backlink free directory. site rank » Trusted SEO Web Directory » Ethical SEO » Better Traffic » Higher Sales




Top Hits       Articles & Tutorials       WEB SEO Directory Statistics       Latest Websites       Suggest Article  

Article Home » Computers » Security

Beyond Encryption: The 5 Pillars of Cloud Data Security

Submitted on: Fri, 20 Sep 2013 07:53:21Views: 408
Given the recent influx of cyber-security attacks and the hubbub about the National Security Agency’s PRISM program, there is lot of talk about the importance of encryption to protect corporate data in the cloud. (PRISM is a clandestine data mining operation authorized by the U.S. government in which data stored or passing over the Internet can be collected without the owner’s knowledge or consent.)

While it’s true that encryption helps to keep data private, encryption is just 1 of 5 capabilities needed to completely secure corporate data in the cloud. Allow me to use an analogy in the physical world to explain what I mean.

Banks are an ideal example of the use of layers of security to protect important assets. A bank branch has a vault in which it stores cash and other valuables. Having a vault is essential, but on its own it’s not enough to fully protect the riches within.

The bank also has policies to guide who can access the vault; what identification methods are required to verify that an employee or customer has the right to access the vault; the hours when the vault can be legitimately accessed; and so on.

The bank also needs surveillance cameras so that in event of a breach, the authorities can play back the recording to understand exactly what happened, and when. Stationed near the vault, the bank has a security guard for additional protection against threats and to deter thieves. And finally, the bank employs armored vans to move cash around from the bank to stores, to off-premise ATMs, and to other banks.

Similarly, when we talk about protecting corporate data in the cloud, you need more than just a point encryption solution; you need comprehensive approach to cloud data security.

Let’s start with encryption—a technology that has been around for decades but is now more important than ever as threats from all angles are increasing. The encryption solution you use on your data needs to be standards-based and it must support both structured and unstructured data. For structured data, the encryption technology must not break any application functionality (such as searching or sorting). This latter requirement is quite important; if you can’t search on data in comments field in because it is obscured through encryption, you’ve defeated the value of using the application.

So Encryption is 1 of 5 critical security capabilities. What are the other 4?

You need Data Loss Prevention Tools to make sure that PII and PHI data is not moving to or through the cloud in the clear in violation of PCI, HIPAA and HITECH regulations.

You need contextual access control so you can ensure secure access to the data based on who the users are, what devices they are using, and what geographic locations they are in.

You need application auditing so you can identify who has accessed which data and alert based on anomalous use. This is critical as most SaaS applications don’t provide audit trail of “read” operations to understand what exactly happened when an incident occurred.

And finally, you need the ability to easily but consistently enforce these policies for cloud-to-cloud use cases.

This last need is an up-and-coming requirement that companies are just beginning to realize, but it will grow more important as companies use more cloud-based applications. Let me give you an example.

Let’s say a company uses Jive for business social and Box for cloud storage of documents posted in Jive. When Jason, an employee in my Sales department, posts a blog post on a competitor with a detailed attachment, Jive automatically stores the document in Box. In this cloud-to-cloud scenario, I need to make sure that my security, compliance and governance policies are consistently enforced across both, Jive and Box.

Encryption as a means of data security is a good start, but not sufficient. Make sure you bolster it with the other critical security capabilities for a more complete cloud data security strategy. To learn more check out our Beyond Encryption Slideshare.

Skyhigh Networks, the cloud access security company, enables companies to embrace Cloud Services with appropriate levels of security, compliance, and governance while lowering overall risk and cost. With customers in financial services, healthcare, high technology, media, manufacturing, Data Loss Prevention Tools and legal verticals, the company was a finalist for the RSA Conference 2013 Most Innovative Company award and was recently named a "Cool Vendor" by Gartner, Inc. Headquartered in Cupertino, Calif., Skyhigh Networks is led by an experienced team and is venture-backed by Greylock Partners and Sequoia Capital. For more information, visit us at or follow us on Twitter @skyhighnetworks.

» Latest news on : Security
» Google News for: Beyond Encryption: The 5 Pillars of Cloud Data Security

Lates tweets about Computers / Security

From @iwah2 on Fri Nov 16 07:48:07 EST 2018
RT @gjmorley: サイバーセキュリティー担当大臣にも関わらず「PCを触らない」「USBが何か知らない」日本の政治家に世界中が騒然 - GIGAZINE ☆サイバーセキュリティ対策を行う政府機関のトップの存在こそが最大のセ…
From @SouthrnCB on Fri Nov 16 07:48:07 EST 2018
RT @kylegriffin1: Julian Assange has been charged under seal, prosecutors inadvertently revealed in a recently unsealed court filing — a de…
From @asoldiersvoice on Fri Nov 16 07:48:07 EST 2018
RT @thedailybeast: Betsy DeVos’ "round-the-clock" security costing taxpayers $20m, says report
From @smallwood0311 on Fri Nov 16 07:48:06 EST 2018
RT @washingtonpost: WikiLeaks’s Julian Assange hit with U.S. charges, court filing reveals
From @saeedblessed on Fri Nov 16 07:48:06 EST 2018
RT @ArifAlvi: My continuous struggle to keep security but reduce protocol that inconveniences people. Am at Lahore airport and there are 32…
From @cui4ying1 on Fri Nov 16 07:48:05 EST 2018
RT @CybershotTad: 桜田大臣の醜態が英ガーディアン紙でも報じられている。 「PCもUSBも知らない人間がセキュリティ担当」 「確かに最強のセキュリティ担当だろう」 「東京五輪まで2年もないのに理解していない」 「事前通告なし」 「1500円」 書ききれない…。恥…
From @royalebenco on Fri Nov 16 07:48:04 EST 2018
RT @SophyBest2: Kano State Governor, remember him? The principal actor of Gandollar movie. He just donated N5bn and 200 Buses to @MBuhari's…
From @donna_freitag on Fri Nov 16 07:48:04 EST 2018
RT @LorenRaeDeJ: Civilian expertise and experience - vital to healthy national security - is tough to build and replace today. It is tremen…
From @brewjaz on Fri Nov 16 07:48:03 EST 2018
RT @dbongino: Job Security? Lindsey Graham says Acting AG Won't Fire Mueller
From @tsbigler on Fri Nov 16 07:48:03 EST 2018
RT @MollyJongFast: The greatest scam since Amway.
Copyright © 2008 - 2011     VIC Consulting - WEB Development, website promotion & SEO services
Autos neuves et usagées | Ottawa used cars, furniture & real estate | Toronto Computers Security
Follow webseodirectory on Twitter