Endpoint protec on (servers and end-user devices) - Any me
a company's network is accessed remotely via laptops, mobile,
or other devices, it's a poten al entry point for a security threat.
And if a device should get lost or stolen, the company's data
is dangerously exposed. Managing network applica ons in the
cloud means that endpoint protec on has to be administered
through security so ware, both on network servers and on
each device.
Extract/Transform/Load (ETL)
development ac vites account
for as much as 75% OF TOTAL
DATA WAREHOUSE WORK.
Goff, Kevin. "The Baker's Dozen: 13 Tips for Be er Extract/Transform/Load (ETL)
Prac ces in Data Warehousing." Code Magazine. April 16, 2019.
Firewall / IPS / IDS requirements - Firewalls and Intrusion
Protec on Systems (IPS) work together to block unauthorized
network hacks, while Intrusion Detec on Systems (IDS) detect
and alert to any suspicious ac vity or data. But with so many
outside devices being used for business, tradi onal detec on
systems are stressed when protec ng against a bevy of internal
and external threats. IT leaders must think about how to
coordinate the various resources cloud providers have to meet
firewall requirements effec vely and neutralize threats that can
literally come from anywhere.
7
oneneck.com
03