New portfolio of multi-cloud security services bolsters Fujitsu's portfolio
Fujitsu have launched a new portfolio of multi-cloud security services, enabling organisations to stay on top of the increasingly complex security challenges from multi-cloud environments.
A new portfolio of security controls that are both cloud-specific and cloud-agnostic increase data resilience, availability and integrity. As a result, new Fujitsu managed security services for the cloud provide consistent application and governance of corporate policies even across complex multi-cloud environments. Customers retain the flexibility to choose the best combination of cloud solutions from multiple providers, without compromising their overall security posture.
New Fujitsu service offerings for cloud security include identity and access management, data protection, unified endpoint security, unified threat management and security monitoring. These both optimise standard security controls delivered by cloud service providers and augment them with cloud-agnostic security services, empowering organisations to avoid dependence on any particular cloud platform.
Alongside cloud-agnostic data encryption, the new Fujitsu offer includes Cloud Security Posture Management, enabling customers to continuously assess and remediate potential security risks. An enterprise data encryption service spans multiple clouds and includes both key management and data encryption services across virtual servers, files and folders, databases and applications. Security services also include enhanced protection for cloud workloads with Cloud Access Security Broker (CASB) services and for specific Microsoft Office 365 offerings.
Managing the challenge of multi-cloud cybersecurity
Multi-cloud strategies are increasingly dominant: the Fujitsu State of Orchestration 2018/19 survey of IT decision-makers confirmed that on average, enterprises are using nine cloud vendors today, with almost two-thirds of organisations expecting multi-cloud to become an even more significant part of their IT architecture over the next two years.
With the growing range of cloud platforms available and the rapid rate at which cloud service providers release new technology, services and capabilities, complexity is growing. As a consequence, security considerations and policies must now support flexible approaches for workloads, without compromising on security, and while providing protection and consistent encryption of workloads.
As customers move ever deeper into the cloud – from Infrastructure-as-a-Service (IaaS) to Platform-as-a-Service (PaaS) and then to Software-as-a-Service (SaaS) – cloud service providers take on more responsibility for embedded security. With its new portfolio of multi-cloud security services, Fujitsu provides cloud-agnostic security controls to complement cloud-native controls. These services establish new, more autonomous security, providing visibility across multi-cloud environments and help prevent the creation of potentially isolated cloud silos.
The right expertise at a time of global IT skills shortages
With most organisations facing a shortage of skilled IT staff, sourcing and retaining the specialised expertise for enhanced cybersecurity is an increasing priority. Supported by threat analytics, threat intelligence and threat response services provided from an Advanced Threat Centre, Fujitsu’s multi-cloud managed security services are based on more than 40 years of experience in managing large-scale cybersecurity in the public and private sectors. Deep experience across diverse cloud providers enables Fujitsu to advise on the best approach to unified multi-cloud security. Its multi-cloud security services are built on independently-recognised capabilities, as demonstrated by Fujitsu’s consistent inclusion in the Gartner Magic Quadrant for Managed Security Services, which ranks the top global MSS vendors.
Rob Norris, VP Head of Digital Technology Services & Enterprise Cyber Security at Fujitsu, says: “With multi-cloud at the heart of digital transformation projects, Fujitsu advocates tackling cybersecurity right from the start to ensure autonomous data protection, and avoid lock-in with a single cloud provider. Fujitsu’s 360-degree security stance goes beyond technology so that people, processes, compliance and regulatory demands are all taken into consideration, ensuring total security. Fujitsu’s new multi-cloud security services portfolio delivers the data resilience, availability, integrity and confidentiality that are key requirements in multi-cloud environments.”
To create a comprehensive security posture assessment in a multi-cloud environment, Fujitsu focuses on three core zones of risk. The first is cloud, where visibility of risks can be ‘submerged’ at a level not apparent to the user organisation. The second zone is internal – the possibility of inadvertent misconfiguration, malicious internal threats and the need to maintain constantly vigilant compliance with complex regulations. The third is external risk, such as takeover of accounts or insertion of malware, zero-day threats, or more insidious ‘social engineering’, where employees are psychologically manipulated into compromising security or divulging confidential information.
Industry: Cyber Security
- SailPoint Integration Consultant
- Upto £75000 plus benefits
SailPoint Integration Consultant. SailPoint Integration Consultant is needed for this expanding service business to help them with complex deployment with their FTSE focused customer base. They are looking for experienced SailPoint Integration Consultants who have: • Strong solution designing experience with in depth understanding of IAM concepts and thorough understanding of Sailpoint domain. • Thorough understanding of Identity and Access Governance concepts • Leading and creating Identity & Access Management (IAM) technical architecture • Secure by Design principles in Identify Access management, Privilege Access management • Familiar with cloud architectures, data management and source control from a security perspective. This is a great opportunity to join a business that is growing and looking for individuals who want to grow and develop and work on some of the most complex Sailpoint deployments.
- CyberArk Integration Consultant
- Greater London
- upto 75,000 plus benefits
CyberArk Integration Consultant. CyberArk Integration Consultant is needed for this expanding service business to help them with complex deployment with their FTSE focused customer base. They are looking for experienced CyberArk Integration Consultants who have: • Strong solution designing experience with in depth understanding of IAM concepts and thorough understanding of CyberArk domain. • Thorough understanding of Identity and Access Governance concepts • Leading and creating Identity & Access Management (IAM) technical architecture • Secure by Design principles in Identify Access management, Privilege Access management • Familiar with cloud architectures, data management and source control from a security perspective. This is a great opportunity to join a business that is growing and looking for individuals who want to grow and develop and work on some of the most complex CyberArk deployments.
- Penetration Tester, UK based. Ability to achieve SC clearance
- United Kingdom
Experienced Penetration tester- UK based with the ability to achieve SC clearance. On-going training and development and paid certifications / renewals. Interested to hear from all areas of penetration testing, web app, infrastructure, mobile, etc. MUST have current hands on experience delivering penetration testing. Ideally from a consultancy background with experience working with multiple clients. OSCP / CREST / CHECK / Tigerscheme penetration testing experience / certifications desirable. Apply today for more details. All information kept in the strictest of confidence.
- Senior Data Privacy Specialist, London. CIPT
REF CH7875 £60,000 Senior Data Privacy Specialist, London. CIPT Senior Data Privacy Specialist needed to help advise client on project and programmes relating to Data Privacy and compliance. UK based role. Ideally looking for someone that has a strong appreciation of technology and Data Privacy that can work with clients to develop or enhance their strategies, policies, processes and techniques to manage cybersecurity risks while enabling business driven data. Certified Information Privacy Technologists (CIPT), Certified Information Privacy Professional/Europe CIPP/E experience and or certification highly desirable. Specific experience within the healthcare industry is of particular interest. All details kept in confidence Apply today for more information