Advertisment

5 Tips for adoption of a hybrid security soln

author-image
CIOL Bureau
Updated On
New Update

BANGALORE, INDIA: Many enterprises use a set of single-function security solutions, often with their own user interfaces and with standalone policy management capabilities that require significant investments in IT staff and time.

Advertisment

Many companies require multiple vendors to construct a defence, often resulting in gaps in coverage. This is especially true for distributed companies. As a consequence, many organizations pay a high cost, managing multiple vendor solutions. These problems can be avoided by using a combination of on-premise systems and cloud-based services aka a hybrid approach to security.

Five tips for the adoption of a hybrid security solution:



1. Conduct an inventory of existing email, web and data security solutions and understand the Total Cost of Ownership of managing these solutions individually. Build a business case to highlight potential cost savings through vendor consolidation and hybrid deployments.

2. An analysis of the inbound and outbound data traffic.

Advertisment

3. Where are the weak spots of the security landscape? Are there any security issues that are badly covered or not covered at all? Are there any security holes?

4. Implement corporate-wide security policies for regardless of where the user is - working at headquarters, at home remote or on the road. On of the main advantages of a properly designed hybrid security infrastructure is that every aspect of the system can be managed from a single console.

5. Decide which component/function of an integrated hybrid solution should be deployed in-house and which as a cloud service. Using a combination of cloud-based and on-premise services can yield two important advantages: the efficiency of cloud-based delivery combined with the highly granular control that on-premise systems can offer. Such an approach can lower the cost and improve the overall security posture for many organizations.

Also read: Now Twitter becomes an attractive target for cybercriminals

tech-news