Hi. Welcome to Ingram Micro.

Please choose your role, so we can direct you to what you’re looking for.

If you’d like to learn more about Ingram Micro global initiatives and operations, visit ingrammicro.com.

Building a Secure Cloud Strategy for Your Customers

November 10, 2017

Building a Secure Cloud Strategy for Your Customers


It’s a trend that has been developing over the past few years that shows no signs of slowing—more information is migrating to the cloud. Whether for massive healthcare enterprises or small to medium-sized businesses (SMBs), the convenience of cloud-based storage solutions and the efficacy of cloud-based Software as a Service (SaaS) tools have enterprises of all sizes keeping their data far from home (that is, unless they own their own cloud infrastructure). But when enterprises put that data up on public clouds, they don’t just expect it to be safe—their businesses depend on its safety.

As more information goes up on the cloud, the number of security breaches of cloud-based solutions continues to increase. Customers want the benefits that cloud-based storage and services provide, but with hackers striking all around, customers may have concerns about putting their data out there.

Strategy is key to keeping any enterprise safe, and so these tips on building a secure cloud strategy for your customers will allow both you and your clients to rest a little easier.

Pursue Proven Secure Providers

While some well-known cloud services are good for day-to-day file-sharing and have the sort of name recognition that will pique a client’s interest, make sure that you have your client pointed in the direction of solutions that build their reputation on security. Business-class cloud services with a focus on encryption are the right choices for enterprises dealing with sensitive information. Explain the why of this to the customer and you’ll get the buy-in you need in order to guide them down the right path.

Use the Right Security Tools for the Right Needs

Enterprises and SMBs use the cloud for many different reasons, and the reason for which it is being deployed should figure heavily into the strategic implementation of security solutions. Does your client have a policy that allows employees to bring their own devices to work and connect to cloud-based services? Point your clients in the direction of tools that can be used to watch these sorts of mobile apps on a network. Using the cloud for backup storage? Think tough perimeter security. Having employees access SaaS tools on a regular basis? Consult on policies that bolster the security of the cloud by educating staff on safe ways of using cloud-based resources.

Explore New Developments in Cloud Security

Keeping your client apprised of developments in the world of security for cloud-based services is one important way to make sure that, as threats develop, your client is aware of the most powerful tools and methods of managing services to prevent potential data breaches. Trends such as self-managed encryption keys for enterprises, while just now hitting the market, may someday provide the best sort of protection against hacks. Let your clients know what is out there and help them understand exactly how their potential options would meet their business needs.

Have the Right Conversations

What is most important in strategizing a secure cloud implementation is having well-informed discussions with a client. Your conversations should cover the client’s needs, potential cloud uses, current security setup, and how the cloud can be integrated with what is currently in place. They should also cover such topics as the potential threat level that the customer faces. For instance, if a business is the type that is often targeted for hacks, such as a high-profile retail enterprise or a big healthcare provider, that will certainly help shape the strategy for secure cloud implementation.  

Making these sorts of assessments and selling a business on the secure cloud solutions that will truly help them protect their enterprise is the basis for a healthy partnership—not to mention the basis for a business world that can take advantage of the massive potential of the cloud without being dissuaded by the looming fear of data breaches.

What are the most effective tools you have seen that have protected against cloud security breaches?