You've requested...

Four Steps to Improving Cloud Security and Compliance

If a new window did not open, click here to view this asset.

Download this next:

Managed Print Services in the Cloud

The office workplace has undergone a dramatic change in recent years. The key trends of mobility, BYOD and the cloud have driven users to expect more rapid access to corporate applications and services. The traditional IT delivery model is adapting to support these requirements, with businesses increasingly turning to cloud computing and managed services, attracted by the cost and efficiency benefits.

This report from analyst group Quocirca discusses how extending managed print services (MPS) to the cloud, through standardisation of infrastructure, virtualised server resources and automated processes, will be a major paradigm shift.

Contents:

  • The need for MPS
  • Tackling print server sprawl
  • What is MPS in the cloud

These are also closely related to: "Four Steps to Improving Cloud Security and Compliance"

  • UK IT Priorities 2016

    Every year, Computer Weekly and TechTarget conduct a global survey of our readers to understand their technology spending priorities for the coming 12 months. Our research offers a unique insight into the purchasing decisions of IT decision-makers worldwide - and as such it's a valuable benchmark for IT leaders to compare and contrast their plans with their peers. 

    The IT Priorities survey looks in depth at the technologies under consideration in the key areas of IT infrastructure - from datacentres to storage, from software to networking, security, mobile, information management and cloud services. 

    The study is conducted with senior IT professionals and presents real-life insights into how organisations are spending their IT budgets.

  • The great IAM - time to modernise?

    The discipline of information security is about letting the good guys in as well as keeping the bad guys out. But it is inevitably less “sexy” than its cyber-security twin.

    Nevertheless, Identity and Access Management is of a high strategic order importance, especially for large, complex corporate organisations with many types of employee requiring specific levels of access to particular kinds of information. And this has been accentuated in recent years by the need to be in compliance with the EU’s General Data Protection Regulation.

    In this e-guide we offer a refresher in IAM and highlight some of the trends that have an impact on it.

    Consumer identity and access management is a more recent sub-category with in IAM, with the first systems for this appearing in 2014. It still an “early-days” market, according to specialist analyst firm KuppingerCole. The business cases for this technology include targeted marketing to increase revenue, authentication of customers to enable single sign-on, providing a better user experience, and regulatory compliance.

    As with other areas of enterprise software, IAM is being reshaped, at least to some degree, by the rise of artificial intelligence in tandem with the maturation of big data analytics. And so, user behaviour analytics is becoming a link between identity management and “keep the bad guys out” security. Instead of focusing only on what is happening in a network, UBA is – again according to KuppingerCole, about users and what they are doing, and analysing that to identify anomalies that can be investigated as potential indicators of risk or threat.

    Cloud computing is another big vector of transformation in corporate IT and it, too, is having an effect on IAM. As this “tip” article discusses, the more cloud services we use, the more identities security professionals have to provision within these environments. Many SaaS [software as a service] scenarios often betoken a lack of control over account lifecycles.

    The British Red Cross and online auction platform Catawiki are among organisations wrestling with the complexities of modern identity and access management, with SaaS applications in play at both. The former has to manage access for 2,500 permanent internal users and a further 20,000 volunteers. The latter is an auction platform for rare and hard-to-find objects and experienced rapid early-stage growth that necessitated on-boarding new employees to a variety of business applications more quickly than anticipated. Both have turned to single sign on technology.

    As employee workstyles change beyond the “9 to 5 on a single site” paradigm of old, enterprises are having to cope with evermore complex access patterns. For many organisations it might be time to revisit their identity and access management strategies and modernise them.

Find more content like what you just read:

  • Getting expense management right

    Analysts Clive Longbottom and Rob Bamforth look at the benefits that every organisation should be looking to gain from a travel and expenses management system.

    Download

  • Essential Guide: Securing hybrid IT infrastructure

    In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud.

    Download

  • Europe IT Priorities 2016

    Every year, Computer Weekly and TechTarget conduct a global survey of our readers to understand their technology spending priorities for the coming 12 months. Our research offers a unique insight into the purchasing decisions of IT decision-makers worldwide.

    Download

  • CW APAC, June 2020: Trend Watch - data protection

    Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.

    Download

  • Middle East IT Priorities 2016

    Computer Weekly's annual global survey of readers has once again revealed what CIOs around the world, including an increasing number of Middle East based IT leaders, are planning over the next 12 months.

    Download

  • Computer Weekly – 15 November 2022: How to protect against ransomware attacks

    In this week's Computer Weekly, we look at how to prepare for and protect against ransomware, and what to do if you're hit by an attack. We gauge industry reaction to Ofcom's plan to investigate the big three cloud providers. And we find out how travel giant TUI is implementing self-service analytics. Read the issue now.

    Download

  • CW Benelux ezine August 2016

    In this issue of CW Benelux we describe how data scientists in the Netherlands have applied technology to art.

    Download

  • Computer Weekly - 5 November 2019: The benefits of API-first software development

    In this week's Computer Weekly, we find out how organisations are using an API-based approach to software development to boost digital initiatives. We examine the potential pitfalls in using cloud storage. And we talk to the Department for Work and Pensions about its four-year project to move from outsourced IT to the cloud. Read the issue now.

    Download

  • Computer Weekly - 7 April 2020: Adapting IT to the new normal

    In this week's Computer Weekly, we talk to four top IT leaders to find out how they are supporting their organisations through the coronavirus crisis. We look at the security best practices recommended by experts to ensure safe remote working for staff. And the CISO of Equifax explains why the firm is moving to public cloud. Read the issue now.

    Download

  • IT Project: Migration to cloud

    The benefits of using cloud are well-known, but the challenges and barriers enterprises come up against during their move off-premise can be wide, varied and unexpected. Knowing how best to negotiate these issues can help speed up the process of shifting workloads and applications to the cloud immeasurably.

    Download

  • Effectively leveraging cloud-based contracts

    Cloud contracts offer great benefits, but they can put organisations at significantly greater risk than conventional IT service contracts. This report by consultant Bob Fawthrop explains how to mitigate the risks.

    Download

  • CW Nordics August 2016

    The Nordic countries are renowned for being home to thriving tech startup scenes so it is hardly surprising that IT is a disruptive force in the region.

    Download

  • Application security: More important than ever

    In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.

    Download

  • Trust no one: Why zero trust security is taking the world by storm

    As zero-trust strategies continue to grow, we take a look into the history and evolution of the zero-trust approach, the main challenges involving zero-trust implementation in 2022, and what APAC firms can do to stay ahead of cyber threats.

    Download

  • How SASE can protect your digital assets

    Between skyrocketing amounts of data and the IT skills shortage, organizations encounter significant obstacles on their path toward securing their digital assets. Along with digging into those challenges, this white paper explores how businesses can surmount them with SASE. Keep reading to unlock these insights.

    Download

  • Your GDPR guide

    Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.

    Download

  • ITSM: Maintaining IT devices and applications

    This expert eGuide offers an inside look at IT service management, some of the benefits various support solutions offer and what you should look for in an ITSM tool. Also, engage in some opinions CIO's have on the subject of their ITSM pain points.

    Download

  • Print security: An imperative in the IoT era

    Analyst group Quocirca gives the perspective on the risks and best practices of print security.

    Download

  • Cloud computing storage key management

    Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.

    Download

  • Data protection, a live issue that affects us all

    Defined as the process of protecting important information from corruption, compromise or loss, the importance of data protection now cannot be understated. In this e-guide we will explore some of the key issues around data protection, which should be an integral, core part of your organisation's cyber security strategy.

    Download

  • Computer Weekly – 26 February 2019: Delving into viewer data at the BBC

    In this week's Computer Weekly, we talk to the BBC about how the UK broadcaster is using data analytics to better understand its viewers and grow its audience. We look at how CERN is using IT automation in its quest to unravel the mysteries of the universe. And we examine the impact of GDPR on cloud storage. Read the issue now.

    Download

  • 3 key use cases of AI-powered SASE

    In the face of increasing IT costs and widening security gaps, many organizations have adopted a SASE tool, such as AI-powered SASE. So, what should you know about AI-powered SASE? For a quick introduction to the topic, continue on.

    Download

  • Computer Weekly – 15 October 2019: Securing the internet of things

    In this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.

    Download

  • CW Europe – March-May 2019: Robots deliver savings for Dutch postal service PostNL

    European businesses have bought into the digital revolution, with the adoption of the latest technologies like automation enabling companies to transfer their internal operations.

    Download

  • Data Analytics in Healthcare: Opportunities & Challenges

    In this e-guide, read about the promises of healthcare data analytics, the challenges faced by healthcare providers in digital transformation and what some cloud providers are doing to assuage the security concerns of cloud among healthcare service providers.

    Download

  • State of GDPR in mainland Europe

    The General Data Protection Regulation has been in place for over 18 months now, but its implementation is only really just becoming clearer as regulators begin to fine organisations that fail to meet the rules. That is because different countries are implementing it differently. This e-guide gives a snapshot of the current state of GDPR in Europe.

    Download

  • Getting Cloud Security Right

    In this e-guide, we will consider how to do cloud security right. Regular Computer Weekly contributor Peter Ray Allison explores this issue, weighing up the questions organisations should be asking of their cloud service providers, and whose responsibility cloud security should be.

    Download

  • Information Risk Management – Expectations Versus Reality

    Many businesses have identified a gap between their ideas of information risk management strategies and the maturity of their implementations. Through considering the experiences of 12 security professionals, the “Information Risk Management—Expectations Versus Reality” report explores this gap. Continue reading to unlock insights.

    Download

  • The myth of email as proof of communication

    Increasingly, there is a need for organisations to be able to prove the content of communications between themselves and other parties. Analyst group Quocirca looks at the options.

    Download

  • Computer Weekly Buyer's Guide: Identity and Access Management

    When used effectively, identity and access management can streamline business processes. In this 17-page buyer's guide, Computer Weekly looks at the challenges it can bring large companies, the implications of cloud and how to pick the right service for your firm.

    Download

  • A Computer Weekly buyer's guide to compliance, risk and governance

    Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach

    Download

  • CW Benelux - August-October 2020: Problems with critical security systems at Schiphol Airport

    Schiphol Airport in Amsterdam is one of Europe's main access points, so you might be surprised to read that IT systems such as those controlling the Dutch borders are rarely tested. In this issue, read about a critical report from the Dutch Court of Audit.

    Download

  • CW Benelux - August-October 2020: Problems with critical security systems at Schiphol Airport

    Schiphol Airport in Amsterdam is one of Europe’s main access points, so you might be surprised to read that IT systems such as those controlling the Dutch borders are rarely tested. In this issue, read about a critical report from the Dutch Court of Audit.

    Download

  • Practical guidance for securing SaaS data on Workday

    Workday is a popular software as a service (SaaS) solution used by many organizations. This guide provides an overview of Workday, aiming to equip security professionals with a solid understanding of Workday’s unique risks. Read on to learn more.

    Download

  • Computer Weekly – 24 October 2017: Where will AI take us?

    In this week's Computer Weekly, artificial intelligence (AI) enthusiasts and sceptics debate the opportunities and risks of the much-hyped technology. Our latest buyer's guide examines the benefits of cloud-native applications. And we look at best practice in defending email systems from cyber attacks. Read the issue now.

    Download

  • Computer Weekly – 30 January 2018: Davos debates global tech risks

    In this week's Computer Weekly, world leaders at Davos discussed the growing reliance on technology and how to tackle the political and economic threats of the digital age. Our latest buyer's guide examines mobile app development. And we look at the biggest challenges facing CIOs in 2018. Read the issue now.

    Download

  • Why is there an ethical debate around AI?

    This quarter in CW Europe we look at how momentum in the artificial intelligence industry in France might be slowed due to ethical questions.

    Download

  • Computer Weekly Buyer's Guide to EU General Data Protection Regulation

    In this 12-page buyer's guide, we look at the tools that could be used for compliance, the incentive to create a smarter, leaner business, and the myths surrounding the new rules.

    Download

  • Data protection in the age of Brexit and GDPR

    This 40-page expert guide digs into the Brexit implications for data protection and how the GDPR is driving data protection maturity. Download it now to take advantage of this exclusive offer and to ensure your organization is fully compliant with the regulation.

    Download

  • Computer Weekly – 22 October 2019: Microsoft vs Google – who's winning the cloud email race?

    In this week's Computer Weekly, there's a two-horse race for dominance in the cloud email market between Microsoft and Google, but they are not alone – we examine the runners and riders. Our latest buyer's guide looks at governance, risk and compliance solutions. And we assess the progress of public cloud in the banking sector. Read the issue now.

    Download

  • Secure Microsoft 365 with AppOmni's platform

    AppOmni's guide details how its SaaS security platform protects sensitive data in Microsoft 365. It outlines configuration risks, data storage, roles, customization, 3rd-party apps, logging, and threat detection. Read the guide to learn how AppOmni secures your M365 environment.

    Download

  • Cloud Migration: How to do so safely and securely

    In this e-guide, we take a closer look at what enterprises need to consider before pressing play on their cloud migration plans. Not only to ensure their move to the off-premise world goes as smoothly as possible, but also to make sure it brings the maximum amount of benefit to their business.

    Download

  • Data classification tools: What they do and who makes them

    Data classification is an essential pre-requisite to data protection, security and compliance. Firms need to know where their data is and the types of data they hold. In this article, learn more about how these tools can help keep your data tidy and which suppliers offer the best options in the market.

    Download

  • Computer Weekly – 4 June 2019: GDPR one year on – is it working?

    In this week's Computer Weekly, a year after the EU's General Data Protection Regulation (GDPR) came into force, we assess its progress. Fears of technology are holding back digital healthcare – we look at the tech that's bringing back a human touch. And we examine Microsoft's desktop management tools for Windows 10. Read the issue now.

    Download

  • Computer Weekly – 10 March 2020: Is technology innovation broken?

    In this week's Computer Weekly, despite its reputation for fresh thinking the tech sector is stuck in old ways that prevent true innovation – an expert explains why. Our buyer's guide examines how networking is affected by the growth of cloud-native applications. And we look at the key tech-related compliance issues for SMEs. Read the issue now.

    Download

  • Demystifying the myths of public cloud computing

    In this article in our Royal Holloway security series, Chris Hodson asks whether public cloud is less secure than private datacentres, and assesses service models, deployment, threats and good practice.

    Download

  • Insuring the uninsurable: Is cyber insurance worth its salt?

    This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.

    Download