New portfolio of multi-cloud security services bolsters Fujitsu's portfolio
Fujitsu have launched a new portfolio of multi-cloud security services, enabling organisations to stay on top of the increasingly complex security challenges from multi-cloud environments.
A new portfolio of security controls that are both cloud-specific and cloud-agnostic increase data resilience, availability and integrity. As a result, new Fujitsu managed security services for the cloud provide consistent application and governance of corporate policies even across complex multi-cloud environments. Customers retain the flexibility to choose the best combination of cloud solutions from multiple providers, without compromising their overall security posture.
New Fujitsu service offerings for cloud security include identity and access management, data protection, unified endpoint security, unified threat management and security monitoring. These both optimise standard security controls delivered by cloud service providers and augment them with cloud-agnostic security services, empowering organisations to avoid dependence on any particular cloud platform.
Alongside cloud-agnostic data encryption, the new Fujitsu offer includes Cloud Security Posture Management, enabling customers to continuously assess and remediate potential security risks. An enterprise data encryption service spans multiple clouds and includes both key management and data encryption services across virtual servers, files and folders, databases and applications. Security services also include enhanced protection for cloud workloads with Cloud Access Security Broker (CASB) services and for specific Microsoft Office 365 offerings.
Managing the challenge of multi-cloud cybersecurity
Multi-cloud strategies are increasingly dominant: the Fujitsu State of Orchestration 2018/19 survey of IT decision-makers confirmed that on average, enterprises are using nine cloud vendors today, with almost two-thirds of organisations expecting multi-cloud to become an even more significant part of their IT architecture over the next two years.
With the growing range of cloud platforms available and the rapid rate at which cloud service providers release new technology, services and capabilities, complexity is growing. As a consequence, security considerations and policies must now support flexible approaches for workloads, without compromising on security, and while providing protection and consistent encryption of workloads.
As customers move ever deeper into the cloud – from Infrastructure-as-a-Service (IaaS) to Platform-as-a-Service (PaaS) and then to Software-as-a-Service (SaaS) – cloud service providers take on more responsibility for embedded security. With its new portfolio of multi-cloud security services, Fujitsu provides cloud-agnostic security controls to complement cloud-native controls. These services establish new, more autonomous security, providing visibility across multi-cloud environments and help prevent the creation of potentially isolated cloud silos.
The right expertise at a time of global IT skills shortages
With most organisations facing a shortage of skilled IT staff, sourcing and retaining the specialised expertise for enhanced cybersecurity is an increasing priority. Supported by threat analytics, threat intelligence and threat response services provided from an Advanced Threat Centre, Fujitsu’s multi-cloud managed security services are based on more than 40 years of experience in managing large-scale cybersecurity in the public and private sectors. Deep experience across diverse cloud providers enables Fujitsu to advise on the best approach to unified multi-cloud security. Its multi-cloud security services are built on independently-recognised capabilities, as demonstrated by Fujitsu’s consistent inclusion in the Gartner Magic Quadrant for Managed Security Services, which ranks the top global MSS vendors.
Rob Norris, VP Head of Digital Technology Services & Enterprise Cyber Security at Fujitsu, says: “With multi-cloud at the heart of digital transformation projects, Fujitsu advocates tackling cybersecurity right from the start to ensure autonomous data protection, and avoid lock-in with a single cloud provider. Fujitsu’s 360-degree security stance goes beyond technology so that people, processes, compliance and regulatory demands are all taken into consideration, ensuring total security. Fujitsu’s new multi-cloud security services portfolio delivers the data resilience, availability, integrity and confidentiality that are key requirements in multi-cloud environments.”
To create a comprehensive security posture assessment in a multi-cloud environment, Fujitsu focuses on three core zones of risk. The first is cloud, where visibility of risks can be ‘submerged’ at a level not apparent to the user organisation. The second zone is internal – the possibility of inadvertent misconfiguration, malicious internal threats and the need to maintain constantly vigilant compliance with complex regulations. The third is external risk, such as takeover of accounts or insertion of malware, zero-day threats, or more insidious ‘social engineering’, where employees are psychologically manipulated into compromising security or divulging confidential information.
source bdaily
Industry: Cyber Security
Latest Jobs
-
- Public Sector Cyber Security Sales | UK
- England
- N/A
-
Public Sector Cyber Security Sales | UK UK | Remote / Hybrid A cyber security provider is seeking a Public Sector Sales professional to drive growth across UK government and public sector organisations. Must have current Cyber Security sales experience. Responsibilities Generate new business selling cyber security solutions into UK public sector Build relationships with CIO, CISO and senior technology stakeholders Manage the full sales cycle from opportunity to contract close Develop pipeline across central government, local government and public sector bodies Support bids, tenders and framework opportunities Experience Proven cyber security sales experience in the UK Track record selling into public sector organisations Familiarity with CCS, G Cloud or other government frameworks Strong stakeholder engagement and deal management skills Location UK based Security Requirements Eligible to obtain UK Security Clearance
-
- Security Architect | MoD - Security Cleared. OUTSIDE IR35 | Hampshire
- N/A
- Outside IR35
-
Security Architect | MOD | Security Cleared | Outside IR35 | Hampshire Commutable The successful candidate must be willing to undergo DV Clearance, ideally already holding active clearance. You will produce high and low level security architecture documentation, guiding and validating designs for systems deployed within sensitive environments. The role requires providing specialist security input into solution design, service transition and change initiatives, working closely with engineering, operations, client and third party stakeholders. You must have current hands on architectural experience, including VMware secure platform design and virtualisation architecture, alongside AWS expertise. This is an outside IR35 contract- 6 month rolling. Part of a longer term MoD project
-
- Active Directory | RBA engineer | UK Remote | SC Clearable
- United Kingdom
- N/A
-
Technical Active Directory (AD) and RBA specialist needed to play a key part in complex, enterprise scale Active Directory and access transformation programmes. You will work alongside senior team, helping reshape access models, modernise legacy directory structures and strengthen security posture across secure environments. This is hands on delivery within high impact projects where your work directly improves access control, compliance and operational resilience. Active UK Security Clearance required. This is a remote role with client travel. Implementation of Role Based Access Control across large AD estates Restructuring complex permission models, security groups and delegated access Supporting domain controller upgrades and core directory improvements Applying security hardening standards and remediating audit findings Enhancing authentication, policy and access governance frameworks Troubleshooting and resolving technical AD challenges within live environments Producing robust technical documentation and identifying project risks You must have the following technical experience Enterprise Active Directory administration Role Based Access and permission remediation OU design and governance Group Policy management Security group delegation models DNS and DHCP services Kerberos authentication / NTLM PowerShell scripting and automation Azure AD | Entra ID Hybrid identity environments Identity Governance PAM
-
- Identity and Access Management Consultant (Saviynt & Microsoft Entra) | UK
- United Kingdom
- N/A
-
Role summary Technical IAM consultant delivering identity governance and cloud identity solutions to enterprise clients. What you will do Implement / Configure / Deploy Saviynt IGA / Microsoft Entra solutions: Lead technical workshops, gather requirements and translate into solution designs. Troubleshoot complex issues, support testing and deployments. Produce technical artefacts and configuration guides. Key skills Hands-on Saviynt IGA experience (workflow, connectors, access governance). Strong practical knowledge of Microsoft Entra ID / Azure AD identity and access controls. Understanding of identity protocols (SAML, OAuth, OpenID Connect) and hybrid identity. Experience with APIs / REST for integrations and automation. What we are looking for Proven delivery experience in IAM / IGA projects, preferably in consulting. Confident communicator with client-facing delivery exposure.