Managing Cloud Security in a Growing Cloud Environment

October 14, 2015 Bob Gilbert

Managing-Cloud-Security-Growing-Cloud

As more stories of data breaches affecting major companies and governmental institutions hit the news, consumers are wondering if their information is safe anywhere. At the same time, businesses are asking themselves how they’ll ever be able to protect sensitive information from thieves who are just raring to go at all the vulnerabilities they see as more organizations transfer their data from in-house servers to the cloud.

Many enterprises have spent the past decade or so, focused on locking down their physical perimeter to secure against breaches. However, with the concurrent adoption of applications, virtualization, multiple data centers, and more, cloud storage and security has become a complex issue.

With the technology research company Gartner, Inc. forecasting that almost half of large enterprises will have hybrid cloud deployments by 2017, there’s reason for concern. You’d expect at least a portion of these businesses won’t be up to speed with the latest security best practices for cloud storage, and will be proceeding as a matter of economics and convenience.

And it’s not like any of the threats affecting cloud security will be going away anytime soon. The Cloud Security Alliance (CSA)─ an organization dedicated to raising awareness of best practices to help ensure a secure cloud computing environment─ came up with a list of the top security threats facing businesses. The CSA’s “Notorious Nine” includes data loss, service traffic hijacking, insecure interfaces and APIs, denial-of-service attacks, malicious insiders, and more.

As if those nine looming cloud security threats weren’t enough to turn an IT person’s hair gray, there’s also the role which employees themselves play in circumventing cloud security for their own convenience, which can also be detrimental to a business’ efforts. Add that to the fact that people are now constantly accessing large volumes of data on multiple devices, from various locations, on different networks, and you can start to see how cloud security can be a real challenge for businesses.

If you’re an IT professional overseeing cloud storage and security for a large enterprise, we understand the urge to just stand up the strongest firewalls, the latest web proxies, block app traffic and hope for the best. A better approach would be to understand there’s a fine line between how much security is enough, and when it borders on being too intrusive to users. Your employees should be able to maintain their privacy without sacrificing the greater good of the company.

At Netskope, we champion a much more nuanced approach to cloud security. That includes putting a premium on privacy by making it the default security setting, keeping things transparent, and staying user-friendly.

For cloud applications, we recommend a thorough analysis of how they’re being used within your company. Once you know which apps are being relied on and why, you can take a much more granular, data-driven, and well thought out approach to enforcing a security policy around them. For a detailed view on our cloud and cloud app security recommendations, download our eBook, Cloud Security for Dummies, or get in touch.

The post Managing Cloud Security in a Growing Cloud Environment appeared first on Netskope.

About the Author

Bob Gilbert

Bob heads up the product marketing efforts at Netskope, the leader in safe cloud enablement. Bob is a prolific speaker and product demonstrator, reaching live audiences in more than 45 countries over the past decade. His career spans more than 20 years in Silicon Valley where he has held product management and marketing leadership roles at various technology companies. Most recently he was the Chief Evangelist at Riverbed.

Follow on Twitter More Content by Bob Gilbert
Previous Article
The Fab Five: Five Policies You Can Enforce if You Differentiate Between App Instances
The Fab Five: Five Policies You Can Enforce if You Differentiate Between App Instances

A couple of weeks ago, my colleague Livius Feinbaum, one of our senior systems engineers in New York, wrote...

Next Article
Europe, Cloud, Safe Harbor, and Pending Legislation: Four Steps You Must Take Now
Europe, Cloud, Safe Harbor, and Pending Legislation: Four Steps You Must Take Now

The recent European Court of Justice’s invalidation of the US-EU Safe Harbor as complying with the EU Direc...