Hail Mary passes and walk-off home runs are game-changing plays, but their impact is limited to one game. In these cases, the underlying game changers were the introduction of the forward pass and the lively baseball. Information technology has its own game-changing elements, most recently mobility and cloud computing. However, information security has yet to match these technologies — which limits their effectiveness and diminishes overall security. Maintaining enterprise security requires a similar evolution of security capabilities.

Mobility and cloud computing has decentralized the role of IT and fundamentally changed the way people work, how business is conducted and the value of connectivity.

IT Is Outpacing Security

The proliferation (and user acceptance) of mobile devices and easily accessible cloud-based applications entice lines of business (LoBs) to find their own solutions. The rise of shadow IT allows executives to quickly adjust to a volatile business environment. Scalability, elasticity and cost benefits are the hallmarks of cloud computing that are moving information technology from a supporting function to one that enables the quick delivery of new products and services.

However, IT security is being left behind. It has become extremely difficult for organizations to exercise full control over their data and applications as they proliferate on multiple devices, reside in the cloud and cross into social networks. Existing security controls have difficulty identifying legitimate users since the number of such users has grown. New distributed architectures are hard to secure, so organizations struggle to match identity management, data confidentiality and availability with user needs and expectations.

The Fortress Mentality Is Ineffective

IT security is important to protect the IT infrastructure, information and transactions. There are many standards and regulations, especially those relative to customer privacy, which organizations are required to follow. Historically, security capabilities are designed to build a fortress around systems and data. The proliferation of devices, applications, authorized users and network connections vastly expands attack surfaces. Attackers are also utilizing new technologies, and thus the fortress security model has become untenable with a security infrastructure that is not designed to handle mobility and cloud computing.

Some organizations will resist change, but the old command-and-control approach, which could be enforced within a traditional enterprise, will not survive in the extended enterprise. Organizations instead will need to relinquish old control models and shift to an open and integrated framework that provides the flexibility to securely enable advanced IT tools.

Security for Cloud Applications and Enablement

The forward pass and lively baseball transformed the way their games were played — and the end result of them — but not the underlying foundations of the sports. Any future game-changing security product will be on that same level. They will drastically modify the security fortress mentality by improving the security proposition behind the expanded enterprise.

To be successful in a cloud-centric domain, security must be able to mitigate risk while being able to handle the demands of this evolving IT environment driven by individual productivity. Providing security for cloud enablement needs to include a flexible platform to provide visibility, identity management, policy enforcement and threat mitigation across multiple cloud services.

Innovators Required

The building blocks to construct an efficient and effective cloud security gateway exists in pieces, and it will take an innovator who has all the building blocks and the wherewithal to pull them together to deliver it. The forward pass and lively baseball were game changers, but it took a Pop Warner and a Babe Ruth to recognize them as such, and to use their considerable talents to set the transformations in motion. IBM Security, as a leading provider of identity and access management, mobile security, security intelligence, intrusion prevention and application security, has all of the building blocks, which, when coupled with infrastructure mobility and cloud solutions, is poised to be the innovator that can dramatically change the way mobile and cloud computing security is provided.

Read the IDC white paper: A CISO’s Guide to Enabling a Cloud Security Strategy

More from Cloud Security

The Importance of Modern-Day Data Security Platforms

Data is the backbone of businesses and companies everywhere. Data can range from intellectual property to critical business plans to personal health information or even money itself. At the end of the day, businesses are looking to grow revenue, innovate, and operationalize but to do that, they must ensure that they leverage their data first because of how important and valuable it is to their organization. No matter the industry, the need to protect sensitive and personal data should be…

Cybersecurity in the Next-Generation Space Age, Pt. 4: New Space Future Development and Challenges

View Part 1, Introduction to New Space, Part 2, Cybersecurity Threats in New Space, and Part 3, Securing the New Space, in this series. After the previous three parts of this series, we ascertain that the technological evolution of New Space ventures expanded the threats that targeted the space system components. These threats could be countered by various cybersecurity measures. However, the New Space has brought about a significant shift in the industry. This wave of innovation is reshaping the future…

Backdoor Deployment and Ransomware: Top Threats Identified in X-Force Threat Intelligence Index 2023

Deployment of backdoors was the number one action on objective taken by threat actors last year, according to the 2023 IBM Security X-Force Threat Intelligence Index — a comprehensive analysis of our research data collected throughout the year. Backdoor access is now among the hottest commodities on the dark web and can sell for thousands of dollars, compared to credit card data — which can go for as low as $10. On the dark web — a veritable eBay for…

How Posture Management Prevents Catastrophic Cloud Breaches

We've all heard about catastrophic cloud breaches. But for every cyberattack reported in the news, many more may never reach the public eye. Perhaps worst of all, a large number of the offending vulnerabilities might have been avoided entirely through proper cloud configuration. Many big cloud security catastrophes often result from what appear to be tiny lapses. For example, the famous 2019 Capital One breach was traced to a misconfigured application firewall. Could a proper configuration have prevented that breach?…