amsterdam is one of Europe’s main access points, so you might be surprised to read that IT systems such as those controlling the Dutch borders are rarely tested. In this issue, read about a critical report from the Dutch Court of Audit.

    Download

  • Data protection, a live issue that affects us all

    Defined as the process of protecting important information from corruption, compromise or loss, the importance of data protection now cannot be understated. In this e-guide we will explore some of the key issues around data protection, which should be an integral, core part of your organisation's cyber security strategy.

    Download

  • Cloud Migration: How to do so safely and securely

    In this e-guide, we take a closer look at what enterprises need to consider before pressing play on their cloud migration plans. Not only to ensure their move to the off-premise world goes as smoothly as possible, but also to make sure it brings the maximum amount of benefit to their business.

    Download

  • State of GDPR in mainland Europe

    The General Data Protection Regulation has been in place for over 18 months now, but its implementation is only really just becoming clearer as regulators begin to fine organisations that fail to meet the rules. That is because different countries are implementing it differently. This e-guide gives a snapshot of the current state of GDPR in Europe.

    Download

  • A Computer Weekly buyer's guide to compliance, risk and governance

    Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach

    Download

  • ITSM: Maintaining IT devices and applications

    This expert eGuide offers an inside look at IT service management, some of the benefits various support solutions offer and what you should look for in an ITSM tool. Also, engage in some opinions CIO's have on the subject of their ITSM pain points.

    Download

  • Computer Weekly – 22 October 2019: Microsoft vs Google – who's winning the cloud email race?

    In this week's Computer Weekly, there's a two-horse race for dominance in the cloud email market between Microsoft and Google, but they are not alone – we examine the runners and riders. Our latest buyer's guide looks at governance, risk and compliance solutions. And we assess the progress of public cloud in the banking sector. Read the issue now.

    Download

  • Computer Weekly – 30 January 2018: Davos debates global tech risks

    In this week's Computer Weekly, world leaders at Davos discussed the growing reliance on technology and how to tackle the political and economic threats of the digital age. Our latest buyer's guide examines mobile app development. And we look at the biggest challenges facing CIOs in 2018. Read the issue now.

    Download

  • Practical guidance for securing SaaS data on Workday

    Workday is a popular software as a service (SaaS) solution used by many organizations. This guide provides an overview of Workday, aiming to equip security professionals with a solid understanding of Workday’s unique risks. Read on to learn more.

    Download

  • Data classification tools: What they do and who makes them

    Data classification is an essential pre-requisite to data protection, security and compliance. Firms need to know where their data is and the types of data they hold. In this article, learn more about how these tools can help keep your data tidy and which suppliers offer the best options in the market.

    Download

  • Secure Microsoft 365 with AppOmni's platform

    AppOmni's guide details how its SaaS security platform protects sensitive data in Microsoft 365. It outlines configuration risks, data storage, roles, customization, 3rd-party apps, logging, and threat detection. Read the guide to learn how AppOmni secures your M365 environment.

    Download

  • Computer Weekly Buyer's Guide to EU General Data Protection Regulation

    In this 12-page buyer's guide, we look at the tools that could be used for compliance, the incentive to create a smarter, leaner business, and the myths surrounding the new rules.

    Download

  • Demystifying the myths of public cloud computing

    In this article in our Royal Holloway security series, Chris Hodson asks whether public cloud is less secure than private datacentres, and assesses service models, deployment, threats and good practice.

    Download

  • Computer Weekly – 10 March 2020: Is technology innovation broken?

    In this week's Computer Weekly, despite its reputation for fresh thinking the tech sector is stuck in old ways that prevent true innovation – an expert explains why. Our buyer's guide examines how networking is affected by the growth of cloud-native applications. And we look at the key tech-related compliance issues for SMEs. Read the issue now.

    Download