123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Toward More Enterprise-ready Cloud Applications

Profile Picture
By Author: skyhigh networks
Total Articles: 54
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

The shift from private datacenters to shareable “cloud” computing is here to stay. Analyst firm IDC estimates the market for public cloud services grew to $47.4 billion in 2013. By 2016 cloud is expected to reach half of all IT spending according to research firm Gartner.
Cloud adoption is partly driven by IT organizations making major purchases for CRM, ERP, and HR software, but there is a grass roots component as well. "Employees are using cloud services almost with abandon, without assessing the risk of those services," according to Skyhigh Networks CEO Rajiv Gupta.

With business critical processes and data moving to third parties, companies are understandably concerned about security. Many organizations assume that cloud providers are responsible for data security. But that’s not necessarily true, according to major cloud providers like Amazon, Salesforce, and Microsoft. Data security is a client responsibility in many cases.

The security expectations gap could be cleared up if more companies had conversations with cloud providers about security. Also, don’t assume that things that are missing ...
... from the providers’ terms and conditions are automatically taken care of. With thousands of cloud services, IT security departments also need new ways of rapidly assessing the Cloud Security service.
Even for approved services, IT has very limited visibility into how the application is being used and what data is being uploaded. Security teams are looking for the robust audit trails they expect from on-premise enterprise software, the kind that record all adds, modifications, and deletes of file or data. Traditional enterprise software tracks these actions, along with admin access which can be used to prove compliance to third parties and investigate and security breaches.

To reduce the risk of security breaches in the cloud, companies are increasingly looking toward encryption. Most cloud providers encrypt data in transit between the client and the provider, but fewer providers encrypt data at rest in their own datacenter. Companies are looking for end-to-end encryption that protects data before it leaves the premises with encryption keys that are wholly controlled by the organization. This can limit the risk of third party disclosure such as the kind that happens when cloud providers respond to a subpoena.

Companies also need the ability to automatically identify anomalous activity that indicates a security breach or compromised account. These events often take the form of unusual usage outside the normal volume of data or number of transactions a user account generates in a certain period of time. In one recent case, a company discovered a Twitter account sending over a million tweets per day. After investigating they discovered there was malware exfiltrating data 140 character at a time to an unknown third party.

Finally, when data moves to the cloud companies are looking for assurances about how their data is treated. Does the cloud provider or the customer own the data uploaded to the service? How long is the data retained if the client deletes the data? What happens to the data if the cloud provider goes out of business? These are all key questions enterprises are looking to answer to increase confidence in the cloud.

Skyhigh Networks, the Cloud Security Services company, enables companies to embrace Cloud Security Services with appropriate levels of security, compliance, and governance while lowering overall risk and cost. With customers in financial services, healthcare, high technology, media, manufacturing, and legal verticals, the company was a finalist for the RSA Conference 2013 Most Innovative Company award and was recently named a "Cool Vendor" by Gartner, Inc. Headquartered in Cupertino, Calif., Skyhigh Networks is led by an experienced team and is venture-backed by Greylock Partners and Sequoia Capital. For more information, visit us at http://www.skyhighnetworks.com/ or follow us on Twitter@skyhighnetworks.

Total Views: 435Word Count: 619See All articles From Author

Add Comment

Computers Articles

1. Extract Trader Joes Grocery Store Location Data For Insights
Author: FoodDataScraper

2. Publix Grocery Data Scraping Services For Real-time Tracking
Author: Actowiz Solutions

3. Scraping Food Delivery Data From Menulog For Business Intelligence
Author: Food Data Scrape

4. Why Transportation Companies Need Embedded Bi Tools – Helical Insight
Author: Vhelical

5. Time Attendance System Singapore | 1 Sgd Mobile Attendance Easy Setup
Author: guard

6. Employee Gps Mobile Time Attendance | 1 Sgd Per Month Payroll Integration
Author: guard

7. Gps Nfc/qr Guard Tour Patrol – Free Payroll – 30sgd Monthly Subscription
Author: guard

8. Elearning Security Officers & Free Payroll – 30sgd Monthly Subscription
Author: guard

9. Guard Tour System & Security Patrol – 30sgd Per Month Plan
Author: guard

10. Top Benefits You Gain When You Hire Oracle Sql Developer For Efficient Data Management
Author: Stellanova GlobalTech

11. Discover How Microsoft Purview Compliance Manager Simplifies Cmmc Compliance For Gcc High Environment
Author: ECF Data

12. Scraping Food Ingredient Info From Sydney, Australia, For Insights
Author: Food Data Scrape

13. Best Website Design Perlis | Rm499 Unlimited Pages – Creative Solutions
Author: mobiwork

14. Rm499 Unlimited Pages Custom Web Application Development | Quality Guaranteed
Author: mobiwork

15. Flexible Work Arrangement & Free Payroll – 1sgd Monthly Pricing
Author: mobiwork

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: