-
Featured services
Think beyond the robots
The successful integration of AI and IoT in manufacturing will depend on effective change management, upskilling and rethinking business models.
Read the blog -
Services
Nutzen Sie unsere Fähigkeiten, um die Transformation Ihres Unternehmens zu beschleunigen.
-
Services
Network-Services
Beliebte Produkte
-
Services
Cloud
Beliebte Produkte
-
Services
Consulting
-
Edge as a Service
-
Services
Data und Artificial Intelligence
- KI und intelligente Lösungen
- Daten-/KI-Strategie und -Programm
- Data Engineering und Plattformen
- Daten-Governance und -management
- Datenvisualisierung und Entscheidungsfindung
- $name
- GenAI Platforms
- GenAI Industry Services
- GenAI Infrastructure Services
- GenAI Value Transformation
- Data und Artificial Intelligence
-
-
Services
Global Data Centers
-
Beliebte Produkte
-
Services
Application Services
-
Services
Sustainability Services
-
Services
Digital Workplace
-
Services
Business Process Services
-
Services
Generative AI
-
Services
Cybersecurity
-
Services
Enterprise Application Platforms
IDC MarketScape: Anbieterbewertung für Rechenzentrumsservices weltweit 2023
Wir glauben, dass Marktführer zu sein eine weitere Bestätigung unseres umfassenden Angebotes im Bereich Rechenzentren ist.
Holen Sie sich den IDC MarketScape -
-
Erkenntnisse
Erfahren Sie, wie die Technologie Unternehmen, die Industrie und die Gesellschaft prägt.
-
Erkenntnisse
Ausgewählte Einblicke
-
Die Zukunft des Networking
-
Using the cloud to cut costs needs the right approach
When organizations focus on transformation, a move to the cloud can deliver cost savings – but they often need expert advice to help them along their journey
-
So funktioniert Zero-Trust-Sicherheit für Ihr Unternehmen
Sorgen Sie dafür, dass Zero-Trust-Sicherheit für Ihr Unternehmen in hybriden Arbeitsumgebungen funktioniert.
-
-
Erkenntnisse
Copilot für Microsoft 365
Jeder kann mit einem leistungsstarken KI-Tool für die tägliche Arbeit intelligenter arbeiten.
Copilot noch heute entdecken -
-
Lösungen
Wir helfen Ihnen dabei, den Anforderungen an kontinuierliche Innovation und Transformation gerecht zu werden
Global Employee Experience Trends Report
Excel in EX mit Forschung basierend auf Interviews mit über 1.400 Entscheidungsträger:innen auf der ganzen Welt.
Besorgen Sie sich den EX-Report -
Erfahren Sie, wie wir Ihre Geschäftstransformation beschleunigen können
-
Über uns
Neueste Kundenberichte
-
Liantis
Im Laufe der Zeit hatte Liantis, ein etabliertes HR-Unternehmen in Belgien, Dateninseln und isolierte Lösungen als Teil seines Legacysystems aufgebaut.
-
Randstad
We ensured that Randstad’s migration to Genesys Cloud CX had no impact on availability, ensuring an exceptional user experience for clients and talent.
-
-
NTT DATA und HEINEKEN
HEINEKEN revolutioniert die Mitarbeitererfahrung und die Zusammenarbeit mit einem hybriden Arbeitsplatzmodell.
Lesen Sie die Geschichte von HEINEKEN -
- Karriere
Topics in this article
The cloud: You can’t touch it or see it. But almost everyone’s on it, whether they know it or not. Your employees are probably using software as a service (SaaS) applications for payroll or financial management, and your customers, without doubt, rely on cloud-hosted services. It’s everywhere. But you can’t afford to have your head in the clouds when it comes to cloud security.
The truth is, attackers are on the cloud too. They go where the data goes, and right now, that’s the cloud. They’re smart and sophisticated. And their attacks often evolve more quickly than traditional defenses can keep up with. On the opposite side of the coin, many organizations still rely on traditional, on-premises security processes and technologies — leaving gaps wide open.
It’s no wonder cloud security is now front and center for CISOs everywhere — and it will remain at the top of the agenda for the foreseeable future.
Who owns security when anyone can spin up a service?
The cloud has changed everything. Before cloud, deploying a new service could take months of work by a team of people, each specializing in a different aspect of deployment — procurement, installation, configuration and security. It may have been slow and process-heavy, but it also meant every stage was carefully monitored and checked.
Enter the cloud, and you can spin up new resources in seconds. It’s great for speed but terrible for security. When you bypass the structured processes that were common in traditional IT, you create blind spots for the security team. And if they don’t know a new resource exists — well, you can’t protect what you can’t see.
This is why visibility is the foundation of security in the cloud era. By closing visibility gaps, you deal with fewer blind spots and take back control, keeping your cloud environment secure, compliant and resilient.
Make visibility a priority
The first step is to gain a real-time, unified view across all your cloud resources — spanning multiple providers, workloads and services — so that nothing slips through unnoticed. Automated discovery and continuous monitoring are critical here, helping your security team identify shadow IT, unmanaged assets and misconfigurations before attackers do.
Cloud security posture management (CSPM) tools play an essential role. Platforms like Palo Alto Networks Prisma Cloud, Wiz, Cisco Cloud Protection, FortiCNAPP and others provide centralized visibility into complex, multicloud environments, flagging risks such as exposed storage buckets or overly permissive access policies. They also enforce compliance with industry standards and internal policies, and many offer automated remediation to correct issues at scale.
With the right tools in place, you can transform visibility from a reactive measure into a proactive defense that strengthens governance, reduces operational risk and enables you to innovate securely in the cloud — especially when combined with automated checks that will identify misconfigurations and blind spots errors before they go live and cause lasting damage. It’s why CISOs should treat visibility and automated detection and remediation as nonnegotiable.
Cloud disruptions caused by geopolitical events raise tough questions
However, even the best configurations can’t protect against global disruption. And unfortunately, there is no easy answer to managing geopolitical risk.
The best you can do is to treat it as just that — risk that should be managed. Keep contingency plans and watch global developments and ensure your data and workloads are portable. With portability, you can shift workloads between providers — from a hyperscaler to small local providers — or back on-premises as the need arises, giving you flexibility when costs, risks or regulations change. It’s not a perfect solution, but it is one that will help you maintain a level of resilience.
Digital sovereignty
This is also why digital sovereignty matters. It’s about two things: Keeping your business running if services are interrupted, and staying in control of your own data. Many assume cloud data is automatically backed up, but it’s not — availability is still your responsibility. And when data is stored outside your jurisdiction, compliance obligations follow. The safest bet is to test your backups and adopt bring-your-own-key (BYOK) encryption so that you control access and remain the true owner of your data.
Clearing up the “shared responsibility” confusion
There is often some confusion around who takes responsibility for security once workloads have moved to the cloud. The name says it all — the responsibility is shared. It’s a bit like road travel: the cloud provider takes responsibility for keeping the road safe and well maintained, but you’re still responsible for your car and how you drive it. In this instance, your responsibility covers applications, user identities, access permissions and, most importantly, your data.
Understanding this division of responsibility is critical. All too often, organizations don’t know or understand what their responsibilities are, leaving workloads unprotected until it’s too late.
CISOs need to make this crystal clear to their executive peers. Misunderstanding where accountability lies can create dangerous false assumptions. And in cloud security, such assumptions often lead to breaches.
Understanding the hidden value of cloud security
In one sense, security is about survival. The ubiquity of the cloud means that a major breach can take your business offline and damage your reputation beyond repair, which could cost millions of dollars.
But security is also an enabler. With strong controls in place, you can release new applications faster, safely adopt emerging technologies at the click of a button and enter new markets without putting your customers or data at risk. It safeguards your revenue and reputation while unlocking the agility that the cloud was designed to deliver.
Done right, it’s what allows your business to innovate, grow and turn resilience into revenue. It’s an investment, not an overhead. For CISOs, the challenge is to frame cloud security in those terms — not as a sunk cost, but as an investment in growth. When the board sees security as a revenue enabler and a resilience builder, it starts being recognized as core to business strategy.
Keep your data secure with NTT DATA
Cloud adoption isn’t going to stop, and neither will its associated risks. By closing visibility gaps, embracing automation, adopting a zero trust mindset and planning for sovereignty, CISOs can protect their organizations while continuing to innovate and grow.
At NTT DATA, we simplify the complexity for you through our integrated Cloud Native Application Protection Platform (CNAPP) approach, which brings together visibility, workload protection, identity and access controls, SaaS security and continuous monitoring. Here, automation becomes a force multiplier, reducing the burden on stretched teams and cutting the time between detecting and fixing issues.
We also prioritize zero trust security, with a simple philosophy at its core: Trust no one, trust nothing, verify everything. The model recognizes that breaches are inevitable, but what matters is that when attackers gain a foothold, they can’t progress. Zero trust makes lateral movement much harder, confining threats and protecting sensitive data even if one layer is breached.
For CISOs, “trust no one, trust nothing, verify everything” should become a mantra and daily practice. Identity checks must be embedded, least privilege enforced and zero trust made part of the corporate culture, not only an aspect of the technology.
This leaves CISOs with fewer tools to manage, stronger protection across hybrid and multicloud environments and more time to focus on strategy rather than firefighting.
Are you ready to turn security into your growth advantage? Let’s make it happen.
This article was co-authored by Renjith Philip, Capability Lead: Cloud Security and Endpoint at NTT DATA.