beyond encryption: the 5 pillars of cloud data security
DESCRIPTION
Your data is valuable. Between hackers and PRISM, encryption of cloud data is the talk of enterprise IT departments. But there's more to cloud security than just encryption. Learn the 5 pillars of cloud data security to make your data in the cloud as secure as money in a bank vault.TRANSCRIPT
![Page 1: Beyond Encryption: The 5 Pillars of Cloud Data Security](https://reader034.vdocuments.mx/reader034/viewer/2022042713/547c370db47959b6508b45d9/html5/thumbnails/1.jpg)
Brought to you by !
Beyond Encryption:
The 5 Pillars of Cloud Data Security
![Page 2: Beyond Encryption: The 5 Pillars of Cloud Data Security](https://reader034.vdocuments.mx/reader034/viewer/2022042713/547c370db47959b6508b45d9/html5/thumbnails/2.jpg)
With & how do you keep your corporate data secure in the cloud?
![Page 3: Beyond Encryption: The 5 Pillars of Cloud Data Security](https://reader034.vdocuments.mx/reader034/viewer/2022042713/547c370db47959b6508b45d9/html5/thumbnails/3.jpg)
Banks employ: 1 vaults 2 vault access policies 3 guards
4 surveillance 5 armored transport
Encryption is 1 step, but like bank security there are 5 pillars of cloud data security
![Page 4: Beyond Encryption: The 5 Pillars of Cloud Data Security](https://reader034.vdocuments.mx/reader034/viewer/2022042713/547c370db47959b6508b45d9/html5/thumbnails/4.jpg)
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
Contextual Access Control
Application Auditing
Encryption
Cloud-to-Cloud Control
Vault
Surveillance
Armored Transport
Vault Access Policy
Data Loss Prevention Guards
![Page 5: Beyond Encryption: The 5 Pillars of Cloud Data Security](https://reader034.vdocuments.mx/reader034/viewer/2022042713/547c370db47959b6508b45d9/html5/thumbnails/5.jpg)
1 Encryption must be based on accepted industry standards for both structured and unstructured data
Hot Tip: Make sure sorting,
searching, and other end-user functionalities
still work
![Page 6: Beyond Encryption: The 5 Pillars of Cloud Data Security](https://reader034.vdocuments.mx/reader034/viewer/2022042713/547c370db47959b6508b45d9/html5/thumbnails/6.jpg)
2 Contextual access control for corporate data in the cloud based on user, device, and geographic location
![Page 7: Beyond Encryption: The 5 Pillars of Cloud Data Security](https://reader034.vdocuments.mx/reader034/viewer/2022042713/547c370db47959b6508b45d9/html5/thumbnails/7.jpg)
3 Application auditing of cloud usage and automatic alerts for anomalous (potentially malicious) use
Real-Life Example
A t e c h c o m p a n y t r a c k e d Salesforce.com usage and set automat ic a ler ts whenever an anomalous usage pattern was detected, such as downloading an unusual number of customer contacts in one day
![Page 8: Beyond Encryption: The 5 Pillars of Cloud Data Security](https://reader034.vdocuments.mx/reader034/viewer/2022042713/547c370db47959b6508b45d9/html5/thumbnails/8.jpg)
4 Data loss prevention for cloud data should include blocking of disallowed actions, alerting, and encryption
Hot Tip: Perform DLP for data inline and offline and integrate with existing
DLP system
![Page 9: Beyond Encryption: The 5 Pillars of Cloud Data Security](https://reader034.vdocuments.mx/reader034/viewer/2022042713/547c370db47959b6508b45d9/html5/thumbnails/9.jpg)
5 Extend cloud security, governance, and compliance policies to data as it moves between cloud services
Hot Tip: It’s not just about office-to-cloud and mobile-to-cloud (cloud-to-cloud
matters too)
![Page 10: Beyond Encryption: The 5 Pillars of Cloud Data Security](https://reader034.vdocuments.mx/reader034/viewer/2022042713/547c370db47959b6508b45d9/html5/thumbnails/10.jpg)
Discover Your Cloud Risk Receive a free personalized cloud discovery & risk assessment.
http://bit.ly/TrySkyhigh
Brought to you by !
SCHEDULE RISK ASSESSMENT