Tag: intel security

Intel says channel has key role in cloud security

wintel_blimp_featureIntel Security which has just released its second annual cloud security report which says that the channel has a key role in reassuring customers about hosted data.

Intel Security said that there was a gut feeling among some users that keeps them worrying about data integrity and that should be a chance for a reseller to step into the breach and ease their passage to the hosted world.

It suggested that the UK is one of the most risk-averse when it comes to cloud adoption. Some of that is caused by a skills shortage making it harder for customers to move to a hosted environment, but there are also real concerns about moving sensitive data into the cloud.

Stuart Taylor, UKI regional director, channel at Intel Security said that security concerns and the skills shortage seem to be holding UK organisations back when it comes to cloud adoption.

“While our research clearly demonstrates that businesses in the UK are the least likely globally to implement a proactive cloud-first strategy, that is not preventing cloud from being adopted across the business. This often leads to shadow IT practices which make it difficult for IT to get a firm control over corporate data in the cloud,” he said.

The Intel research found that 40 per cent  of cloud services were now being commissioned without the involvement of the IT department.

Taylor said that with more data shifting across to the cloud, it was essential that the correct security controls are put in place.

“By moving towards a cloud-first strategy, organisations can encourage the adoption of cloud services to increase flexibility, reduce costs and set up proactive security operations. To this end, we work closely with our channel partners to ensure they can advise end users on the steps needed to secure cloud deployments,” he added.

Intel’s channel partners understand that taking a proactive stance was the key and can help companies go beyond initial protection by ensuring the correct technology is in place to rapidly detect threats and correct their systems when necessary. However, this focus on the threat defence lifecycle must go hand in hand with shifting the defender-attacker dynamic, he said.