Close Menu
TechUpdateAlert

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    My Health Anxiety Means I Won’t Use Apple’s or Samsung’s Smartwatches. Here’s Why

    December 22, 2025

    You can now buy the OnePlus 15 in the US and score free earbuds if you hurry

    December 22, 2025

    Today’s NYT Connections: Sports Edition Hints, Answers for Dec. 22 #455

    December 22, 2025
    Facebook X (Twitter) Instagram
    Trending
    • My Health Anxiety Means I Won’t Use Apple’s or Samsung’s Smartwatches. Here’s Why
    • You can now buy the OnePlus 15 in the US and score free earbuds if you hurry
    • Today’s NYT Connections: Sports Edition Hints, Answers for Dec. 22 #455
    • Android might finally stop making you tap twice for Wi-Fi
    • Today’s NYT Mini Crossword Answers for Dec. 22
    • Waymo’s robotaxis didn’t know what to do when a city’s traffic lights failed
    • Today’s NYT Wordle Hints, Answer and Help for Dec. 22 #1647
    • You Asked: OLED Sunlight, VHS on 4K TVs, and HDMI Control Issues
    Facebook X (Twitter) Instagram Pinterest Vimeo
    TechUpdateAlertTechUpdateAlert
    • Home
    • Gaming
    • Laptops
    • Mobile
    • Software
    • Reviews
    • AI & Tech
    • Gadgets
    • How-To
    TechUpdateAlert
    Home»How-To»Multi-benefit and multi-risk: how to balance pros and cons of multi-cloud
    How-To

    Multi-benefit and multi-risk: how to balance pros and cons of multi-cloud

    techupdateadminBy techupdateadminSeptember 22, 2025No Comments5 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Representational image of cloud computing.
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Multi-cloud environments promise major business benefits, from greater agility and scalability to best-in-class tools across providers. Implementing a multi-cloud strategy can enhance cyber resilience and accelerate disaster recovery. But this approach expands an organization’s attack surface, increasing the number of potential vulnerabilities that must be managed.

    While the benefits and the risks go hand-in-hand with multi-cloud computing, organizations can take steps to mitigate threats and maximize their cloud investments. This article explores such recommendations.

    Paul Stephens

    Social Links Navigation

    Chief Technical Officer at Netwrix.

    Managing benefits and risks

    A major attraction of cloud platforms is their pace of innovation. Providers are constantly updating their solutions, introducing frequent updates that bring new features and capabilities that aim to deliver more value to an organization.


    You may like

    For a number of an organization’s employees, this is great as they use these new features instantly without the delay of implementation cycles. But for security teams, it creates a constant game of catch-up.

    These new features may not be optimized for an organization’s specific needs, which is especially concerning when dealing with sensitive data.

    As organizations increase the number of cloud providers that they utilize, the greater the risk of security blind spots. AWS, Azure, and Google Cloud all work differently. Their documentation varies in depth and clarity, a fix that works in one environment might not apply in another, and even small differences, like how they handle user roles or encrypt data, can lead to security blind spots.

    Organizations must take on the responsibility to stay current with continuous changes and ensure that the latest features are correctly configured to be effectively utilized while maintaining security. Automation and management tools can help in achieving these outcomes.

    Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

    Aligning security across a fragmented cloud landscape

    Managing a multi-cloud environment is like coordinating several sports teams during the Olympics, each playing a different game by their own rules but aiming for the same overall gold medal for their country.

    While using multiple cloud providers allows organizations to tap into diverse capabilities and meet a variety of business needs, it also introduces a fragmented ecosystem of tools, policies and configurations that can be difficult to manage effectively.

    Every cloud provider offers unique advantages. Some excel in data analytics, others in AI integration or compliance-ready services. However, with that specialization comes inconsistency.


    You may like

    For example, identity and access management (IAM) can differ significantly: one provider may rely on detailed, policy-based permissions, while another prioritizes role-based simplicity.

    These differences can lead to mismatches in security expectations and implementation, especially when trying to create consistent access rules across platforms.

    Rather than training staff to become experts in every provider’s native tools, which is both time-consuming and inefficient, some organizations are adopting cross-cloud security solutions.

    These third-party platforms abstract away provider-specific complexity by offering a single pane of glass to manage controls such as access permissions, configuration auditing, and data protection.

    This way, security teams can apply consistent policies, monitor configurations, and respond to threats, and thus reducing the mean time to respond (MTTR) across all environments.

    Browser-based access: convenience meets vulnerability

    The multi-cloud offers easy access from anywhere in the world that a modern company needs to offer to its employees. For a remote or hybrid workforce, browser access is essential. It’s the fastest route to cloud apps and services. It’s also simple, scalable, and always available. The issue is that browsers also offer a clear path for cyberattacks to access critical systems and sensitive data.

    Web sessions, once authenticated, often rely on session tokens and cookies to maintain access. If attackers get hold of these artifacts — whether via malware, session hijacking, or phishing — they can bypass multi-factor authentication (MFA) and impersonate legitimate users. Unlike a brute-force login attempt, this type of intrusion often goes unnoticed until damage is done.

    To tackle this, organizations are increasingly shifting toward a Zero Trust security model approach where no request is inherently trusted, even after initial authentication. Contextual risk factors like device posture, geolocation, and time of access help shape dynamic decisions about whether a session should be maintained, challenged, or revoked.

    In addition, hardening endpoint security helps secure session artifacts. Encrypting tokens at rest, enforcing auto-logouts on idle devices, and monitoring for anomalous session behavior all play a part. And of course, raising employee awareness around session hygiene, such as not leaving tabs open on shared devices, can close off simple but often exploited avenues of attack.

    The clouded sky is the limit

    Multi-cloud computing does offer many benefits to the companies that implement them. Flexibility, scalability and optimized performance to name a few. But organizations must be aware of the potential risks that come with these systems. They should investigate developing a robust security and compliance framework to ensure they are consistent across all the platforms in use.

    We’ve featured the best encryption software.

    This article was produced as part of TechRadarPro’s Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

    balance cons Multibenefit multicloud multirisk pros
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleBest Sheets for Every Bed and Budget (2025): Cotton, Linen, Bamboo
    Next Article Mouse acceleration wrecks PC gaming. Here’s how to turn it off
    techupdateadmin
    • Website

    Related Posts

    Gadgets

    The Best Wellness Devices That Fitness Pros Recommend and Use Themselves

    December 16, 2025
    Mobile

    iPhone 17 Pro Loses Fight Against the Oppo Find X9 Pro’s Camera

    December 7, 2025
    Gadgets

    The Mystery of the iPhone 17 Pro’s Missing Night Mode for Portraits

    December 5, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    NYT Strands hints and answers for Monday, August 11 (game #526)

    August 11, 202545 Views

    These 2 Cities Are Pushing Back on Data Centers. Here’s What They’re Worried About

    September 13, 202542 Views

    Today’s NYT Connections: Sports Edition Hints, Answers for Sept. 4 #346

    September 4, 202540 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Best Fitbit fitness trackers and watches in 2025

    July 9, 20250 Views

    There are still 200+ Prime Day 2025 deals you can get

    July 9, 20250 Views

    The best earbuds we’ve tested for 2025

    July 9, 20250 Views
    Our Picks

    My Health Anxiety Means I Won’t Use Apple’s or Samsung’s Smartwatches. Here’s Why

    December 22, 2025

    You can now buy the OnePlus 15 in the US and score free earbuds if you hurry

    December 22, 2025

    Today’s NYT Connections: Sports Edition Hints, Answers for Dec. 22 #455

    December 22, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact us
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    © 2026 techupdatealert. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.