Backup cloud data service center

Using the cloud – maximizing security

If you want to make the best possible use of the opportunities offered by the cloud, you must also keep security aspects in mind when using it

Download infographic now

Cloud Security: it's time to take it seriously

Is your company all covered on the cloud front? Find out more about the ideal cloud security setup that suits your company’s needs.

The cloud as an enabler of digital business models

Businessman sits in meeting room looking at a tablet in his hand

Digital business models with cloud solutions are considered indispensable by most companies. Following lengthy discussions, particularly regarding security aspects, this attitude has also become established in Europe. Although the discourse on cloud security risks has quietened down, this does not detract from the explosive nature of the topic – on the contrary, this 'silence' is a risky phenomenon. No company can afford to pursue a cloud strategy without a holistic security concept. All aspects and forms of cloud usage must be covered – from the right software to the appliances. This includes the secure web gateway as well as Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). For good security infrastructure, topics such as server and network security, identity and access management, shadow IT, information security (for example, encryption and GDPR compliance), and platform security are also relevant.

Customers also bear responsibility for cloud security

Very important to know: according to the law, the security of the cloud is by no means the sole responsibility of the provider. The GDPR instead stipulates shared responsibility between the provider and customer companies. Nobody can simply rely on the provider being able to, or even having to, cover all security aspects of cloud use. In practice, the clear majority of cloud leaks at present are likely even due to inadequate security measures on the part of users. Forecasts for the future are also clearly pointing in this direction: security vulnerabilities are almost exclusively within the users' area of responsibility.

When it comes to the subject of cloud security, cloud providers and cloud users must uncompromisingly pull together and work with one another. After all, both have a goal and each has an awful lot to lose: for the cloud users it is their likely critical data, and for the cloud providers it's their reputation and, ultimately, their business.

Cloud Monitor 2019, KPMG and bitkom research

Cloud security solutions for all areas

Man sits concentrated at the computer and holds pen end to his mouth

The customer's shared responsibility in the IaaS model includes data, applications, identity management, network and firewall configuration, and encryption. This becomes even more complex in a multi-cloud environment – i.e. when using several cloud services in a company. T-Systems Security has an expert understanding of the diversity and complexity of these tasks. The portfolio therefore includes cloud security solutions in the areas of SaaS protection, shadow IT, IaaS security, web application firewalls, securing databases and web traffic, SOC/SIEM monitoring, and container security. The multi-cloud strategy factor in particular can be addressed with these solutions. T-Systems Security's services cover the entire value chain, from consulting to integration and managed services.

Secure your multi clouds

Are you wondering if there are vulnerabilities in your cloud infrastructure? Or do you want to check whether the departments are using shadow IT? We would be happy to advise you on how to make your multi clouds secure.

Do you visit t-systems.com outside of Singapore? Visit the local website for more information and offers for your country.