Specification Magazine

March 2020

Issue link: https://read.uberflip.com/i/1223694

Contents of this Issue

Navigation

Page 21 of 79

To make an enquiry – Go online: www.enquire2.com or post our: Free Reader Enquiry Card 22 // FRONT COVER SPOTLIGHT WWW.SPECIFICATIONONLINE.CO.UK Clouded judgement? The benefits of cloud security servers CONTINUOUS ADVANCES IN TECHNOLOGY ARE BRINGING HUGE EFFICIENCIES TO THE SECURITY SECTOR, BUT ACCESS CONTROL REMAINS ONE OF THE SLOWEST MARKETS TO CAPITALISE ON THE BENEFITS OF CLOUD SERVERS. SPECIFICATION SPEAKS TO PIP COURCOUX, SALES AND PRODUCT MANAGER - CLIQ ® SYSTEMS AT ABLOY UK, TO FIND OUT WHY. loud technology has transformed our everyday lives. It's a trend that started a long time ago, and many of us now take for granted that much of our everyday data – such as our money or our emails – are stored in the cloud. What you call it may vary, but a server that stores data or manages computing power that isn't in your own home or premises is a cloud. Yet it remains that there are very few cloud access control systems on the market. It's a service that many of the big players in the security sector still don't provide, partly because migrating from a conventional server system to a multi-tenanted cloud system is an expensive and complex operation. We haven't seen a great rush to meet this demand as there's a perception that many organisations are fearful about storing such sensitive data on the cloud, but at Abloy UK we know that there is an appetite for the cloud and its many benefits. Trusting the experts Access control data is undeniably valuable and the thought of storing it on the cloud can understandably make some nervous. But these fears can be mitigated by turning to the right place and trusting the experts. When you want something to be truly secure, and to feel supported, you work with an expert. In the same way organisations trust and partner with Abloy UK to manage their security needs, when it comes to our cloud, we work with world leaders to supply the infrastructure that it sits upon. We know that in their hands our infrastructure is safe; they have teams that will be monitoring and securing threats, managing GDPR and patching the operating systems at the right time. This also tackles the threat of hacking, commonly regarded as the biggest risk to cloud security. Hacking is typically undertaken by legitimate companies who highlight system vulnerabilities, which are then exploited by malicious attackers. Software providers create patches to tackle the breach, but patching is a major task and often companies can be 12 months behind. This can be because they're more concerned that they might break something, rather than fix the vulnerability that's been exposed. The best example of this is the Wannacry malware attack which affected the NHS in 2017. The patch which would have C

Articles in this issue

Links on this page

Archives of this issue

view archives of Specification Magazine - March 2020