Why multi-cloud visibility is more vital than ever

Digital clouds against a blue background.
(Image credit: Shutterstock / Blackboard)

Today’s enterprises are increasingly multi-cloud, harnessing an average of three different cloud service providers (CSPs) to achieve flexibility, efficiency, and scalability. Alongside the growing use of containerization with technologies such as Kubernetes, these expanding cloud environments are delivering huge benefits. However, this also leads to greater, more complex issues around visibility, security, and cost.

If data is the new gold, enterprises need to have full visibility and full control over this precious resource. The question is, how can businesses take responsibility for their cloud-based data if they lack visibility into what or where it is? Here we explore why visibility is more important than ever in today’s multi-cloud world, and why a single-view approach is needed to ensure a return on cloud strategies.

Isolated visibility or big picture?

Visibility is at the core of robust data management strategies. If you cannot see data, how can you control, protect, and utilize it?

In harnessing the benefits of the cloud, enterprises want to reduce the operational complexity and costs associated with managing multi-cloud environments, while also ensuring that they own and control their data no matter where it resides. Where visibility and control are lacking, enterprises cannot realize the value of their data. They may incur unnecessary costs such as redundant storage and face greater compliance challenges. Not only that, but cloud-based data blind spots undermine data and application resiliency and cybersecurity.

However, as uncovered in our latest research, four in ten organizations confess they don’t have full visibility into data stored in cloud environments, and 92% said they needed to improve their ability to track their entire data footprint.

With a view and control of the entire data estate—across edge, data center, and cloud—from a single pane of glass, organizations can realize the benefits of multi-cloud without losing control and authority over their data.

Ian Wood

Ian Wood is the Senior Director and Head of Technology at Veritas.

A native trapdoor

One of the fundamental reasons enterprises turn to CSPs is the perceived benefits of ease of use, flexibility, cost-effectiveness, and peace of mind in terms of core needs such as security, backup and recovery. While the public cloud does indeed offer a myriad of benefits, organizations are in danger of assuming they are getting more than they actually are.

For example, the complexity of multi-cloud environments is leading many organizations to rely heavily on CSPs’ standard, add-on services for data security, backup, and recovery. These basic tools can create a false sense of security because they do not provide cross-cloud visibility and observability for all data and applications, as well as continuous data protection.

And, in a world where ransomware has evolved into a sophisticated form of organized crime, CSP tools do not offer the level of ransomware resilience, immutable storage, and reliable disaster recovery today’s enterprises require. As a result, companies using these native tools are more severely impacted by ransomware.

The good news is that many recognize this risk and can take action. Almost three-quarters(73%) of enterprises told us they are aware of gaps in their cybersecurity when using a native cloud security tool. And over half said their organization is at risk of being the victim of ransomware as a result of relying on native cloud security backup.

Add to this is the fact that more than six in ten enterprises rely on default settings, rather than configuring native tools to their organization's unique requirements. In most cases, these settings do not provide adequate cover and instead widen the vulnerability gap.

As The Center for Internet Security warns, “To avoid a gap in protection, consider implementing third-party tools to harden systems in addition to the CSP’s native security tools. It’s better to have overlaps between third-party security tools and the CSP’s security services than to have gaps in your cloud security.”

Native tools may appear easy to implement as an add-on service and seem cost-effective at the outset, but these are dangerous and potentially costly mistakes. Until organizations reassess their reliance on multiple and disparate CSP tools, visibility into their enterprise operations will remain low, while their vulnerability to ransomware attacks, potential for data and financial loss, and downtime and compliance issues will likely increase.

A transformative infrastructure

The rise of multi-cloud creates a transformative infrastructure and application development platform for enterprises. Tools offered by CSPs deliver basic functionality, but mission-critical applications require enterprise-grade capabilities and cross-cloud data mobility and visibility.

There is a clear advantage to streamlining data visibility and protection with a single solution that can reduce costs and complexity, as well as provide enhanced and multiple layers of cloud data and application security.

When you are in control of your multi-cloud, you get the most out of your enterprise’s most valuable resources by enabling cost optimization, accelerated technology adoption, fast recovery, analytics and insights, in tandem with cyber resiliency.

We've featured the best cloud backup. 

Ian Wood

Ian Wood is the Senior Director and Head of Technology at Veritas, a global leader in data management. He has over 29 years of working experience and is a passionate of technology. 

Read more
A person at a laptop with a cybersecure lock symbol floating above it.
Operational silos could overwhelm more enterprises in the future
Cloud computing graphics.
Sovereign Cloud: redefining the future of secure digital innovation
Cloud computing graphics.
Cloud repatriation – how to balance repatriation effectively and securely
Digital clouds against a blue background.
How to optimize business data for the hybrid cloud
Cloud, networking and internet
Under the hood of data sovereignty
Racks of servers inside a data center.
As the ‘age of AI’ beckons, it’s time to get serious about data resilience
Latest in Software & Services
woman listening to computer
AWS vs Azure: choosing the right platform to maximize your company's investment
Group of people meeting
Zoom vs Google Meet: which is the best video conferencing tool for your business?
Person at laptop
Windows 11 vs Windows 365: which is the best choice for businesses?
A man sitting at his desk in the evening and using a desktop computer
Office 2021 vs Office 2024: is it time to upgrade?
Microsoft 365 Business app logos
Office 2024 LTSC vs Microsoft 365 Business: what are the differences?
Windows 11 Start menu layout choices: Grid view
Windows 11 vs Linux for business: which operating system should you embrace?
Latest in Opinion
Apple CEO Tim Cook delivers remarks before the start of an Apple event at Apple headquarters on September 09, 2024 in Cupertino, California. Apple held an event to showcase the new iPhone 16, Airpods and Apple Watch models. (Photo by Justin Sullivan/Getty Images)
The big Siri Apple Intelligence delay proves that maybe we really don't know Apple at all
Racks of servers inside a data center.
Modernizing data centers: an efficient path forward
Apple iPhone 16 Pro Max REVIEW
Apple Intelligence is a fever dream that I bet Apple wishes we could all forget about
Asus ROG Ally using Steam
I think Asus could be the perfect partner for an Xbox handheld – but I have questions
Hands typing on a keyboard surrounded by security icons
The psychology of scams: how cybercriminals are exploiting the human brain
A person using a desktop computer.
The role of automation in achieving sustainability goals