Keep cloud-based security simple

Issue 2 2022 Information Security

The reality of today’s world is that employees are more mobile than ever, which means that their data is spread across more environments than ever before. Hybrid work is now cemented as the forever work style for many South African businesses, but with that flexibility comes a new volume of points of vulnerability.

This requires a new approach to security, businesses need cloud-based security that follows data and users wherever they are. As this process can be complex, organisations need a simple way to secure their cloud services.


Tim Stone.

“The most important step for businesses facing an increase in cloud-related cyberattacks is to simplify the unnecessary complexities within their cloud security, so that they can respond to cloud-based security incidents more effectively,” says Tim Stone, director of channel sales at Skyhigh Security, the former cloud security division of McAfee Enterprise.

“South African businesses need to ensure that they are protected against threats around all critical data, by using an integrated platform for security,” he adds. “This will give them greater visibility into their cloud security, as well as better control of it, so that they can more seamlessly monitor and respond to threats.

“This not only helps businesses protect themselves and their customers, but it also lowers the various associated costs of managing the often complex cloud-security structures, increases the levels of efficiency and helps businesses ensure they’re far easier to keep up with global transformations,” he adds.

There are some key differentiators that businesses seeking a cloud security solution should consider, so that they can respond to threats in real-time.

Keep cloud security simple

In the complex world of cloud security, it’s smartest to keep things simple, so choosing a solution that operates as a single platform with a single portal means that organisations can have complete visibility and control and can seamlessly monitor and mitigate security risks. This means that costs are kept under control, more efficiencies are possible and the platform keeps pace with innovation in security.

Define your own policies

An organisation’s cloud security policy will evolve over time as new threats and remedies present themselves. This calls for a regular review of the threat landscape and modification of defences accordingly. Among the promising new technologies and strategies for protecting cloud computing are higher levels of security automation, artificial intelligence for quicker threat detection and service-based cloud security platforms.

Comprehensive data protection

Choose a solution that secures data across the web, cloud and private applications – from anywhere, on any application and on any device. This could be via software-as-a-service (SaaS), platform-as-a-service (PaaS), or infrastructure-as-a-service (IaaS) solutions. A solution that’s designed with user experience in mind, that simplifies data flows and security policies is ideal.

Choose what works best for you

Choose a vendor that first assesses your business’s needs and its boundaries and that can respond with a solution that meets your requirements, whether your business prefers an on-premises solution or a fully cloud-based option. It’s vital that you’re able to choose the simplest and most comprehensive platform that helps you lower costs and most importantly, a fast response if a cyberattack is attempted.

“A security service edge (SSE) cloud security approach unifies all security services, via a data-centred approach to security that offers 360-degree access control to the web, cloud or private data centres via user-friendly dashboards, but expands to include how the data is used, shared and created,” Stone adds.

Learn more at www.skyhighsecurity.com




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
POPIA non-compliance puts municipalities at risk
Information Security Government and Parastatal (Industry)
Digital responsibility must go beyond POPIA compliance to recognising that privacy and service delivery are fundamentally linked. Despite this, only 51 out of 257 municipalities submitted their mandatory data protection and access to information reports in 2024.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
Welcome to the new cyber battleground
Information Security
The Iran-Israel conflict is rapidly redefining modern warfare, pushing the boundaries of cyber capabilities and creating a new, borderless digital battlefield. Fortinet’s CISO, Dr Carl Windsor, offers a critical, in-depth analysis of the escalating tactics and global implications in his latest report.

Read more...
African industries may overestimate cyber defences
Information Security
A significant perception gap exists in security awareness training: 68% of leaders believe training is tailored to roles, yet only a third of employees feel adequately trained. Many organisations only conduct annual or biannual generic training that may not effectively change behaviour.

Read more...
SMARTpod talks to Sophos and Phishield
SMART Security Solutions Technews Publishing Sophos Videos Information Security News & Events
SMARTpod recently spoke with Pieter Nel, Sales Director for SADC at Sophos, and Sarel Lamprecht, MD at Phishield, about ransomware and their new cyber insurance partnership.

Read more...
Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Corporate and academic teams can register for Kaspersky contest
Kaspersky News & Events Information Security
Kaspersky has announced the registration opening for its new Kaspersky{CTF} (Capture the Flag) competition, inviting academic and corporate teams from around the globe to compete in a battle of skill, strategy and innovation.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.