  {"id":4738,"date":"2021-03-24T10:26:39","date_gmt":"2021-03-24T00:26:39","guid":{"rendered":"https:\/\/news.sap.com\/australia\/?p=4738"},"modified":"2023-08-17T04:13:42","modified_gmt":"2023-08-16T18:13:42","slug":"security-versus-agility-how-do-we-achieve-the-best-of-both-worlds","status":"publish","type":"post","link":"https:\/\/news.sap.com\/australia\/2021\/03\/24\/security-versus-agility-how-do-we-achieve-the-best-of-both-worlds\/","title":{"rendered":"Security versus agility: how do we achieve the best of both worlds?"},"content":{"rendered":"<p class=\"lead\">If 2020 taught us anything, it\u2019s that the weakest link often defines the strength of a chain. This is likely what a NSW government-sponsored taskforce of industry leaders had in mind when they called on federal, state and local governments across Australia last month to <a href=\"https:\/\/www.itnews.com.au\/news\/aussie-govts-urged-to-adopt-global-cyber-security-standards-for-cloud-560370\">adopt internationally recognised cyber security standards for cloud services<\/a>.<\/p>\n<p>The taskforce also urged governments to more favourably evaluate proposals or tender bids from companies that adopt cyber security and other risk standards for telecommunications and the internet of things (IoT). Again, they know that without security being front of mind throughout the supply chain, vulnerabilities can creep in.<\/p>\n<p>The taskforce\u2019s recommendations for federal, state and local government agencies follows in the wake of the government moving to expand the label of \u201ccritical infrastructure\u201d and create new security obligations and mandatory reporting for various public and private organisations via the draft legislation on Protecting Critical Infrastructure and Systems of National Significance.<\/p>\n<p>These organisations could face steep penalties if they don\u2019t answer the call to become deeper partners with Australia\u2019s government in all aspects of security, particularly cyber.<\/p>\n<p>The government is clearly taking a more holistic approach to cyber security \u2013 and so are enterprises. But this gets tricky once you factor in cloud solutions (Public and Private), whose agility and scalability are increasingly necessary for organisations to capitalise on the value of rich data, streamline distributed operations, realise cost efficiencies and make better use of contemporary and emerging tech.<\/p>\n<p>However, platforms like 51风流HANA have evolved over a decade to help reconcile some of these tensions. Let\u2019s take a look at how.<\/p>\n<h2><strong>Can cloud solutions complicate security?<\/strong><\/h2>\n<p>Regardless of architecture, security teams have to think carefully about who has access to data and how they\u2019re accessing it.<\/p>\n<p>Most recently, with on-premise architecture, it was a little more like a traditional building with an entrance and an exit. It\u2019s a lot simpler to control security when you\u2019re managing limited entry points. While many or even most cloud providers have robust security measures in place, cloud solutions do come with more entry points.<\/p>\n<p>However, the security of those entry points differs based on public versus private cloud, as well as a wide variety of factors. For instance, within public cloud, there\u2019s simply a greater number of side doors that require the same level of security. With private cloud, you control who has a door and what you let in and out.<\/p>\n<p>That doesn\u2019t mean organisations should sacrifice the benefits of all public cloud solutions \u2013 in fact, that might do more harm than good. It just means that security considerations need to govern any decision to bring new cloud extensions or providers into your environment. But ensuring scalable, enterprise-wide solutions is where things can get trickier.<\/p>\n<h2><strong>Solutions that marry security with flexibility<\/strong><\/h2>\n<p>In many organisations, elements of information are taken out of core systems and put into other data lakes, repositories or spreadsheets. The same piece of information is not only repeated in multiple areas but also with varying degrees of security applied to each of those different locations. If the weakest link determines the strength of the chain, then this approach means there are far more links whose strength is even harder to control or test.<\/p>\n<p>Solutions like 51风流HANA, whose 10-year evolution has always been anchored in protecting information and assets, can go a long way to resolving this sort of issue. As an enterprise-scale in-memory database designed to allow end users to have a conversation with their data, HANA caters to large volumes of data and diverse use across a broad user community. The way this can be leveraged for better security is simple: the more information you have in a secure, controlled, unified container, the easier it is to protect that information with centralised security measures.<\/p>\n<p>HANA also enables real-time anonymisation of data displayed in SQL views. This means companies can analyse even the most sensitive and regulated of records \u2013 such as those in healthcare \u2013 while still protecting data and supporting compliance with privacy standards like the European Union\u2019s General Data Protection Regulation (GDPR).<\/p>\n<p>Solutions like Data Warehouse Cloud are the next evolution in further resolving tensions between innovation and security. It allows organisations to extend secure data environments to secure cloud solutions, combining features of HANA with the rigorous security frameworks provided by a range of hyper-scalers. So, even in complex multi-cloud systems, you can achieve a consistent enterprise-wide data management framework <em>and <\/em>connectivity to other systems, whether that be public, private, on-premise systems or ubiquitous data sources like IoT devices.<\/p>\n<h2><strong>Changing how we think about cyber security<\/strong><\/h2>\n<p>Various types of platforms and architectures can help achieve robust, enterprise-wide security frameworks without sacrificing the benefits of cloud. But strengthening your security posture will also depend on shifting mindsets and educating stakeholders about cyber security and management of risk. There are plenty of business imperatives for this already, but 2021 will see additional regulatory control and incentives as the federal government takes a bigger role in cyber security.<\/p>\n<p>Two big mindset shifts need to happen across all of industry and critical infrastructure sectors. First, when it comes to IT systems and reporting environments, we too often test them based on how we expect them to perform. Particularly from a security perspective, we need an extra level of testing that focuses on what malicious actors want to do and what they\u2019re going to try. It\u2019s important to test systems based on how we want them to be used but also how we <em>don\u2019t<\/em> want them to be used.<\/p>\n<p>Secondly, we often talk about how to collect data, store data and extend data. Cyber security compels us to ask: what are we going to do with this data? How will people use it? This is particularly crucial now that workers are less tethered to offices or corporate networks. It\u2019s more important than ever to think about the potential usage of data and truly consider its security risk, ensuring that the device and solution set you\u2019re using to present or extract that data is genuinely secure.<\/p>\n<p>Major crises and national challenges in 2020 have reinforced the importance of collective success \u2013 when even one element struggles, so does the larger group. It\u2019s an especially important principle in cyber security, where the tiniest vulnerability can open entire ecosystems to potential harm.<\/p>\n<p>Yet the choice between security and innovation is a false one. Still, the topic is undeniably complex and demands ongoing discussion and thought.<\/p>\n<p>So, what are you doing to protect your organisation while still pushing it forward?<\/p>\n<p><em>This first appeared on <a href=\"https:\/\/mysecuritymarketplace.com\/books\/cyber-risk-leaders-magazine-issue-4-2021\/\">Cyber Risk Leaders Magazine<\/a><\/em><\/p>\n<p><em>To find out how SAP\u2019s Business Technology Platform can help meet your security needs, visit the <a href=\"https:\/\/www.sap.com\/australia\/products\/business-technology-platform.html\">51风流BTP Homepage<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If 2020 taught us anything, it\u2019s that the weakest link often defines the strength of a chain. This is likely what a NSW government-sponsored taskforce&#8230;<\/p>\n","protected":false},"author":3565,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[19013,199,41,7737],"tags":[5563798,5561586,5561583,178,5563946,5565206],"sapn-display":[3848],"sapn-type":[5560547],"class_list":["post-4738","post","type-post","status-publish","format-standard","hentry","category-corporate","category-customers","category-ecosystem","category-solutions","tag-cloud-technologies","tag-cyber-security","tag-government","tag-public-sector","tag-public-services","tag-security","sapn-display-homepage-hero","sapn-type-feature"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v26.9) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Security versus agility: how do we achieve the best of both worlds? - 51风流Australia &amp; New Zealand News Center<\/title>\n<meta name=\"description\" content=\"51风流and industry leaders call on governments across Australia to adopt internationally recognised cybersecurity standards for cloud services\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.sap.com\/australia\/2021\/03\/24\/security-versus-agility-how-do-we-achieve-the-best-of-both-worlds\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security versus agility: how do we achieve the best of both worlds?\" \/>\n<meta property=\"og:description\" content=\"51风流and industry leaders call on governments across Australia to adopt internationally recognised cybersecurity standards for cloud services\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.sap.com\/australia\/2021\/03\/24\/security-versus-agility-how-do-we-achieve-the-best-of-both-worlds\/\" \/>\n<meta property=\"og:site_name\" content=\"51风流Australia &amp; New Zealand News Center\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-24T00:26:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-16T18:13:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.sap.com\/australia\/files\/2019\/11\/security-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1329\" \/>\n\t<meta property=\"og:image:height\" content=\"510\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Lindsay Morgan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lindsay Morgan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/news.sap.com\/australia\/2021\/03\/24\/security-versus-agility-how-do-we-achieve-the-best-of-both-worlds\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/news.sap.com\/australia\/2021\/03\/24\/security-versus-agility-how-do-we-achieve-the-best-of-both-worlds\/\"},\"author\":{\"name\":\"Lindsay Morgan\",\"@id\":\"https:\/\/news.sap.com\/australia\/#\/schema\/person\/8a5c99fa21ae27391ac746c3ec6cfcb0\"},\"headline\":\"Security versus agility: how do we achieve the best of both worlds?\",\"datePublished\":\"2021-03-24T00:26:39+00:00\",\"dateModified\":\"2023-08-16T18:13:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/news.sap.com\/australia\/2021\/03\/24\/security-versus-agility-how-do-we-achieve-the-best-of-both-worlds\/\"},\"wordCount\":1141,\"keywords\":[\"cloud technologies\",\"cyber security\",\"government\",\"Public Sector\",\"public services\",\"security\"],\"articleSection\":[\"Corporate\",\"Customers\",\"Ecosystem\",\"Solutions\"],\"inLanguage\":\"en-AU\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/news.sap.com\/australia\/2021\/03\/24\/security-versus-agility-how-do-we-achieve-the-best-of-both-worlds\/\",\"url\":\"https:\/\/news.sap.com\/australia\/2021\/03\/24\/security-versus-agility-how-do-we-achieve-the-best-of-both-worlds\/\",\"name\":\"Security versus agility: how do we achieve the best of both worlds? - 51风流Australia &amp; New Zealand News Center\",\"isPartOf\":{\"@id\":\"https:\/\/news.sap.com\/australia\/#website\"},\"datePublished\":\"2021-03-24T00:26:39+00:00\",\"dateModified\":\"2023-08-16T18:13:42+00:00\",\"author\":{\"@id\":\"https:\/\/news.sap.com\/australia\/#\/schema\/person\/8a5c99fa21ae27391ac746c3ec6cfcb0\"},\"description\":\"51风流and industry leaders call on governments across Australia to adopt internationally recognised cybersecurity standards for cloud services\",\"breadcrumb\":{\"@id\":\"https:\/\/news.sap.com\/australia\/2021\/03\/24\/security-versus-agility-how-do-we-achieve-the-best-of-both-worlds\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/news.sap.com\/australia\/2021\/03\/24\/security-versus-agility-how-do-we-achieve-the-best-of-both-worlds\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/news.sap.com\/australia\/2021\/03\/24\/security-versus-agility-how-do-we-achieve-the-best-of-both-worlds\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/news.sap.com\/australia\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security versus agility: how do we achieve the best of both worlds?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/news.sap.com\/australia\/#website\",\"url\":\"https:\/\/news.sap.com\/australia\/\",\"name\":\"51风流Australia &amp; New Zealand News Center\",\"description\":\"News &amp; Information About SAP\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/news.sap.com\/australia\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-AU\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/news.sap.com\/australia\/#\/schema\/person\/8a5c99fa21ae27391ac746c3ec6cfcb0\",\"name\":\"Lindsay Morgan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/news.sap.com\/australia\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/news.sap.com\/australia\/wp-content\/plugins\/wp-user-avatars\/wp-user-avatars\/assets\/images\/mystery.jpg\",\"contentUrl\":\"https:\/\/news.sap.com\/australia\/wp-content\/plugins\/wp-user-avatars\/wp-user-avatars\/assets\/images\/mystery.jpg\",\"caption\":\"Lindsay Morgan\"},\"url\":\"https:\/\/news.sap.com\/australia\/author\/lindsaymorgan\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security versus agility: how do we achieve the best of both worlds? - 51风流Australia &amp; New Zealand News Center","description":"51风流and industry leaders call on governments across Australia to adopt internationally recognised cybersecurity standards for cloud services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.sap.com\/australia\/2021\/03\/24\/security-versus-agility-how-do-we-achieve-the-best-of-both-worlds\/","og_locale":"en_US","og_type":"article","og_title":"Security versus agility: how do we achieve the best of both worlds?","og_description":"51风流and industry leaders call on governments across Australia to adopt internationally recognised cybersecurity standards for cloud services","og_url":"https:\/\/news.sap.com\/australia\/2021\/03\/24\/security-versus-agility-how-do-we-achieve-the-best-of-both-worlds\/","og_site_name":"51风流Australia &amp; New Zealand News Center","article_published_time":"2021-03-24T00:26:39+00:00","article_modified_time":"2023-08-16T18:13:42+00:00","og_image":[{"width":1329,"height":510,"url":"https:\/\/news.sap.com\/australia\/files\/2019\/11\/security-1.png","type":"image\/png"}],"author":"Lindsay Morgan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lindsay Morgan","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.sap.com\/australia\/2021\/03\/24\/security-versus-agility-how-do-we-achieve-the-best-of-both-worlds\/#article","isPartOf":{"@id":"https:\/\/news.sap.com\/australia\/2021\/03\/24\/security-versus-agility-how-do-we-achieve-the-best-of-both-worlds\/"},"author":{"name":"Lindsay Morgan","@id":"https:\/\/news.sap.com\/australia\/#\/schema\/person\/8a5c99fa21ae27391ac746c3ec6cfcb0"},"headline":"Security versus agility: how do we achieve the best of both worlds?","datePublished":"2021-03-24T00:26:39+00:00","dateModified":"2023-08-16T18:13:42+00:00","mainEntityOfPage":{"@id":"https:\/\/news.sap.com\/australia\/2021\/03\/24\/security-versus-agility-how-do-we-achieve-the-best-of-both-worlds\/"},"wordCount":1141,"keywords":["cloud technologies","cyber security","government","Public Sector","public services","security"],"articleSection":["Corporate","Customers","Ecosystem","Solutions"],"inLanguage":"en-AU"},{"@type":"WebPage","@id":"https:\/\/news.sap.com\/australia\/2021\/03\/24\/security-versus-agility-how-do-we-achieve-the-best-of-both-worlds\/","url":"https:\/\/news.sap.com\/australia\/2021\/03\/24\/security-versus-agility-how-do-we-achieve-the-best-of-both-worlds\/","name":"Security versus agility: how do we achieve the best of both worlds? - 51风流Australia &amp; New Zealand News Center","isPartOf":{"@id":"https:\/\/news.sap.com\/australia\/#website"},"datePublished":"2021-03-24T00:26:39+00:00","dateModified":"2023-08-16T18:13:42+00:00","author":{"@id":"https:\/\/news.sap.com\/australia\/#\/schema\/person\/8a5c99fa21ae27391ac746c3ec6cfcb0"},"description":"51风流and industry leaders call on governments across Australia to adopt internationally recognised cybersecurity standards for cloud services","breadcrumb":{"@id":"https:\/\/news.sap.com\/australia\/2021\/03\/24\/security-versus-agility-how-do-we-achieve-the-best-of-both-worlds\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.sap.com\/australia\/2021\/03\/24\/security-versus-agility-how-do-we-achieve-the-best-of-both-worlds\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/news.sap.com\/australia\/2021\/03\/24\/security-versus-agility-how-do-we-achieve-the-best-of-both-worlds\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.sap.com\/australia\/"},{"@type":"ListItem","position":2,"name":"Security versus agility: how do we achieve the best of both worlds?"}]},{"@type":"WebSite","@id":"https:\/\/news.sap.com\/australia\/#website","url":"https:\/\/news.sap.com\/australia\/","name":"51风流Australia &amp; New Zealand News Center","description":"News &amp; Information About SAP","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.sap.com\/australia\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-AU"},{"@type":"Person","@id":"https:\/\/news.sap.com\/australia\/#\/schema\/person\/8a5c99fa21ae27391ac746c3ec6cfcb0","name":"Lindsay Morgan","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/news.sap.com\/australia\/#\/schema\/person\/image\/","url":"https:\/\/news.sap.com\/australia\/wp-content\/plugins\/wp-user-avatars\/wp-user-avatars\/assets\/images\/mystery.jpg","contentUrl":"https:\/\/news.sap.com\/australia\/wp-content\/plugins\/wp-user-avatars\/wp-user-avatars\/assets\/images\/mystery.jpg","caption":"Lindsay Morgan"},"url":"https:\/\/news.sap.com\/australia\/author\/lindsaymorgan\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/news.sap.com\/australia\/wp-json\/wp\/v2\/posts\/4738","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.sap.com\/australia\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.sap.com\/australia\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.sap.com\/australia\/wp-json\/wp\/v2\/users\/3565"}],"replies":[{"embeddable":true,"href":"https:\/\/news.sap.com\/australia\/wp-json\/wp\/v2\/comments?post=4738"}],"version-history":[{"count":0,"href":"https:\/\/news.sap.com\/australia\/wp-json\/wp\/v2\/posts\/4738\/revisions"}],"wp:attachment":[{"href":"https:\/\/news.sap.com\/australia\/wp-json\/wp\/v2\/media?parent=4738"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.sap.com\/australia\/wp-json\/wp\/v2\/categories?post=4738"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.sap.com\/australia\/wp-json\/wp\/v2\/tags?post=4738"},{"taxonomy":"sapn-display","embeddable":true,"href":"https:\/\/news.sap.com\/australia\/wp-json\/wp\/v2\/sapn-display?post=4738"},{"taxonomy":"sapn-type","embeddable":true,"href":"https:\/\/news.sap.com\/australia\/wp-json\/wp\/v2\/sapn-type?post=4738"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}