Skip to main content

Enhanced Cloud Security

Information Technology Blog - - Enhanced Cloud Security - Information Technology Blog

Nearly a decade ago most of the general public were left scratching their heads when the idea of the Cloud was introduced.  They knew and liked the Internet, but what was this new thing that seemed to be just an online storage service.  Adoption was slow, even in the enterprise space, but slowly and surely the needle started to move.  Fast forward to today where companies and services like Dropbox have helped bridge the gap between the Cloud and mainstream thinking.  With mass adoption comes new challenges and the latest revolved around the growing gap in security. 

An answer has developed from within the industry in the form of CASB or Cloud Access Security Brokers.  Gartner estimates that only 5% of businesses were using some sort of CASB solution in 2015.  They see this figure rising to 85% within the next 4 years!  If you don’t think that CASB is important, then not only are you in the minority but you should pay close attention to the following.

Cloud Security Today

Saas security gap” is the term used to describe the divide between how the Cloud is utilized and how it is secured.  The good thing is that companies are actively adopting the use of cloud services and are currently uploading large amounts of data every day.  The downside is that security measures have not evolved fast enough to ensure that company data is not left exposed.  As employees utilize cloud services, security admins are left playing catch-up and often results in the blocking of a cloud service.  In turn, the employee turns to newer unblocked services, whose trustworthiness is not as high as the known services.

By implementing CASB, companies will be able to give their employees a safe and controllable path to the Cloud whilst maintaining the protection of their critical business data.

The Right CASB

Choosing the right CASB can be a bit tricky, there are dozens of solutions currently available.  However, Gartner aims to make things a bit easier by presenting four criteria to consider when looking at CASBs.

Visibility – an effective CASB must give the company insight into the data, services and activities occurring within their network.

Compliance – an effective CASB must ensure that all data transferred to the cloud is in line with company policies.

Security – it goes without saying but a CASB must enhance the general security.

Threat Assessment – an effective CASB must be able to judge the threat level of compromised accounts, malicious usages and threat events.

In Play

When deployed, CASBs act likely a loyal bloodhound that tracks any hidden cloud services that may be lurking in the background.  On top of that it identifies the data being transferred, who is doing the harvesting and the potential impact to the network.  By utilizing CASBs, companies are empowered to carefully evaluate the various cloud service offerings, and then make a security-focused decision to determine which is the best for them.  Finally, CASBs can be thought of as the ideal cloud guardian with its ability to encrypt and tokenize files, its ability to block access depending on geolocation and stop outbound requests based on data leakage policies.

Architecture choices

Gartner has once again stepped in to simplify the matter and has arranged the choice of deployment architecture down to proxies and APIs.  Proxy-based deployments are by far the more likely option for businesses, as it will give the company the ability enforce compliance. API-based solutions may be the future but it requires a lot of resources to be implemented in today’s environments, as the overwhelming majority of vendors who offer this solution do not have a robust enough platform to handle it.  This puts all the pressure on the company to purchase resources to upgrade their systems to provide suitable architecture for CASB to sit on.

CASB In the Near Future

If Gartner is to be believed, the CASB segment of the market is about to experience a massive boom in adoption and growth.  Unsurprisingly, the IT security market is already positioning itself accordingly due to the presence of dozens of companies already marketing their solutions.  So which one should you go with?  How can you identify the correct solution in which you will trust your company’s data with?  Once again, try to simplify matters to avoid being overwhelmed with all the choices.  Determine which solutions track the most attributes.  Data points, or attributes, are the bread and butter of CASBs.  The more, the better.  Then you’ll have to do a bit more homework on the actual company.  Try to find out what cloud services they currently support and what their development pipeline looks like.  The bottom line is that you are trying to make sure that the company is progressive, forward thinking and are constantly working towards a better solution.

CloudLock is an excellent example of such a company.  Not only does it have rich, easy-to-use features that puts it in the world-class and highly convenient CASB category, but it’s also entirely cloud based.  It also enables non-compliant cloud data storage platforms to be compliant once internal policies are configured. That is a big win for companies who want to utilize a particular cloud solution but are unable to due to security constraints. CloudLock can also hook into cloud data storage malware protection products such as CheckPoint’s SandBlast enabling the monitoring of cryptolocker and other ransomware risk and prevention alerts, all in one single pain of glass. Such unique traction ensures that it is not only generating revenue to evolve its services but it has a good shot at surviving the coming turmoil within the CASB segment.

Author Bio:
David Share, Director at Amazing Support

David has held positions as Operations Director and Head of IT in legal and professional firms for more than 10 years. He is a Director and co-owner of Amazing Support, a Microsoft Silver accredited and specialist Managed IT Support and IT Services company. David actively helps SME businesses receive better Managed IT Support and IT Services in the London and Hertfordshire areas. He also assists overseas companies who are looking to expand their business operations into the UK and helps with their inward investment IT process. A professional member of The Chartered Institute for IT (BCS) and an event speaker promoting business start-ups and technology awareness. Married with a son, you will often see him riding his bicycle around the Hertfordshire towns! David regularly participates in charity bike rides for the British Heart Foundation.

Originally posted 2016-08-02 17:08:46. Republished by Blog Post Promoter

The post Enhanced Cloud Security appeared first on Information Technology Blog.



Udimi - Buy Solo Ads from Information Technology Blog https://ift.tt/32w2ZXo
via IFTTT

Comments

Popular posts from this blog

9 VCs in Madrid and Barcelona discuss the COVID-19 era and look to the future

Spain’s startup ecosystem has two main hubs: Madrid and Barcelona. Most observers place Barcelona first and Madrid second, but the gap appears to close every year. Barcelona has benefitted from attracting expats in search of sun, beach and lifestyle who tend to produce more internationally minded startups. Madrid’s startups have predominantly been Spain or Latin America-focused, but have become increasingly international in nature. Although not part of this survey, we expect Valencia to join next year, as city authorities have been going all-out to attract entrepreneurs and investors. The overall Spanish ecosystem is generally less mature than those in the U.K., France, Sweden and Germany, but it has been improving at a fast clip. More recently, entrepreneurs in Spain have moved away from emulating success in pursuit of innovative technologies. Following the financial crisis, the Spanish government supported the creation of startups with the launch of FOND-ICO GLOBAL, a €1.5 billi

How to Stay Creative and Keep SEO in Mind

Information Technology Blog - - How to Stay Creative and Keep SEO in Mind - Information Technology Blog Search engine optimization (SEO) refers to customizing your website’s content to ensure that web browsers give your website a high SEO score. The sites with the highest SEO scores are featured on the search engine’s first page of search results for relevant searches.  71%  of the click-throughs happen with articles listed on the first page of results on the search engine. This means that if your website’s article is the second (or third, or fourth page), it’s less likely the search user will even see your article. You want your article to be ranking as close to the top of the first page of results as possible. In order to have a good SEO score your site’s content needs to feature keywords and relevant phrases. It must be optimized for easy navigation between pages. It also needs to be referenced via external links that drive traffic to your site. Incorporating all of these elem

Everything we know about HHS Protect, a secretive government project with Peter Thiel's Palantir that helps brief Trump's coronavirus task force

A secretive project at the US Department of Health and Human Services is working with technology companies to collect and analyze data related to the novel coronavirus .  Dubbed "HHS Protect," the effort tracks information from around the country about coronavirus case numbers, hospital capacity, and even supply chain issues.  HHS uses Palantir Technologies , a data firm cofounded by Peter Thiel, to distill that information for the White House coronavirus task force. Visit Business Insider's homepage for more stories . A secretive project at the US Department of Health and Human Services is working with technology companies to collect and analyze data related to the novel coronavirus.  Dubbed "HHS Protect," the effort includes roughly 2.5 billion pieces of data from healthcare providers, government officials, and labs around the country about coronavirus case numbers, hospital capacity, and even supply chain issues.  The goal is learn about the progress