CIOAdvisor Apac

  • Home
  • Vendors
  • News
  • Conference
  • Whitepapers
  • Newsletter
  • Subscribe
  • About Us
  • Specials

  • Menu
      • Ad Management
      • Application Security Testing
      • Artificial Intelligence
      • BPO
      • Contact Center
      • Data Analytics
      • Deep Learning
      • Digital Marketing
      • Digital Transformation
      • Disaster Recovery Services
      • Disinfection and Sanitization
      • E-Invoicing
      • Ecommerce
      • Govt Tech
      • HubSpot
      • Human Resource
      • ICT
      • IoT
      • Laser and Photonics
      • Leadership Development
      • Logistics
      • Machine Learning
      • Marketing Technology
      • Mobile Application
      • Parking Management
      • Payment And Card
      • SDN
      • Telecom
  • Digital Transformation
  • Logistics
  • IoT
  • Payment And Card
  • Artificial Intelligence
Specials
  • Specials

  • Ad Management
  • Application Security Testing
  • Artificial Intelligence
  • BPO
  • Contact Center
  • Data Analytics
  • Deep Learning
  • Digital Marketing
  • Digital Transformation
  • Disaster Recovery Services
  • Disinfection and Sanitization
  • E-Invoicing
  • Ecommerce
  • Govt Tech
  • HubSpot
  • Human Resource
  • ICT
  • IoT
  • Laser and Photonics
  • Leadership Development
  • Logistics
  • Machine Learning
  • Marketing Technology
  • Mobile Application
  • Parking Management
  • Payment And Card
  • SDN
  • Telecom
×
#

CIO Advisor APAC Weekly Brief

Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from CIO Advisor APAC

Subscribe

loading
  • Home
  • News
Editor's Pick (1 - 4 of 8)
left
The Power of Elastic Decentralised Teams

Pedro Sttau, Group CIO, iCar Asia Limited

The Cloud: A Business Initiative with IT Benefits

John Emerson, Global CIO, Tait Communications

Data Driven Business Insights, Big or Small: We like them All

Arnoud Campman, Regional CIO, FrieslandCampina Consumer Products Asia

Collaborating in the Cloud - from Public, Private to Hybrid and Multi-Cloud

Sanjay Sivam, Director, Inside Sales and Services Sales, Poly Asia Pacific

Revisiting Technology Lock-In in the Cloud

Andre Siregar, Chief Technology Officer, CCRManager

Cloud Economics

Riki Williscroft, Cloud Product Owner, Auckland Transport

Migration to the Cloud a Silver Lining for the Australian Government

Peter Moore, Regional Managing Director for Worldwide Public Sector in Asia-Pacific, Amazon Web Services [NASDAQ: AMZN]

The Cloud's Hard Impact

Joe Waller, Chief Product & Technology Officer, Finder

right

THANK YOU FOR SUBSCRIBING

Protecting Data in a Government Hybrid Cloud Environment

CIOAdvisor Apac | Tuesday, October 22, 2019
Tweet

Despite how things have changed with the adoption of cloud computing, security should remain a primary concern within government agencies. Rather than relying on cloud providers to keep information safe, agencies should proactively take measures to protect data while it leaves the workplace and moves into the hybrid cloud environment.

FREMONT, CA: The growth in hybrid cloud compute models, where some applications are kept within the premises, have increased concerns surrounding data protection. Data must be safeguarded, whether it is stored and processed locally or in the cloud. Agencies employing cloud providers for infrastructure as a service (IaaS), must remember that vendors are only responsible for the hosted environment. They are primarily concerned with reinforcing their infrastructure and separation between tenants and are not troubled about monitoring the data, stored and processed by clients.

Here are two strategies that will help government organizations to achieve security of data in hybrid cloud environments:

1. Acquiring Visibility into In-flight Data Leaving the Cloud:

When a user logs into a cloud-based application through a computer or mobile device, data passes simultaneously between the cloud provider and the agency’s network. While data is in-flight to the contributor, it can be easy to drop visibility. At this position, agencies have no power or visibility over the data, making it vulnerable to security thefts and threats. Inline proxy analysis can address the problem as it provides IT teams with visibility into end-users who submits a request through the cloud services.

Check this Out:Top Cloud companies

In today’s mobile-enabled world, with a proxy approach, a user accesses an application on a device through a request to get authenticated. The request is transmitted to a reverse proxy URL overseeing communications between user device and the cloud service, offering a transparent view of data transfer between the provider and client.

2. Control User Access to Data:

When users ask for information from a cloud service, it is important that IT teams know whether they are low-risk or high-risk employees so they can limit access. Risk levels can easily be verified through behavioral analysis. With this process, users are allocated a unique score based on their job role and baseline analysis of their standard behavioral patterns. Whenever a variation from the established behavioral pattern is noticed, the system sends an alert. Even a slight difference in user behavior could indicate a potential breach, prompting access control or revoked permissions

Few Cloud Companies:Cloudera , Enquizit , Huddle

tag

Cloud Computing

Featured Vendors

  • MVI Technologies: Innovative, Future-proof Financial and Payment Switching
    MVI Technologies: Innovative, Future-proof Financial and Payment Switching
  • DATAMARK: Process Driven Solutions in Action
    DATAMARK: Process Driven Solutions in Action
  • IMACREA: Shaping the Future of Teleworking
    IMACREA: Shaping the Future of Teleworking
  • PuzzleBox BPO, Inc.: A Hybrid Platform for Customer Support and Sales Empowerment
    PuzzleBox BPO, Inc.: A Hybrid Platform for Customer Support and Sales Empowerment
ON THE DECK

Read Also

Safeguarding Quality through Proactive Risk Management

Cultivating a Culture of Agility: Nurturing Adaptability for Organizational Success

Governance for Smarter KPIs: Enhancing Performance Measurement

Embracing the Irreplaceable Human in Business and Beyond

Leveraging Gamification for Deeper Financial Engagement

Generative AI: The Game-Changer Automates Marketing For The Retail Industry

Loading...

I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

Copyright © 2025 CIO Advisorapac. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy Policy |  Sitemap

follow on linkedinfollow on twitter
This content is copyright protected

However, if you would like to share the information in this article, you may use the link below:

https://www.cioadvisorapac.com/news/protecting-data-in-a-government-hybrid-cloud-environment-nwid-1713.html