backlink free directory. site rank

TrustDIR.org » Trusted SEO Web Directory » Ethical SEO » Better Traffic » Higher Sales

 

 

 

Top Hits       Articles & Tutorials       WEB SEO Directory Statistics       Latest Websites       Suggest Article  

Article Home » Computers » Security



Enabling Cloud Service Adoption Through Frictionless Corporate Data Protection

Submitted on: Fri, 06 Sep 2013 09:36:13Views: 407
In a casual discussion last weekend my teenage daughter observed that human evolution is slowing down because technology allows us to compensate in areas in which nature otherwise would have extinguished those genes. We can discuss the merits of that observation some other time but it got me thinking about the converse: evolution that is accelerated by technology. Whether you call it evolution or not, we are getting less patient with friction in our use of technology. We want our choice and we want it now, and the myriad of choices is making it more challenging to define the new baseline. Let me elaborate.

In the consumer IT world we click on a link, perhaps create an account, and we start to use Box, GDrive, Dropbox, and a host of other cloud services (in the enterprise IT world we will want to use Salesforce, Jive, ServiceNow, and host of other cloud services too). No friction. In the worst case we may have to pull out our credit card, but we don’t have to fiddle around with downloads, agents, PAC files, VPN clients, backhauls and other similar sources of frustration which cause friction and impede our experience using the service. Then why put up with this friction when using these services in the enterprise? Because enterprise IT organizations require it to reduce risk and maintain security, compliance, and governance. They have no other way to enable you to use the cloud services you care about while protecting corporate data going to and from the cloud service.

Let’s look at the world from the point of view of the enterprise IT organization. IT organizations are as uninterested in adding friction to your experience as you are. In fact, they too want to enable you to use the cloud services you care about while protecting data and with a similar experience where they can swipe a credit card and go. Just as you don’t want downloads and agents, they too would prefer not to buy appliances, install them, operate them, manage them, upgrade them, support them, etc. They too want to avoid friction, but they have no other way to protect corporate data while you use the Cloud Security Services you care about.

Now let’s look at the evolutionary aspect of choice – there has been chapter and verse written about choice which is manifest in terms like consumerization of IT, Bring Your Own Device (BYOD), Bring Your Own Cloud (BYOC), etc. In some sense choice is related to friction: I want to choose the IT environment that makes me most efficient. Or put differently, I want to choose the IT environment that offers me the least friction in getting my job done.

We know mobile is here to stay (and grow) – the days of being chained to our desks is dark history. We know cloud is here to stay (and grow) – the days of requiring our employees to only use applications that are hosted and operated by enterprise IT is also history. The new frontier for enterprise IT is the quest to enable the obvious mobile-to-cloud interaction while protecting corporate data and without introducing any friction.

Now to protect corporate data, enterprise IT Security and Risk organizations need to enforce policies like data encryption and tokenization, data loss prevention, and access control based on the context of the access. Common aspects of context include who is making the access, what service is she accessing, what data is in the service, from what device is the access initiated, and from which location. However, modern threat vectors also require us to understand if the access is somehow anomalous which may indicate a data breach and then take corrective action – encrypt, tokenize, block, alert – based on that analysis.

But with so much simultaneous churn in the number of devices and services being used by our employees today, it is becoming a challenge to determine what is normal behavior and therefore what is anomalous behavior that needs further inspection or corrective action.

Skyhigh Networks, the cloud access security company, enables companies to embrace Cloud Data Security services with appropriate levels of Security, compliance, and governance while lowering overall risk and cost. we brought to market Skyhigh Secure, a massive leap forward in enabling the Cloud Security Services, the company was a finalist for the RSA Conference 2013 cost Innovative Company award and was recently named a “Cool Vendor” by Gartner, Inc. Headquartered in Cupertino, Calif., Skyhigh Networks is led by an experienced team and is venture-backed by Greylock Partners and Sequoia Capital. For more information, visit us at http://www.skyhighnetworks.com or follow us on Twitter @skyhighnetworks.

» Latest news on : Security
» Google News for: Enabling Cloud Service Adoption Through Frictionless Corporate Data Protection

Lates tweets about Computers / Security

From @CharZarBar on Tue Aug 21 04:11:46 EDT 2018
RT @thomaskaine5: Seniors Spread The Word; Please pass the word at your senior groups that REPUBLICANS PLAN TO CUT MEDICARE and SOCIAL SEC…
From @IreneKenneth3 on Tue Aug 21 04:11:45 EDT 2018
RT @SenSchumer: What’s next? Will President Trump decide to revoke the security clearances of everyone working for Special Counsel Mueller…
From @richoneill282 on Tue Aug 21 04:11:45 EDT 2018
RT @Rachael_Swindon: 6 years ago the Tories gave millionaires & high earners a 5% income tax cut, which has cost our economy £11 billion.…
From @19Pam56 on Tue Aug 21 04:11:44 EDT 2018
RT @JordanSchachtel: There is an entire DC industry made up of former intel officials who utilize their security clearance to lock up advis…
From @Jzini9 on Tue Aug 21 04:11:44 EDT 2018
@realDonaldTrump @PARISDENNARD @seanhannity #Dotard Yes, your security clearance should be revoked.
From @Jinxy_Minxy on Tue Aug 21 04:11:43 EDT 2018
RT @jdawsey1: What many in the intel community fear: TV appearances and positions on the president as a factor in security clearances. http…
From @betteranfiction on Tue Aug 21 04:11:43 EDT 2018
@MAGA_Len @bgood12345 How was she able 2always have a recorder or video recorder taping while working w/o getting c… https://t.co/R8pKyVQxGc
From @StayFitOrElse77 on Tue Aug 21 04:11:43 EDT 2018
RT @AngelOfficial: 22 Jihad Camps Inside the US? Here's the Disturbing Islamic Prophecy Behind Them https://t.co/sTOAEao1WC @CBNNews @C…
From @AdemHusidic on Tue Aug 21 04:11:41 EDT 2018
RT @KarenMMiddleton: Expect a 2nd leadership ballot very quickly. Dutton came within 7 votes of victory without any chance to lobby officia…
From @animalmgs on Tue Aug 21 04:11:41 EDT 2018
RT @FoxNews: .@RandPaul: "I think John Brennan's actually a national security risk to the country and we are safer because his security cle…
Copyright © 2008 - 2011     VIC Consulting - WEB Development, website promotion & SEO services
Autos neuves et usagées | Ottawa used cars, furniture & real estate | Toronto Computers Security
Follow webseodirectory on Twitter