123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Cloud Encryption Frustrates Government Surveillance

Profile Picture
By Author: skyhighnetworks
Total Articles: 54
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

For Jeremy Lindhoff, one NSA powerpoint slide in a recent article based on materials released by whistleblower Edward Snowden caught his eye. “The diagram shows the NSA intercepting data between our datacenters, without approaching us with a court order to discover our customer’s information.”

His operations team at a large US cloud provider was tasked with identifying ways to protect their customer’s data from what they saw as rogue surveillance. Cloud Encryption, that is encrypting data as it travels between the company’s datacenters, was decided to solve the surveillance problems.

Inside the firewall, data is protected by encryption and data loss prevention policies. With more corporate data moving to the cloud, the network edge is also moving from the firewall into the cloud. Companies need more than a firewall, they need a virtual “cloud edge” to protect data wherever it goes.

The cloud encryption schemes not only protect data as it transits between datacenters, they also apply it to data stored in server farms. That way, ...
... if an attacker were to breach the network defenses and gain access to the information, it would be inaccessible and unreadable without the encryption keys to decrypt the information. In a sense, encryption is an additional layer of protection, a final defense against security breaches or third party surveillance of data as it moves around the Internet.

Their solution does not distinguish between an attacker and any unauthorized third party. “We liked the solution because it doesn’t matter if the intruder is a government agency without permission to view the data, or a cyber criminal, the data is always protected no matter if it’s stored or being moved between datacenters or between a datacenter and the customer,” said Lindhoff.

“Ultimately, every cloud provider will need to embrace a level of security that meets the needs of their customers in order to address customer fears,” says Luke Abbott, an information security analyst and advisor to corporate clients investing in technology. According to Abbott, cloud encryption is the ideal defense because it prevents surveillance, security breaches, and maintains the end user experience.

Author:
Skyhigh Networks, the Cloud Security company, enables companies to embrace Cloud Services with appropriate levels of security, compliance, and governance while lowering overall risk and cost. With customers in financial services, healthcare, high technology, media, manufacturing, and legal verticals, the company was a finalist for the RSA Conference 2013 Most Innovative Company award and was recently named a "Cool Vendor" by Gartner, Inc. Headquartered in Cupertino, Calif., Skyhigh Networks is led by an experienced team and is venture-backed by Greylock Partners and Sequoia Capital. For more information on Cloud Encryption, visit us at http://www.skyhighnetworks.com/cloud-encryption/ or follow us on Twitter@skyhighnetworks.

Total Views: 398Word Count: 446See All articles From Author

Add Comment

Computers Articles

1. Extract Trader Joes Grocery Store Location Data For Insights
Author: FoodDataScraper

2. Publix Grocery Data Scraping Services For Real-time Tracking
Author: Actowiz Solutions

3. Scraping Food Delivery Data From Menulog For Business Intelligence
Author: Food Data Scrape

4. Why Transportation Companies Need Embedded Bi Tools – Helical Insight
Author: Vhelical

5. Time Attendance System Singapore | 1 Sgd Mobile Attendance Easy Setup
Author: guard

6. Employee Gps Mobile Time Attendance | 1 Sgd Per Month Payroll Integration
Author: guard

7. Gps Nfc/qr Guard Tour Patrol – Free Payroll – 30sgd Monthly Subscription
Author: guard

8. Elearning Security Officers & Free Payroll – 30sgd Monthly Subscription
Author: guard

9. Guard Tour System & Security Patrol – 30sgd Per Month Plan
Author: guard

10. Top Benefits You Gain When You Hire Oracle Sql Developer For Efficient Data Management
Author: Stellanova GlobalTech

11. Discover How Microsoft Purview Compliance Manager Simplifies Cmmc Compliance For Gcc High Environment
Author: ECF Data

12. Scraping Food Ingredient Info From Sydney, Australia, For Insights
Author: Food Data Scrape

13. Best Website Design Perlis | Rm499 Unlimited Pages – Creative Solutions
Author: mobiwork

14. Rm499 Unlimited Pages Custom Web Application Development | Quality Guaranteed
Author: mobiwork

15. Flexible Work Arrangement & Free Payroll – 1sgd Monthly Pricing
Author: mobiwork

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: