What is sure to put in the cloud?

1:33 PM
What is sure to put in the cloud? -

privacy is a major concern for organizations looking for cloud and to use the right. It is no small matter to send out of the on-site infrastructure commercially sensitive information such as customer information, financial records, legal documents or intellectual property. But security concerns need not be an obstacle to the benefits of the cloud. "With the right policies and best practices" Stan Black, Citrix Chief Security Officer says: "You can move the right data to the cloud, the right way to take advantage of benefits such as take flexible on-demand storage, anywhere, Any -. device access with manageable risk "

ensure that your strategy for data security and data protection is comprehensive, up-to-date and complies with legal mandates, and that your employees on your policy and practice fully trained , At the same time you should not consume resources to protect certain types of information about the level they deserve. Use model a data classification among public data without confidentiality, data protection and compliance to distinguish effects; confidential information that is not meant to be public, but poses a minimal risk in case of leakage; and limited data poses a significant risk of non-compliance, reputation, lost business and other significant effect. This will help you to any type of data, including the suitability of cloud storage and access.

assign an appropriate storage and access permissions Directive How do you rate cloud providers, pay attention to their service obligations and security procedures and practices. Your due diligence may include a detailed questionnaire, on-site investigation and references from other customers, offered together with all certifications and certificates from the provider. Trust and transparency are crucial-make sure that you are writing, data storage, and return procedures, penalties for testing come the terms, conditions, errors such as failures and security breaches are handled. Monitoring compliance with your contract, as long as the provider contains your data.

A contract of cloud providers will also provide a basis for giving their service levels and security for your own internal capabilities to compare. Any compromise should be considered in the assessment of the relative costs and benefits of implementing your data in the cloud. This should include the risks associated with data transmission are involved, the storage and access to third-party infrastructure. The cloud may have an impact on the employees and the company's productivity and mobility consider this from the perspective of key applications in your organization.

If your cloud initiative includes regulated data, make sure that both your strategy and the capabilities of your provider are designed mandates for compliance, data protection and governance to meet. These can include FTC consent decrees, HIPAA Privacy and Security Rules, EU restrictions on cross-border data transmission, and the US and E.U. are the precautions taken addressing the safe harbor personal data to protect. One consequence of regulatory compliance requirements increase, and high-profile data loss has to protect a dramatic increase in the use of encryption business data. As part of an effective approach key management of encryption, it is necessary to control the key for your own encrypted data in the cloud.

for data in the cloud your security strategy as its implementation is just as effective. In order to prevent offenses, educate employees, contractors, partners and service providers on best practices for the use of the cloud secure business data, such as the risk profiles with different access methods, devices, locations and types of data. For access Check and update your policies for security, bring-your-own-device (BYOD), mobility and acceptable use regularly and inform the user immediately about any changes, trends or concerns.

given the relative newness of the cloud, it is understood to be for IT wary of the safety of moving business data to a Third-party infrastructure. In the words of Stan: "By your security strategy for data in the cloud to involve the same level of thinking and rigor as for your local assets, you can realize the full benefits of the cloud without introducing additional risk." To learn more visit citrix.com/secure

Follow @CitrixSecurity

Learn how Citrix security and compliance requirements for cloud storage support

About the author

Stacy Bruzek Banerjee director of solutions marketing for Citrix and is responsible for global security, business continuity and BYOD solutions. Before Citrix Stacy Guidewire worked on explosive growth and to build a successful IPO. She rolls Marketing lead lasted at Oracle, Symantec and VISA, where they focused on data management, security and cooperation. She holds a bachelor's degree from the University of Minnesota. Feel free to read more of Stacy blogs.

Previous
Next Post »
0 Komentar