SlideShare a Scribd company logo
1 of 2
Download to read offline
Download Full White Paper >

CRITICAL QUESTIONS TO ASK CLOUD PROTECTION GATEWAY PROVIDERS

      Cloud Data Protection Gateway Market Requirements

            New technology solution categories, by definition, can be a challenge to fully understand. With any
            innovations, where broad-based adoption has yet to occur and “trusted advisors” are typically not
            available to consult, enterprise IT and Security professionals are given the primary task of evaluating
            products from competing solution providers.

            It is just this sort of situation that characterizes a new security solution category that Gartner has
            named the “Cloud Encryption Gateway” market. This solution space developed to address significant
            barriers that have inhibited many organizations from moving to the cloud, such as:




            Cloud Data Protection Gateways reside transparently between applications and their users,
            intercepting sensitive data and replacing it with tokens or encrypted values before it is passed to the
            cloud for processing and storage. These solutions also provide the critical benefit of preserving cloud
            application functionality, such as searching, so that the application users’ experience is not impacted.
                                                                                                                      The solution category holds
                                                                                                                      tremendous promise and has been
                                                                                                                      adopted by many leading enterprises.
                                                                                                                      But Security and IT professionals need
                                                                                                                      to focus on critically analyzing
                                                                                                                      marketing and solution claims from
                                                                                                                      vendors to ensure the technologies
                                                                                                                      being adopted are truly capable of
                                                                                                                      meeting the data privacy, security and
                                                                                                                      compliance requirements faced by
                                                                                                                      their organizations.


                                       Copyright © 2013, PerspecSys Inc., All rights reserved. PerspecSys is a trademark of PerspecSys Inc.


                                       This document is not warranted to be error-free, nor subject to any other warranties or conditions, whether expressed orally or implied in law, including implied warranties and
                                       conditions of merchantability or fitness for a particular purpose.
What Questions Should Be Asked?

      Each group within the enterprise, including Security, Governance & Risk, IT, and the End Users of the
      cloud applications, need to thoroughly evaluate a Cloud Data Protection Gateway solution against
      their own specific needs and requirements.

      SECURITY TEAM

      The primary reason that enterprises typically adopt Cloud Data Protection Gateways is to address
      security and data protection needs, so a thorough understanding of the core security techniques
      used by the gateway provider is critical. Representatives from the enterprise’s security office need
      to ask:

      How secure is my data?

          a. What security techniques are available in the solution, and how do these align with our
             business and data protection objectives? Does the vendor fully support both tokenization
             and encryption, or do they do so with caveats and limits?

          b. If considering encryption as a primary solution for data protection:

                 i.    What algorithms are available (i.e. AES, 3DES)?

                 ii.   Are the algorithms proprietary with limited review by the cryptographic community
                       or are they certified with a recognized standard, such as the NIST publications?

                iii.   If the vendor does highlight a NIST FIPS certification, which one? There are wide
                       differences in implementations of FIPS certified solutions.

                              As an example, FIPS 197 only designates that a cipher implements the AES
                               algorithm, but does not meet additional rigorous requirements outlined in
                               the FIPS 140-2 publication. (Only the latter may be used by U.S.
                               government agencies and is equally adopted by leading enterprises.)

                iv.    How are keys managed? Will the organization maintain control of the keys being
                       used to encrypt the information per the recently published Cloud Security Alliance
                       best practices on deploying encryption?

                              If using the vendor’s key management solution, does it comply with the
                               NIST 800-57 publication on key management? Does the solution support
                               crypto-periods, key revocation, key state management, multiple keys, etc.?




                                            > Download Full White Paper <
                                Copyright © 2013, PerspecSys Inc., All rights reserved. PerspecSys is a trademark of PerspecSys Inc.


                                This document is not warranted to be error-free, nor subject to any other warranties or conditions, whether expressed orally or implied in law, including implied warranties and
                                conditions of merchantability or fitness for a particular purpose.

More Related Content

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Critical Questions To Ask Cloud Protection Gateway Providers [Preview]

  • 1. Download Full White Paper > CRITICAL QUESTIONS TO ASK CLOUD PROTECTION GATEWAY PROVIDERS Cloud Data Protection Gateway Market Requirements New technology solution categories, by definition, can be a challenge to fully understand. With any innovations, where broad-based adoption has yet to occur and “trusted advisors” are typically not available to consult, enterprise IT and Security professionals are given the primary task of evaluating products from competing solution providers. It is just this sort of situation that characterizes a new security solution category that Gartner has named the “Cloud Encryption Gateway” market. This solution space developed to address significant barriers that have inhibited many organizations from moving to the cloud, such as: Cloud Data Protection Gateways reside transparently between applications and their users, intercepting sensitive data and replacing it with tokens or encrypted values before it is passed to the cloud for processing and storage. These solutions also provide the critical benefit of preserving cloud application functionality, such as searching, so that the application users’ experience is not impacted. The solution category holds tremendous promise and has been adopted by many leading enterprises. But Security and IT professionals need to focus on critically analyzing marketing and solution claims from vendors to ensure the technologies being adopted are truly capable of meeting the data privacy, security and compliance requirements faced by their organizations. Copyright © 2013, PerspecSys Inc., All rights reserved. PerspecSys is a trademark of PerspecSys Inc. This document is not warranted to be error-free, nor subject to any other warranties or conditions, whether expressed orally or implied in law, including implied warranties and conditions of merchantability or fitness for a particular purpose.
  • 2. What Questions Should Be Asked? Each group within the enterprise, including Security, Governance & Risk, IT, and the End Users of the cloud applications, need to thoroughly evaluate a Cloud Data Protection Gateway solution against their own specific needs and requirements. SECURITY TEAM The primary reason that enterprises typically adopt Cloud Data Protection Gateways is to address security and data protection needs, so a thorough understanding of the core security techniques used by the gateway provider is critical. Representatives from the enterprise’s security office need to ask: How secure is my data? a. What security techniques are available in the solution, and how do these align with our business and data protection objectives? Does the vendor fully support both tokenization and encryption, or do they do so with caveats and limits? b. If considering encryption as a primary solution for data protection: i. What algorithms are available (i.e. AES, 3DES)? ii. Are the algorithms proprietary with limited review by the cryptographic community or are they certified with a recognized standard, such as the NIST publications? iii. If the vendor does highlight a NIST FIPS certification, which one? There are wide differences in implementations of FIPS certified solutions.  As an example, FIPS 197 only designates that a cipher implements the AES algorithm, but does not meet additional rigorous requirements outlined in the FIPS 140-2 publication. (Only the latter may be used by U.S. government agencies and is equally adopted by leading enterprises.) iv. How are keys managed? Will the organization maintain control of the keys being used to encrypt the information per the recently published Cloud Security Alliance best practices on deploying encryption?  If using the vendor’s key management solution, does it comply with the NIST 800-57 publication on key management? Does the solution support crypto-periods, key revocation, key state management, multiple keys, etc.? > Download Full White Paper < Copyright © 2013, PerspecSys Inc., All rights reserved. PerspecSys is a trademark of PerspecSys Inc. This document is not warranted to be error-free, nor subject to any other warranties or conditions, whether expressed orally or implied in law, including implied warranties and conditions of merchantability or fitness for a particular purpose.