According to the Bitkom industry association, 73% of all German businesses are already using applications, storage and computing power from the cloud. Thousands of organisations have moved the majority of the IT infrastructure into the cloud over the years These days, every application can be used from the cloud—from the telephone systems to the customer portal.
Much like in a customer’s IT security structure, the end devices, applications, network transitions, identities and passwords also have to be secured. To do so, there are other security technologies in play. The cloud is a closed environment that cannot be interfered with meaning that security features have to be implemented through a cloud access security broker interface.