For some 80 percent of companies who use cloud services today, multi-cloud strategies increase the complexity of their infrastructure. A cloud strategy with a holistic security concept helps them keep an overview and reduce risks at the same time. All aspects and forms of cloud use must be covered here, this includes the secure web gateway as well as Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). Other topics that are relevant to a healthy security infrastructure include network security, identity and access management, shadow IT, and information and platform security.
New technologies such as SASE or microsegmentation and even zero-trust architectures and CASB are being introduced too hesitantly. Meanwhile, the threat landscape is rapidly developing. Those who don't make use of the latest technologies often lag a decisive step behind attackers.
PAC study 2021: Cybersecurity for the cloud in Germany, Austria and Switzerland
Important to know: Despite the outsourcing of various processes to cloud providers, customers are still responsible for the protection of their data. From a legal perspective, the responsibility for cloud security doesn't just lie with the provider. According to the General Data Protection Regulation (GDPR) both cloud providers and customer have a obligations here. Simply transferring all data and processes to a public cloud is prohibited. Protecting sensitive data is the top priority in Europe and is therefore embedded into laws and regulations. With T-Systems Sovereign Cloud powered by Google Cloud, German companies can exploit the full potential of the Google Cloud and, at the same time, ensure that all European data protection standards have been met. This means that customers retain full control over their data, software, and operations. At the same time, they gain access to the power of the public cloud and can more easily drive innovation forward.
The customer's shared responsibility with regard to the cloud includes data, applications, identity management, network and firewall configuration, and encryption. This becomes even more complex in a multi-cloud environment. We understand the diversity and complexity of these tasks. Our portfolio includes cloud security solutions in the areas of SaaS protection, shadow IT, IaaS security, web application firewalls, securing databases and web traffic, SOC/SIEM monitoring, and container security. Our offering ranges from consulting through integration right up to managed services for the entire value chain.