Beyond the Sloan-C Five Pillars: Distance Learning Leadership in a Time of Transition (214889943)
Beyond Encryption: The 5 Pillars of Cloud Data Security
-
Upload
skyhigh-networks-cloud-security-software -
Category
Technology
-
view
3.967 -
download
0
description
Transcript of Beyond Encryption: The 5 Pillars of Cloud Data Security
Brought to you by !
Beyond Encryption:
The 5 Pillars of Cloud Data Security
With & how do you keep your corporate data secure in the cloud?
Banks employ: 1 vaults 2 vault access policies 3 guards
4 surveillance 5 armored transport
Encryption is 1 step, but like bank security there are 5 pillars of cloud data security
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
Contextual Access Control
Application Auditing
Encryption
Cloud-to-Cloud Control
Vault
Surveillance
Armored Transport
Vault Access Policy
Data Loss Prevention Guards
1 Encryption must be based on accepted industry standards for both structured and unstructured data
Hot Tip: Make sure sorting,
searching, and other end-user functionalities
still work
2 Contextual access control for corporate data in the cloud based on user, device, and geographic location
3 Application auditing of cloud usage and automatic alerts for anomalous (potentially malicious) use
Real-Life Example
A t e c h c o m p a n y t r a c k e d Salesforce.com usage and set automat ic a ler ts whenever an anomalous usage pattern was detected, such as downloading an unusual number of customer contacts in one day
4 Data loss prevention for cloud data should include blocking of disallowed actions, alerting, and encryption
Hot Tip: Perform DLP for data inline and offline and integrate with existing
DLP system
5 Extend cloud security, governance, and compliance policies to data as it moves between cloud services
Hot Tip: It’s not just about office-to-cloud and mobile-to-cloud (cloud-to-cloud
matters too)
Discover Your Cloud Risk Receive a free personalized cloud discovery & risk assessment.
http://bit.ly/TrySkyhigh
Brought to you by !
SCHEDULE RISK ASSESSMENT