T-Systems-Claim-Logo
Search
Businessman sits in leather armchair in front of concrete wall and reads on his tablet

Using the cloud – maximizing security

If you want to make the best possible use of the opportunities offered by the cloud, you must also keep security aspects in mind when using it

Download Whitepaper

The cloud as an enabler of digital business models

Businessman sits in meeting room looking at a tablet in his hand

Digital business models with cloud solutions are considered indispensable by most companies. Following lengthy discussions, particularly regarding security aspects, this attitude has also become established in Europe. Although the discourse on cloud security risks has quietened down, this does not detract from the explosive nature of the topic – on the contrary, this 'silence' is a risky phenomenon. No company can afford to pursue a cloud strategy without a holistic security concept. All aspects and forms of cloud usage must be covered – from the right software to the appliances. This includes the secure web gateway as well as Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). For good security infrastructure, topics such as server and network security, identity and access management, shadow IT, information security (for example, encryption and GDPR compliance), and platform security are also relevant.

Customers also bear responsibility for cloud security

Very important to know: according to the law, the security of the cloud is by no means the sole responsibility of the provider. The GDPR instead stipulates shared responsibility between the provider and customer companies. Nobody can simply rely on the provider being able to, or even having to, cover all security aspects of cloud use. In practice, the clear majority of cloud leaks at present are likely even due to inadequate security measures on the part of users. Forecasts for the future are also clearly pointing in this direction: security vulnerabilities are almost exclusively within the users' area of responsibility.

How we secure the clouds of our customers

New technologies like SASE or micro-segmentation and even zero trust architectures or CASB are embraced too slow. The security threat landscape is developing with high pace. Not using the latest technology means hanging an often-decisive step behind the attackers.

PAC 2021: Cloud-related Cyber Security in Germany, Switzerland, and Austria

Cloud security solutions for all areas

The customer's shared responsibility in the IaaS model includes data, applications, identity management, network and firewall configuration, and encryption. This becomes even more complex in a multi-cloud environment – i.e. when using several cloud services in a company. Telekom Security has an expert understanding of the diversity and complexity of these tasks. The portfolio therefore includes cloud security solutions in the areas of SaaS protection, shadow IT, IaaS security, web application firewalls, securing databases and web traffic, SOC/SIEM monitoring, and container security. The multi-cloud strategy factor in particular can be addressed with these solutions. Telekom Security's services cover the entire value chain, from consulting to integration and managed services.

Secure your multi clouds

Are you wondering if there are vulnerabilities in your cloud infrastructure? Or do you want to check whether the departments are using shadow IT? We would be happy to advise you on how to make your multi clouds secure.

Do you visit t-systems.com outside of Germany? Visit the local website for more information and offers for your country.