Businessman sits in leather armchair in front of concrete wall and reads on his tablet

Using the cloud – maximizing security

If you want to make the best possible use of the opportunities offered by the cloud, you must also keep security aspects in mind when using it

Download white paper

Benefit from the cloud without compromising security

With the adoption of multi-cloud strategies, many organizations have become susceptible to loss of visibility and control in the Cloud. In order to cater to this, T-Systems provides a comprehensive portfolio of products and services that enable our customers to deal with their security responsibilities in the Cloud. The portfolio ranges from cloud-specific consulting to strategical selection and implementation of tools for a balanced cloud security architecture. Learn in this video how to secure your multi-cloud infrastructure.

The cloud as an enabler of digital business models

Businessman sits in meeting room looking at a tablet in his hand

Digital business models with cloud solutions are considered indispensable by most companies. Following lengthy discussions, particularly regarding security aspects, this attitude has also become established in Europe. Although the discourse on cloud security risks has quietened down, this does not detract from the explosive nature of the topic – on the contrary, this 'silence' is a risky phenomenon. No company can afford to pursue a cloud strategy without a holistic security concept. All aspects and forms of cloud usage must be covered – from the right software to the appliances. This includes the secure web gateway as well as Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). For good security infrastructure, topics such as server and network security, identity and access management, shadow IT, information security (for example, encryption and GDPR compliance), and platform security are also relevant.

Whitepaper: IT Security in the cloud age

Read more on new security requirements as part of the cloud transformation.

Customers also bear responsibility for cloud security

Very important to know: according to the law, the security of the cloud is by no means the sole responsibility of the provider. The GDPR instead stipulates shared responsibility between the provider and customer companies. Nobody can simply rely on the provider being able to, or even having to, cover all security aspects of cloud use. In practice, the clear majority of cloud leaks at present are likely even due to inadequate security measures on the part of users. Forecasts for the future are also clearly pointing in this direction: security vulnerabilities are almost exclusively within the users' area of responsibility.

When it comes to the subject of cloud security, cloud providers and cloud users must uncompromisingly pull together and work with one another. After all, both have a goal and each has an awful lot to lose: for the cloud users it is their likely critical data, and for the cloud providers it's their reputation and, ultimately, their business.

Cloud Monitor 2019, KPMG and bitkom research

Cloud security solutions for all areas

Man sits concentrated at the computer and holds pen end to his mouth

The customer's shared responsibility in the IaaS model includes data, applications, identity management, network and firewall configuration, and encryption. This becomes even more complex in a multi-cloud environment – i.e. when using several cloud services in a company. T-Systems Security has an expert understanding of the diversity and complexity of these tasks. The portfolio therefore includes cloud security solutions in the areas of SaaS protection, shadow IT, IaaS security, web application firewalls, securing databases and web traffic, SOC/SIEM monitoring, and container security. The multi-cloud strategy factor in particular can be addressed with these solutions. T-Systems Security's services cover the entire value chain, from consulting to integration and managed services.

Secure your multi clouds

Are you wondering if there are vulnerabilities in your cloud infrastructure? Or do you want to check whether the departments are using shadow IT? We would be happy to advise you on how to make your multi clouds secure.

Do you visit t-systems.com outside of Singapore? Visit the local website for more information and offers for your country.