Security doesn’t have to be an afterthought in the Cloud

Cloud computing can be loosely defined as a way to conveniently connect to an on-demand network access to shared computing resources (i.e., servers, storage, applications, services, etc.) The past several years have shown an increase in the use of cloud services for a variety of purposes, notably data storage, file sharing and collaboration, as well as applications and services. Whether your organization is still using on-premise systems or fully integrated into the cloud already, the cloud is here to stay. The cloud can be a great resource, and can be adjusted quickly and easily to accommodate changes in demand, as well as lower IT costs. While organizations are keen to reap the benefits the cloud offers, many fall shy of adoption because of security issues. Security of the cloud, and the sensitive data that resides in it, are often an afterthought. Sensitive data must be protected at all stages of its lifecycle, no matter how much it moves around. Below are four webinars and an ebook that address the issue of security in the cloud.

Keeping your Data and Applications Safe from the CSA Top Threats

The cloud presents all kinds of opportunities for today’s enterprise, from anywhere access to anything-as-a-service. Cloud computing imposes significant security risks on the corporation, network, IT and the day to day activities of the business. How do enterprises maintain compliance, control and ownership of sensitive data as they move from the physical environment to a cloud world? The distribution of data onto devices may not be completely controlled by the data owner, and there is liability confusion as cloud service providers take on a larger role. As a result CIOs are looking at technologies and strategies to assure security while delivering the required services.

By thinking of security as an enabler, instead of an obstacle for cloud adoption, businesses can easily protect and maintain control of data across multi-cloud environments while maximizing the business potential of the cloud. Discover how to address the key security challenges businesses are facing as they move to the cloud.

View the webinar

DevilinDetailsEnterprise Risk – Taming the Devil in the Data

The growth of data is increasing exponentially, organizations are suffering from volatility across all risk types, and need to re-think their enterprise risk strategy. At the heart of this strategy is the need for a single consistent view of the data, and a data-centric, multi-platform approach to secure valuable customer and corporate data assets, end-to-end.

Join our experts as they discuss a new generation of risk technologies which use a holistic approach to data management and address the risks inherent when data is at rest in storage, in motion on the network, and in use in analytics and business processes.

View the webinar

Build a Data-centric Strategy & Roadmap

Data is the lifeblood of just about every organization and functional area today. As businesses struggle to cope with the data flood, it is even more critical to focus on data as an asset that directly supports business imperatives. Unfortunately, the results of these efforts frequently fall far below expectations due to haphazard approaches. Overall, poor organizational data management capabilities are the root cause of many of these failures. This webinar covers three lessons (illustrated by examples), which will help businesses to establish realistic expectations, and help demonstrate the value of this process to both internal and external decision makers.

Register here:

Bridging the Cloud with On-Prem Systems

On-premise systems are increasingly tethered to cloud-based platforms. With a mountain of sensitive data flowing back and forth daily, a new era of durable, secure data delivery systems must evolve. This “Briefing Room” webinar  discusses the evolution of enterprise cloud adoption, why aging infrastructure cannot handle the stress of today’s workloads, and how to address secure data movement to and from the cloud. Discover new techniques around data privacy and protection that can give cloud-ready organizations greater peace of mind.

Register here:

Cloud Access Security Brokers (CASBs)

Another way to think about security in the cloud is the use of CASBs. CASBs, or cloud access security brokers, sits between in an in-house application and a cloud application. CASBs contain technologies that help encrypt or otherwise handle data to make it more secure in cloud environments.

CASBs strengthen security in more ways than the name implies. Certainly they help companies control access to cloud applications. But they also provide visibility into how people and devices interact with applications and data. They improve threat protection by alerting an admin to risky behaviors, policy violations, and deviations from normal usage of cloud applications. They also help enforce compliance with industry regulations. They can even remove vulnerabilities and stop threats in their tracks.

Jon Friedman and Mark Bouchard have written a “Definitive Guide to Cloud Access Security Brokers” and it can be downloaded for free.

The underlying thread in these webinars is that the right cloud data protection strategy requires a data-centric approach, protecting data-at-rest, in-motion and in-use, and is extensible and adaptable across multiple applications and systems in the cloud.

Leave a Reply

Your email address will not be published. Required fields are marked *