123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Cloud Encryption Frustrates Government Surveillance

Profile Picture
By Author: skyhighnetworks
Total Articles: 54
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

For Jeremy Lindhoff, one NSA powerpoint slide in a recent article based on materials released by whistleblower Edward Snowden caught his eye. “The diagram shows the NSA intercepting data between our datacenters, without approaching us with a court order to discover our customer’s information.”

His operations team at a large US cloud provider was tasked with identifying ways to protect their customer’s data from what they saw as rogue surveillance. Cloud Encryption, that is encrypting data as it travels between the company’s datacenters, was decided to solve the surveillance problems.

Inside the firewall, data is protected by encryption and data loss prevention policies. With more corporate data moving to the cloud, the network edge is also moving from the firewall into the cloud. Companies need more than a firewall, they need a virtual “cloud edge” to protect data wherever it goes.

The cloud encryption schemes not only protect data as it transits between datacenters, they also apply it to data stored in server farms. That way, ...
... if an attacker were to breach the network defenses and gain access to the information, it would be inaccessible and unreadable without the encryption keys to decrypt the information. In a sense, encryption is an additional layer of protection, a final defense against security breaches or third party surveillance of data as it moves around the Internet.

Their solution does not distinguish between an attacker and any unauthorized third party. “We liked the solution because it doesn’t matter if the intruder is a government agency without permission to view the data, or a cyber criminal, the data is always protected no matter if it’s stored or being moved between datacenters or between a datacenter and the customer,” said Lindhoff.

“Ultimately, every cloud provider will need to embrace a level of security that meets the needs of their customers in order to address customer fears,” says Luke Abbott, an information security analyst and advisor to corporate clients investing in technology. According to Abbott, cloud encryption is the ideal defense because it prevents surveillance, security breaches, and maintains the end user experience.

Author:
Skyhigh Networks, the Cloud Security company, enables companies to embrace Cloud Services with appropriate levels of security, compliance, and governance while lowering overall risk and cost. With customers in financial services, healthcare, high technology, media, manufacturing, and legal verticals, the company was a finalist for the RSA Conference 2013 Most Innovative Company award and was recently named a "Cool Vendor" by Gartner, Inc. Headquartered in Cupertino, Calif., Skyhigh Networks is led by an experienced team and is venture-backed by Greylock Partners and Sequoia Capital. For more information on Cloud Encryption, visit us at http://www.skyhighnetworks.com/cloud-encryption/ or follow us on Twitter@skyhighnetworks.

Total Views: 435Word Count: 446See All articles From Author

Add Comment

Computers Articles

1. E-commerce Holiday Price Scraping Insight For Festive Discounts
Author: Den Rediant

2. Google Maps Data Scraping For Qsr Analytics For Location Strategies
Author: Den Rediant

3. Food Delivery Trends Via Scraped Data For Consumer Analysis
Author: Den Rediant

4. Airline Dynamic Price Data Scraping For Modern Travel Analytics
Author: Den Rediant

5. One-click Ost To Pst Converter Software – Fast & Secure Conversion
Author: vSoftware

6. Online Medicine Delivery App: Benefits, Features & Development Cost
Author: Simon Harris

7. End-to-end Ios Application Development Services For Complete App Solutions
Author: web panel solutions

8. Singapore Virtual Employee Services – No Hidden Costs
Author: usha

9. Flexible Virtual Office Plans Singapore – Cancel Anytime
Author: usha

10. How Ai Chatbots Are Reshaping Mobile App User Support?
Author: Scott shriner

11. The Ultimate Guide To Scholarship Management Software Solutions: Streamlining Scholarship Processes For Success
Author: Engage2serve

12. Top Features Of The Epson Tm-t82iii Pos Printer
Author: prime pos

13. Global Dc Fast Charging Power Module Market Forecast 2025-2035: Trends, Technologies, And Growth Opportunities
Author: Shreya

14. E-commerce Sentiment Analysis Data Of Gcc Countries
Author: Den Rediant

15. Real-time Liquor Market Data Scraping For Alcohol Pricing Analysis
Author: Den Rediant

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: