Why multi-cloud visibility is more vital than ever

Digital clouds against a blue background.
(Image credit: Shutterstock / Blackboard)

Today’s enterprises are increasingly multi-cloud, harnessing an average of three different cloud service providers (CSPs) to achieve flexibility, efficiency, and scalability. Alongside the growing use of containerization with technologies such as Kubernetes, these expanding cloud environments are delivering huge benefits. However, this also leads to greater, more complex issues around visibility, security, and cost.

If data is the new gold, enterprises need to have full visibility and full control over this precious resource. The question is, how can businesses take responsibility for their cloud-based data if they lack visibility into what or where it is? Here we explore why visibility is more important than ever in today’s multi-cloud world, and why a single-view approach is needed to ensure a return on cloud strategies.

Isolated visibility or big picture?

Visibility is at the core of robust data management strategies. If you cannot see data, how can you control, protect, and utilize it?

In harnessing the benefits of the cloud, enterprises want to reduce the operational complexity and costs associated with managing multi-cloud environments, while also ensuring that they own and control their data no matter where it resides. Where visibility and control are lacking, enterprises cannot realize the value of their data. They may incur unnecessary costs such as redundant storage and face greater compliance challenges. Not only that, but cloud-based data blind spots undermine data and application resiliency and cybersecurity.

However, as uncovered in our latest research, four in ten organizations confess they don’t have full visibility into data stored in cloud environments, and 92% said they needed to improve their ability to track their entire data footprint.

With a view and control of the entire data estate—across edge, data center, and cloud—from a single pane of glass, organizations can realize the benefits of multi-cloud without losing control and authority over their data.

Ian Wood

Ian Wood is the Senior Director and Head of Technology at Veritas.

A native trapdoor

One of the fundamental reasons enterprises turn to CSPs is the perceived benefits of ease of use, flexibility, cost-effectiveness, and peace of mind in terms of core needs such as security, backup and recovery. While the public cloud does indeed offer a myriad of benefits, organizations are in danger of assuming they are getting more than they actually are.

For example, the complexity of multi-cloud environments is leading many organizations to rely heavily on CSPs’ standard, add-on services for data security, backup, and recovery. These basic tools can create a false sense of security because they do not provide cross-cloud visibility and observability for all data and applications, as well as continuous data protection.

And, in a world where ransomware has evolved into a sophisticated form of organized crime, CSP tools do not offer the level of ransomware resilience, immutable storage, and reliable disaster recovery today’s enterprises require. As a result, companies using these native tools are more severely impacted by ransomware.

The good news is that many recognize this risk and can take action. Almost three-quarters(73%) of enterprises told us they are aware of gaps in their cybersecurity when using a native cloud security tool. And over half said their organization is at risk of being the victim of ransomware as a result of relying on native cloud security backup.

Add to this is the fact that more than six in ten enterprises rely on default settings, rather than configuring native tools to their organization's unique requirements. In most cases, these settings do not provide adequate cover and instead widen the vulnerability gap.

As The Center for Internet Security warns, “To avoid a gap in protection, consider implementing third-party tools to harden systems in addition to the CSP’s native security tools. It’s better to have overlaps between third-party security tools and the CSP’s security services than to have gaps in your cloud security.”

Native tools may appear easy to implement as an add-on service and seem cost-effective at the outset, but these are dangerous and potentially costly mistakes. Until organizations reassess their reliance on multiple and disparate CSP tools, visibility into their enterprise operations will remain low, while their vulnerability to ransomware attacks, potential for data and financial loss, and downtime and compliance issues will likely increase.

A transformative infrastructure

The rise of multi-cloud creates a transformative infrastructure and application development platform for enterprises. Tools offered by CSPs deliver basic functionality, but mission-critical applications require enterprise-grade capabilities and cross-cloud data mobility and visibility.

There is a clear advantage to streamlining data visibility and protection with a single solution that can reduce costs and complexity, as well as provide enhanced and multiple layers of cloud data and application security.

When you are in control of your multi-cloud, you get the most out of your enterprise’s most valuable resources by enabling cost optimization, accelerated technology adoption, fast recovery, analytics and insights, in tandem with cyber resiliency.

We've featured the best cloud backup. 

Ian Wood

Ian Wood is the Senior Director and Head of Technology at Veritas, a global leader in data management. He has over 29 years of working experience and is a passionate of technology. 

Read more
Cloud computing graphics.
Sovereign Cloud: redefining the future of secure digital innovation
Cloud computing graphics.
Cloud repatriation – how to balance repatriation effectively and securely
Digital clouds against a blue background.
How to optimize business data for the hybrid cloud
Cloud, networking and internet
Under the hood of data sovereignty
An abstract image of digital security.
Technology monitoring solutions are becoming obsolete
Racks of servers inside a data center.
As the ‘age of AI’ beckons, it’s time to get serious about data resilience
Latest in Software & Services
TinEye website
I like this reverse image search service the most
A person in a wheelchair working at a computer.
Here’s a free way to find long lost relatives and friends
A white woman with long brown hair in a ponytail looks down at her computer in a distressed manner. She is holding her forehead with one hand and a credit card with the other
This people search finder covers all the bases, but it's not perfect
That's Them home page
Is That's Them worth it? My honest review
woman listening to computer
AWS vs Azure: choosing the right platform to maximize your company's investment
A person at a desktop computer working on spreadsheet tables.
Trello vs Jira: which project management solution is best for you?
Latest in Opinion
AI hallucinations
We're already trusting AI with too much – I just hope AI hallucinations disappear before it's too late
Closing the cybersecurity skills gap
How CISOs can meet the demands of new privacy regulations
Half man, half AI.
Ensuring your organization uses AI responsibly: a how-to guide
Judge sitting behind laptop in office
A day in the life of an AI-augmented lawyer
Cyber-security
Why Windows End of Life deadlines require a change of mindset
Polar Pacer
Polar's latest software update might have finally convinced me to ditch my Garmin