Cloud Security
Upcoming SlideShare
Loading in...5
×

Cloud Security

on

  • 289 views

C LOUD COMPUT ING I S H E R E TO STAY, AND I S ONLY G A INING MOMENTUM. WH I L E I T S ...

C LOUD COMPUT ING I S H E R E TO STAY, AND I S ONLY G A INING MOMENTUM. WH I L E I T S
B ENE F I T S A R E C L E A R , T H E R E ’ S ONE MA JOR CONC E RN: K E E P ING INFORMAT ION
SA F E . HOW CAN YOU E F F E C T I V E LY S E CUR E DATA IN OR D E R TO TA K E FUL L
A DVANTAG E OF T H E C LOUD ’ S B ENE F I T S ?

Statistics

Views

Total Views
289
Views on SlideShare
289
Embed Views
0

Actions

Likes
0
Downloads
7
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Cloud Security Cloud Security Infographic Transcript

    • Verizon Enterprise Solutions U N L O C K I N G T H E S E C R E T TO A SECURE CLOUD CLOUD COMPUTING IS HERE TO STAY, AND IS ONLY GAINING MOMENTUM. WHILE ITS BENEFITS ARE CLEAR, THERE’S ONE MAJOR CONCERN: KEEPING INFORMATION SAFE. HOW CAN YOU EFFECTIVELY SECURE DATA IN ORDER TO TAKE FULL ADVANTAGE OF THE CLOUD’S BENEFITS? A SHIFT IN THINKING. SECURE YOUR DATA BY CHANGING THE GAME. Confidence is vital when dealing with data security, and the secret to a secure cloud is NEW MODEL taking a top-down approach. First, assess OLD MODEL Business your core business priorities to determine IT Drives Data Security Priorities Drive cloud security standards. Then, move on to Data Security technology and procedures. And finally, choose the right cloud provider—it does matter who you choose. By thinking of your business as a whole, you’ve created a data-centric model you can trust. E, BUS I N E S SES C T IV CA PE N S A R NO BREACHES EASIER ACCESS CH INFRASTRUCTURE PE IE IC VE INCREASE INCREASE TR G RE REPUTATION AGILITY DATA-CEN ES ATER R A APPS USERS I TH MAINTAIN REDUCE ULT COMPLIANCE COSTS W . S HIPAA, GLBA, MORE EFFICIENT PCI DSS MAINTENANCE TO PROTECT THE DATA, PROTECT WHAT’S AROUND IT. SIX STEPS TO A SECURE CLOUD STRATEGY USING DATA-CENTRIC SECURITY MANAGEMENT1 START WITH THE DATA. DEFINE THE BUSINESS VALUE OF THE DATA SETS. CREATE A HIERARCHY. How will data affect Classify data based on risk Archive or delete reputation, compliance, and sensitivity levels according unnecessary data. costs, and agility? to your business values. MORE THAN 50% OF SENSITIVE DATA SERVES NO BUSINESS PURPOSE.2 ADDRESS THE USERS. INVENTORY YOUR USERS (employees, contractors, partners) AND ASSIGN THEM ROLES. DESIGNATE USER ACCESS BASED ON ROLES AND A NEED-TO-KNOW BASIS.3 CHOOSE THE RIGHT CLOUD. FIND THE CLOUD ENVIRONMENT THAT FITS YOUR ENTERPRISE BASED ON YOUR DATA. Determine standards using your business-based data hierarchy. Choose the cloud provider with the expertise and inherent security that will help you meet those standards. VERIZON HAS ANALYZED 2,000 DATA BREACHES INVOLVING OVER 1 BILLION COMPROMISED RECORDS.4 DETERMINE YOUR CONTROLS. IDENTIFY AND IMPLEMENT CONTROLS (technical, administrative, physical) BASED ON YOUR DATA STANDARDS AND CLOUD FEASIBILITIES. TAKE A DATA-CENTRIC APPROACH TO ENSURE THE RIGHT LEVEL OF CONTROL STRENGTH GREATER AGILITY AND ASSET OPTIMIZATION.5 BRING IT ALL TOGETHER. MIGRATE DATA ENSURE USERS TO THE CLOUD. HAVE LEAST-PRIVILEGE ACCESS. FOR BEST RESULTS, ENGAGE A CLOUD PROVIDER WHO OFFERS SECURE AND FLEXIBLE MIGRATION SOLUTIONS.6 VALIDATE AND MONITOR. CONTINUOUS MONITORING WILL VERIFY CONTROLS ARE PROTECTING ASSETS AS INTENDED. SO, WHAT’S NEXT? THINK BROADER. Look beyond IT and think about your business as a whole to define data classifications. Data-centric security will free your company to confidently take advantage of all that cloud computing can offer you. And more. SECURITY IS OUR BUSINESS. SO IS THE CLOUD. WHEN IT COMES TO SECURITY AND CLOUD, VERIZON LEADS THE WAY. IN FACT, LEADING ANALYST FIRM GARTNER, INC., HAS POSITIONED VERIZON IN THE LEADER QUADRANT IN: MAGIC QUADRANT MAGIC QUADRANT MAGIC QUADRANT FOR MANAGED HOSTING, 2012 FOR PUBLIC CLOUD FOR MANAGED SECURITY INFRASTRUCTURE AS A SERVICES PROVIDER (MSSPS), SERVICE, 2011 NORTH AMERICA, 2011 VERIZON HAS THE EXPERTISE TO OFFER A TRULY SECURE CLOUD—FROM MIGRATING DATA TO PREVENTING, DETECTING AND RESPONDING TO THREATS. verizon.com/enterprise/security verizon.com/enterprise/cloud The Magic Quadrant is copyrighted by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner’s analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the “Leaders” quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. Gartner: Magic Quadrant for Hosting, by Lydia Leong and Ted Chamberlin, March 5, 2012 Gartner: Magic Quadrant for Public Cloud Infrastructure as a Service, by Lydia Leong and Ted Chamberlin, December 8, 2011 Gartner: Magic Quadrant for MSSPs, North America, by Kelly Kavanagh and John Pescatore, November 28, 2011 © 2012 Verizon. All Rights Reserved.