Mitigating Shared Data Security in Brave New World of BYOD
Why Private Clouds Are Getting Traction This is a central reason more private clouds than previously expected are being planned, budgeted for and built: the security for data sharing, the management of applications running in virtual machines and the storage of sensitive business data is much tighter when it's all enclosed in a secure cloud. If the enterprise has tight control over all its internal networks, even if employees use their own devices, then data-sharing problems are cut way down. Forward-thinking companies such as San Francisco-based CloudPassage are providing new-generation automated security services that think for themselves in fighting off threats to data- and file-sharing applications. For example, CloudPassage's frontline product, Halo Netsec, is unique when it comes to securing cloud services because it enables administrators to build a perimeter defense without having to worry about the physical network. Thus, it secures everything from the endpoint to the virtual server, even if that traffic is passing over a public Internet—or even from private to hybrid cloud.Halo NetSec works by running a small security daemon (3MB) on a virtual server, which handles communications across CloudPassage's computing grid, through which all traffic passes on its way from the endpoint to the host, and vice versa. The small footprint of the security daemon makes it easy to set it up on a virtual server, without affecting performance—and, in most cases, associated hosting costs. For businesses that may have plans for installing a private cloud to handle secure business transactions and communications but aren't quite there yet, there are several respected providers of secure file-transfer software for that particular purpose. They include Varonis, OwnCloud, Novell, Symantec, EMC Syncplicity, Accellion and Acronis. Popular online storage and collaboration services Box and Dropbox have greatly improved their security schemes in the last couple of years.
This can prove very important for administrators, especially when managing cloud services, because those administrators have no control or management capabilities for the public portion of cloud communications.