beyond encryption: the 5 pillars of cloud data security
DESCRIPTION
Your data is valuable. Between hackers and PRISM, encryption of cloud data is the talk of enterprise IT departments. But there's more to cloud security than just encryption. Learn the 5 pillars of cloud data security to make your data in the cloud as secure as money in a bank vault.TRANSCRIPT
Brought to you by !
Beyond Encryption:
The 5 Pillars of Cloud Data Security
With & how do you keep your corporate data secure in the cloud?
Banks employ: 1 vaults 2 vault access policies 3 guards
4 surveillance 5 armored transport
Encryption is 1 step, but like bank security there are 5 pillars of cloud data security
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
Contextual Access Control
Application Auditing
Encryption
Cloud-to-Cloud Control
Vault
Surveillance
Armored Transport
Vault Access Policy
Data Loss Prevention Guards
1 Encryption must be based on accepted industry standards for both structured and unstructured data
Hot Tip: Make sure sorting,
searching, and other end-user functionalities
still work
2 Contextual access control for corporate data in the cloud based on user, device, and geographic location
3 Application auditing of cloud usage and automatic alerts for anomalous (potentially malicious) use
Real-Life Example
A t e c h c o m p a n y t r a c k e d Salesforce.com usage and set automat ic a ler ts whenever an anomalous usage pattern was detected, such as downloading an unusual number of customer contacts in one day
4 Data loss prevention for cloud data should include blocking of disallowed actions, alerting, and encryption
Hot Tip: Perform DLP for data inline and offline and integrate with existing
DLP system
5 Extend cloud security, governance, and compliance policies to data as it moves between cloud services
Hot Tip: It’s not just about office-to-cloud and mobile-to-cloud (cloud-to-cloud
matters too)
Discover Your Cloud Risk Receive a free personalized cloud discovery & risk assessment.
http://bit.ly/TrySkyhigh
Brought to you by !
SCHEDULE RISK ASSESSMENT