1 / 17

Cloud Security and Data Protection: Industry Overview & Solutions

Explore the latest industry trends in data protection and security. Learn how to overcome challenges in cloud infrastructure and safeguard your business from security threats. Discover expert solutions for secure data access, encryption, monitoring, and compliance.

achristina
Download Presentation

Cloud Security and Data Protection: Industry Overview & Solutions

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Data Protection & Security Nizar Elfarra

  2. Today’s Overview Industry trends Security & Protection How Can We Help

  3. Industry Trends

  4. Challenges Faced Infrastructure (R)evolution Business Challenges Budget Constraints Data Center Cloud More Data More Workloads Service Providers SaaS Lines of Business Owner Demands Mobile

  5. Digital Transformation and the Internet of ThingsForces fueling the move to the cloud Connected Devices Skyrocketing Cloud Usage on the Rise Explosion of Digital Data 90% 70% 20.8BILLION 5 …of all digital data ever created was created in the last 2 years. …things could be connected to the Internet by 2020, about 5.5 million devices added every day. …of organizations are managing some of their data in cloud infrastructure. Source: IDC Source: Sintef ITC Source: Gartner

  6. Private Cloud / Hybrid Cloud Market Opportunity Cloud Agility Enterprise Control 2013-2018 CAGR Self - Service Budget Controls 18% Rapid Start / Stop Access Controls 25% Standard Interface Policy Enforcement -8% Pay for Use Reporting Source: Gartner

  7. The Disappearing Datacenter Increased Hybridization of Workloads

  8. Security & Protection

  9. Security Concerns Ransomware on the rise Protecting blockchain & cryptocurrency Unauthorized access within the organization Mobile workforce & corporate data on endpoints Personal devices used to access corporate data Use of free file sharing service Data and compliance breach due to laptop loss or theft Risk associated with end point and cloud based data Current user security practices will not pass a compliance audit

  10. Security Requirements

  11. Data Access & Control Secure Access from Anywhere • Secure, easy to manage access from browser or mobile devices Access Control Capture • Knowing who should an can have access to data stored App Aware Security & Authentication • Enabled across different access points (web or mobile)

  12. Cloud & Network Security Multi-Tenancy • Segregating data at all times Secure Communication • SSL communications between systems Client Certification • All systems require certification to authenticate the connections Firewalls • Blocked unauthorized access to network resources

  13. Data Encryption Data in transit & data at rest • 256 bit key encryption Encryption Key Management FIPS certifications • FIPS 140-1 and FIPS 140-2

  14. Auditing, Monitoring & Analytics Full Auditing • Ability to provide audit trails for the data being stored, deleted and accessed Log Monitoring • Ability to monitor, capture and interpret log file data of user access Log Analytics • Ability to forensically review logs from the time of a data breach to be able to prevent it

  15. Data Governance & Compliance Data Residency • Ability to view and access data is in an organization eDiscovery, Compliance & Legal Hold • Ability to view, search, discovery and preserve selected data owned by the organization Remote Wipe • Mitigating breaches by remotely wipe data in case of a lost endpoint device Data Privacy • Ability to local a service providers ability to view and access their data Also Relevant for GDPR

  16. What To Do

  17. We Can Help Prevent & Detect Ransomware Detection & Recovery • Flag suspect processes that read a lot of files in a short period by setting up ‘honey pots’ • Recover from a clean offline backup Data Protection • Setting up the right backup and DR policies • Creating clean offline copies User Data Segregation • Multi-tenancy – User can access only their data, preserving user privacy and segregation at all times Secure Communications • Encrypt data during transit and at rest Monitoring & Auditing • Setting policies, generating reports and triggering alerts to warn and prevent unauthorized access Stop Infection Spread Recovery & DR Strategy

More Related