123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Cloud Security Cup: Usa Vs. Europe (spoiler – It’s Not A 0-0 Draw)

Profile Picture
By Author: Skyhighnetworks
Total Articles: 54
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

With the World cup in full swing, one cannot help but compare the US to our neighbors around the world. The event begs it. We see our skills, our style, our strategy and our fans all juxtaposed with more established soccer powers from around the globe.
And, I have to admit, some things are just better in Europe: Soccer for one. If pressed, I’ll concede fashion, sports cars, and public transportation as well. But what about Cloud Security?

Privacy: Europe 1 – US 0
Given the concerns around the US Patriot Act and US government-issued blind subpoenas, there is a growing school of thought encouraging IT shops to use cloud services that are headquartered in privacy-friendly countries (i.e. EU).

Why? Well, under the US Patriot Act, US intelligence agencies are permitted to access data owned by non-US citizens stored on clouds hosted by US companies.

This perspective has been championed by European IT leaders such as John Finch, CIO of the Bank of England. He’s said, “You need to think about where Cloud companies are domiciled. Even if that well-known cloud provider says ‘don’t ...
... worry’, if they’re an American company, your data is linked to the American Patriot Act. That means if the FBI or CIA want it, they’ve got it. Think about what you’re giving and when.”

Security: US 1 – Europe 0
However, the data tells a different story. While privacy is important, one cannot ignore data security. Based on statistics from Skyhigh’s Cloud Registry, which uses a security framework developed in conjunction with the Cloud Security Alliance (CSA), 9% of cloud services headquartered in the EU are high risk, compared to only 5% of cloud services headquartered in the US. So, while EU-based cloud services provide some protection from the US Patriot Act, they do expose organizations to greater security risks.

WWJKD (What Would Jürgen Klinsmann Do)?
So, if using US providers isn’t the answer, what is? Encryption is one effective solution that is gaining traction for many cloud consumers. It’s important that your cloud provider provide encryption for data not just in transit, but at rest as well. Equally important, especially for European customers concerned with the privacy of their data hosted by US cloud providers, is encryption key management. If your cloud provider owns the encryption keys, the US government can subpoena your cloud provider, forcing them to de-crypt and share your data. Further, they can issue a gag order to your cloud service provider so this is done without your knowledge. In order to protect your company’s security and privacy, make sure you encrypt sensitive data AND manage your own encryption keys.

Author :
Skyhigh Networks, the Cloud Security Services company, enables companies to embrace Cloud Security Services with appropriate levels of security, compliance, and governance while lowering overall risk and cost. With customers in financial services, healthcare, high technology, media, manufacturing, and legal verticals, the company was a finalist for the RSA Conference 2013 Most Innovative Company award and was recently named a "Cool Vendor" by Gartner, Inc. Headquartered in Cupertino, Calif., Skyhigh Networks is led by an experienced team and is venture-backed by Greylock Partners and Sequoia Capital. For more information, visit us at http://www.skyhighnetworks.com or follow us on Twitter@skyhighnetworks.

Total Views: 538Word Count: 548See All articles From Author

Add Comment

Computers Articles

1. How Telecom Custom Order Management Software Is Transforming Customer Experience In The Digital Era
Author: Kevin

2. How To Launch A Successful Food Delivery App In Usa
Author: swizajoy

3. Flexible & Affordable Desktop Rental Solutions For Businesses | Renton Technologies
Author: Renton Technologies

4. Importance Of Good Identity And Access Management System In 2026
Author: adlerconway

5. What Is Vapt? Guide To The Introductory Vulnerability Assessment And Penetration Testing
Author: Lorcam Securities

6. Multi-path Cellular Aggregation In India: The Future Of Reliable Connectivity With Cellular Sd-wan
Author: SMOD

7. The Importance Of Pos And Billing Software For Modern Businesses
Author: Epos Direct India

8. Spark Matrix™: Yard Management System
Author: Umangp

9. Microsoft Teams Telephony Provider India | Voice Ai For Customer Experience | Viva
Author: Viva

10. Python Development & Software Engineering Services
Author: brainbell

11. Rugtek Pos Machine Troubleshooting Guide: Common Issues & Fixes
Author: prime pos

12. Wordpress Development Services For Scalable Websites 2026
Author: Web Panel Solutions

13. Need To Save Emails As Pdf? Try This Eml To Pdf Converter
Author: vSoftware

14. Remote Connectivity | Business Broadband Without Fibre India | Viva Digitally
Author: Viva

15. Spark Matrix™: Speech Analytics
Author: Umangp

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: