Security News > 2020 > March > Multi-cloud and edge deployments threatened by security and connectivity problems
The survey reveals that multi-cloud deployments are being driven primarily by a need to maximize availability and reliability for applications, while at the edge IoT is the top use case driving deployments.
Multi-cloud deployments are threatened by security and connectivity problems due to differences between cloud providers, as well as operational challenges in managing workloads across several clouds.
Edge deployments suffer from an inability to meet unique infrastructure needs as well as difficulties in managing apps across different edge sites.
"The increasing deployment of technologies including AI, machine learning and IoT are causing apps and data to be increasingly spread across multiple clouds and edge sites. This is leading to a number of serious operational and security challenges for organizations trying to support multi-cloud and edge deployments," said Ankur Singla, CEO, Volterra.
"Organizations need a way to manage all these components as a single, distributed cloud to effectively leverage multi-cloud and edge deployments and the data within them," said Singla.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/Hdqw2BoKUMs/
Related news
- Strategies for CISOs navigating hybrid and multi-cloud security (source)
- Enhancing visibility for better security in multi-cloud and hybrid environments (source)
- 7 PAM Best Practices to Secure Hybrid and Multi-Cloud Environments (source)
- How AI Is Changing the Cloud Security and Risk Equation (source)
- Google Cloud to Enforce Multi-Factor Authentication by 2025 for All Users (source)
- Microsoft Fixes AI, Cloud, and ERP Security Flaws; One Exploited in Active Attacks (source)
- AWS unveils cloud security IR service for a mere $7K a month (source)
- Are Long-Lived Credentials the New Achilles’ Heel for Cloud Security? (source)
- Best CSPM Tools 2025: Top Cloud Security Solutions Compared (source)
- CrowdStrike vs Wiz: Which Offers Better Cloud Security and Value? (source)