cloud security
DESCRIPTION
C LOUD COMPUT ING I S H E R E TO STAY, AND I S ONLY G A INING MOMENTUM. WH I L E I T S B ENE F I T S A R E C L E A R , T H E R E ’ S ONE MA JOR CONC E RN: K E E P ING INFORMAT ION SA F E . HOW CAN YOU E F F E C T I V E LY S E CUR E DATA IN OR D E R TO TA K E FUL L A DVANTAG E OF T H E C LOUD ’ S B ENE F I T S ?TRANSCRIPT
CLOUD COMPUTING IS HERE TO STAY, AND IS ONLY GAINING MOMENTUM. WHILE ITS BENEFITS ARE CLEAR, THERE’S ONE MAJOR CONCERN: KEEPING INFORMATION SAFE. HOW CAN YOU EFFECTIVELY SECURE DATA IN ORDER TO TAKE FULL ADVANTAGE OF THE CLOUD’S BENEFITS?
Verizon Enterprise Solutions
A SHIFT IN THINKING.
PROTECT
DEFINE THE BUSINESS VALUE OF THE DATA SETS. CREATE A HIERARCHY.
50% OF SENSITIVE DATA
SERVES NO BUSINESS PURPOSE.MORE THAN
1
2
START WITH THE DATA.
3 CHOOSE THE RIGHT CLOUD.
How will data affect reputation, compliance,
costs, and agility?
Classify data based on risk and sensitivity levels according
to your business values.
Archive or delete unnecessary data.
Determine standards using your business-based data hierarchy.
Choose the cloud provider with the expertise and inherent security that will help you meet those standards.
FIND THE CLOUD ENVIRONMENT THAT FITS YOUR ENTERPRISE BASED ON YOUR DATA.
ADDRESS THE USERS.INVENTORY YOUR USERS (employees, contractors, partners) AND ASSIGN THEM ROLES.
DESIGNATE USER ACCESS BASED ON ROLES AND A NEED-TO-KNOW BASIS.
BRING IT ALL TOGETHER.
6
ENSURE USERSHAVE LEAST-PRIVILEGE ACCESS.
MIGRATE DATATO THE CLOUD.
SECURE AND FLEXIBLEMIGRATION SOLUTIONS.
FOR BEST RESULTS,ENGAGE A CLOUD PROVIDER WHO OFFERS
SECURITY IS OUR BUSINESS.
5
DETERMINE YOUR CONTROLS.4
SO, WHAT’S NEXT?THINK BROADER. Look beyond IT and think about your business as a whole to define data classifications. Data-centric security will free your company to confidently take advantage of all that cloud computing can offer you. And more.
VALIDATE AND MONITOR.
WIT
H A
DATA
-CEN
TRIC
PERSPECTIVE, BUSINESSES CAN ACHIEVE GREATER RESULTS.
GREATER AGILITY AND ASSET OPTIMIZATION.
RIGHT LEVEL OF
CONTROL STRENGTH
TAKE A DATA-CENTRICAPPROACH TO ENSURE THE
SIX STEPS TO A SECURE CLOUD STRATEGY
USING DATA-CENTRIC SECURITY MANAGEMENT
TO PROTECT THE DATA,
WHAT’S AROUND IT.
IDENTIFY AND IMPLEMENT CONTROLS (technical, administrative, physical) BASED ON YOUR DATA STANDARDS AND CLOUD FEASIBILITIES.
CONTINUOUS MONITORING WILL VERIFY CONTROLS ARE PROTECTING ASSETS AS INTENDED.
VERIZON HAS ANALYZED
INVOLVING OVER 1 BILLION COMPROMISED RECORDS. 2,000
SO IS THE CLOUD.WHEN IT COMES TO SECURITY AND CLOUD, VERIZON LEADS THE WAY. IN FACT, LEADING ANALYST FIRM GARTNER, INC., HAS POSITIONED VERIZON IN THE LEADER QUADRANT IN:
VERIZON HAS THE EXPERTISE TO OFFER A TRULY SECURE CLOUD—FROM MIGRATING DATA TO PREVENTING, DETECTING AND RESPONDING TO THREATS.
verizon.com/enterprise/securityverizon.com/enterprise/cloud
The Magic Quadrant is copyrighted by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner’s analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the “Leaders” quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
Gartner: Magic Quadrant for Hosting, by Lydia Leong and Ted Chamberlin, March 5, 2012Gartner: Magic Quadrant for Public Cloud Infrastructure as a Service, by Lydia Leong and Ted Chamberlin, December 8, 2011Gartner: Magic Quadrant for MSSPs, North America, by Kelly Kavanagh and John Pescatore, November 28, 2011
© 2012 Verizon. All Rights Reserved.
OLD MODELIT Drives
Data Security
NEW MODELBusiness
Priorities Drive Data Security
SECURE YOUR DATA BY CHANGING THE GAME. Confidence is vital when dealing with data security, and the secret to a secure cloud is taking a top-down approach. First, assess your core business priorities to determine cloud security standards. Then, move on to technology and procedures. And finally, choose the right cloud provider—it does matter who you choose. By thinking of your business as a whole, you’ve created a data-centric model you can trust.
REDUCECOSTS
INCREASEAGILITY
MAINTAINCOMPLIANCE
INCREASEREPUTATION
INFRASTRUCTURE
APPS USERS
NO BREACHES
HIPAA, GLBA,PCI DSS
MORE EFFICIENTMAINTENANCE
EASIER ACCESS
U N L O C K I N G T H E S E C R E T TO A
SECURE CLOUD
MAGIC QUADRANT FOR MANAGED HOSTING, 2012
MAGIC QUADRANT FOR PUBLIC CLOUD
INFRASTRUCTURE AS A SERVICE, 2011
MAGIC QUADRANT FOR MANAGED SECURITY
SERVICES PROVIDER (MSSPS), NORTH AMERICA, 2011
DATA BREACHES