Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cloud
    • Cloud

    How Enterprises Can Deploy Cloud Services More Securely

    By
    Chris Preimesberger
    -
    March 27, 2017
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1How Enterprises Can Deploy Cloud Services More Securely

      How Enterprises Can Deploy Cloud Services More Securely

      Nothing in last year’s news exposed IT security weaknesses more clearly than the 2016 U.S. presidential election. When you add up Hillary Clinton’s emails, John Podesta’s public Gmail and Twitter accounts, and WikiLeaks publishing thousands of emails from sources yet to be named, it’s clear that if attackers can gain access to such highly sensitive accounts, they can hack into any organization. Meanwhile, enterprise IT is going through a massive shift as the digital transformation to cloud services continues. In this eWEEK slide show, using industry information from cloud storage provider CTERA Vice President of Marketing Tom Grave, we offer tips on how enterprises can minimize the risk of data breaches as they plan cloud strategies. CTERA specializes in the digital transformation of enterprise file services.

      2Don’t Put a Bull’s-Eye on Your Data

      Don't Put a Bull's-Eye on Your Data

      Think about approaches that minimize the target value of an organization’s data. Consider deploying services on virtual private clouds or internal/on-premises systems, entirely within a firewall, keeping information away from the spotlight of highly visible SaaS targets.

      3Protect Corporate User Identities or Metadata

      Protect Corporate User Identities or Metadata

      User identities are subject to hacking; enterprises must protect their corporate user identities since loss of user identity is likely to result in loss of the user’s corporate data. Similarly, collecting evidence on the existence of data and its properties can pose a threat as much as losing the data itself. Some cloud-storage solution providers do not adhere to this strategy and keep all of their customers’ metadata centralized in a public place, thus indirectly requesting enterprises to put their faith in them, which poses a significant risk to data confidentiality and integrity.

      4Avoid Saas Providers That Generate and/or Manage Encryption Keys

      Avoid Saas Providers That Generate and/or Manage Encryption Keys

      Encryption keys generated in unencrypted servers can provide attackers with easy access enterprise data. Similarly, having your SaaS provider manage your keys increases your susceptibility of losing control of your data. While cloud services providers boast high security, including physical protection of hosting facilities, electronic surveillance and ISO 27001 certifications, many provide no protection against government data requests, blind subpoenas or clandestine spying. Make sure you own user identities, metadata and encryption keys to ensure the highest levels of data privacy.

      5Control Your Endpoints and Offices

      Control Your Endpoints and Offices

      Use enterprise mobility management (EMM) tools to eliminate shadow IT and create secure productivity spaces within corporate-provided and BYOD devices. Encrypt all data at the source to ensure the greatest levels of access of file security.

      6Lock Down External Collaborator Access

      Lock Down External Collaborator Access

      Implement strict policies to enforce what data can and cannot be uploaded in a file sharing environment, control what domains/emails can and cannot be emailed to, and audit all accesses to ensure there are no anomalistic events. Data loss prevention (DLP) tools can be used to restrict access behaviors.

      7Improve Password Security

      Improve Password Security

      Set rigorous policies around password strength and refresh rates. Consider adding multifactor authentication that will require the user to use a combination of something they know like a static password and something they have such as a smart card or a token that generates a one-time password.

      8Know Your Data Protection Options

      Know Your Data Protection Options

      Understand the limitations of cloud services to recover data lost in the event of an attack, user error, etc., as part of your vendor’s service-level agreements. Ensure that you protect data residing in the cloud, meaning back up your SaaS applications, as well as services and applications running on a public cloud infrastructure as a service (IaaS) as part of an organizational strategy for backup/recovery of data in all locations (on-premises and in-cloud).

      9Investigate Multicloud Strategies

      Investigate Multicloud Strategies

      When organizations run applications on multiple cloud services rather than relying on a single vendor, they reduce the risk of a vendor’s service outage, which could cause them significant issues and downtime. This is a critical component of a cloud strategy that enables organizations to preserve cloud optionality while strengthening their business continuity models.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×