SlideShare a Scribd company logo
Download Full White Paper >

CRITICAL QUESTIONS TO ASK CLOUD PROTECTION GATEWAY PROVIDERS

      Cloud Data Protection Gateway Market Requirements

            New technology solution categories, by definition, can be a challenge to fully understand. With any
            innovations, where broad-based adoption has yet to occur and “trusted advisors” are typically not
            available to consult, enterprise IT and Security professionals are given the primary task of evaluating
            products from competing solution providers.

            It is just this sort of situation that characterizes a new security solution category that Gartner has
            named the “Cloud Encryption Gateway” market. This solution space developed to address significant
            barriers that have inhibited many organizations from moving to the cloud, such as:




            Cloud Data Protection Gateways reside transparently between applications and their users,
            intercepting sensitive data and replacing it with tokens or encrypted values before it is passed to the
            cloud for processing and storage. These solutions also provide the critical benefit of preserving cloud
            application functionality, such as searching, so that the application users’ experience is not impacted.
                                                                                                                      The solution category holds
                                                                                                                      tremendous promise and has been
                                                                                                                      adopted by many leading enterprises.
                                                                                                                      But Security and IT professionals need
                                                                                                                      to focus on critically analyzing
                                                                                                                      marketing and solution claims from
                                                                                                                      vendors to ensure the technologies
                                                                                                                      being adopted are truly capable of
                                                                                                                      meeting the data privacy, security and
                                                                                                                      compliance requirements faced by
                                                                                                                      their organizations.


                                       Copyright © 2013, PerspecSys Inc., All rights reserved. PerspecSys is a trademark of PerspecSys Inc.


                                       This document is not warranted to be error-free, nor subject to any other warranties or conditions, whether expressed orally or implied in law, including implied warranties and
                                       conditions of merchantability or fitness for a particular purpose.
What Questions Should Be Asked?

      Each group within the enterprise, including Security, Governance & Risk, IT, and the End Users of the
      cloud applications, need to thoroughly evaluate a Cloud Data Protection Gateway solution against
      their own specific needs and requirements.

      SECURITY TEAM

      The primary reason that enterprises typically adopt Cloud Data Protection Gateways is to address
      security and data protection needs, so a thorough understanding of the core security techniques
      used by the gateway provider is critical. Representatives from the enterprise’s security office need
      to ask:

      How secure is my data?

          a. What security techniques are available in the solution, and how do these align with our
             business and data protection objectives? Does the vendor fully support both tokenization
             and encryption, or do they do so with caveats and limits?

          b. If considering encryption as a primary solution for data protection:

                 i.    What algorithms are available (i.e. AES, 3DES)?

                 ii.   Are the algorithms proprietary with limited review by the cryptographic community
                       or are they certified with a recognized standard, such as the NIST publications?

                iii.   If the vendor does highlight a NIST FIPS certification, which one? There are wide
                       differences in implementations of FIPS certified solutions.

                              As an example, FIPS 197 only designates that a cipher implements the AES
                               algorithm, but does not meet additional rigorous requirements outlined in
                               the FIPS 140-2 publication. (Only the latter may be used by U.S.
                               government agencies and is equally adopted by leading enterprises.)

                iv.    How are keys managed? Will the organization maintain control of the keys being
                       used to encrypt the information per the recently published Cloud Security Alliance
                       best practices on deploying encryption?

                              If using the vendor’s key management solution, does it comply with the
                               NIST 800-57 publication on key management? Does the solution support
                               crypto-periods, key revocation, key state management, multiple keys, etc.?




                                            > Download Full White Paper <
                                Copyright © 2013, PerspecSys Inc., All rights reserved. PerspecSys is a trademark of PerspecSys Inc.


                                This document is not warranted to be error-free, nor subject to any other warranties or conditions, whether expressed orally or implied in law, including implied warranties and
                                conditions of merchantability or fitness for a particular purpose.

More Related Content

Recently uploaded

Recently uploaded (20)

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
The architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdfThe architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Critical Questions To Ask Cloud Protection Gateway Providers [Preview]

  • 1. Download Full White Paper > CRITICAL QUESTIONS TO ASK CLOUD PROTECTION GATEWAY PROVIDERS Cloud Data Protection Gateway Market Requirements New technology solution categories, by definition, can be a challenge to fully understand. With any innovations, where broad-based adoption has yet to occur and “trusted advisors” are typically not available to consult, enterprise IT and Security professionals are given the primary task of evaluating products from competing solution providers. It is just this sort of situation that characterizes a new security solution category that Gartner has named the “Cloud Encryption Gateway” market. This solution space developed to address significant barriers that have inhibited many organizations from moving to the cloud, such as: Cloud Data Protection Gateways reside transparently between applications and their users, intercepting sensitive data and replacing it with tokens or encrypted values before it is passed to the cloud for processing and storage. These solutions also provide the critical benefit of preserving cloud application functionality, such as searching, so that the application users’ experience is not impacted. The solution category holds tremendous promise and has been adopted by many leading enterprises. But Security and IT professionals need to focus on critically analyzing marketing and solution claims from vendors to ensure the technologies being adopted are truly capable of meeting the data privacy, security and compliance requirements faced by their organizations. Copyright © 2013, PerspecSys Inc., All rights reserved. PerspecSys is a trademark of PerspecSys Inc. This document is not warranted to be error-free, nor subject to any other warranties or conditions, whether expressed orally or implied in law, including implied warranties and conditions of merchantability or fitness for a particular purpose.
  • 2. What Questions Should Be Asked? Each group within the enterprise, including Security, Governance & Risk, IT, and the End Users of the cloud applications, need to thoroughly evaluate a Cloud Data Protection Gateway solution against their own specific needs and requirements. SECURITY TEAM The primary reason that enterprises typically adopt Cloud Data Protection Gateways is to address security and data protection needs, so a thorough understanding of the core security techniques used by the gateway provider is critical. Representatives from the enterprise’s security office need to ask: How secure is my data? a. What security techniques are available in the solution, and how do these align with our business and data protection objectives? Does the vendor fully support both tokenization and encryption, or do they do so with caveats and limits? b. If considering encryption as a primary solution for data protection: i. What algorithms are available (i.e. AES, 3DES)? ii. Are the algorithms proprietary with limited review by the cryptographic community or are they certified with a recognized standard, such as the NIST publications? iii. If the vendor does highlight a NIST FIPS certification, which one? There are wide differences in implementations of FIPS certified solutions.  As an example, FIPS 197 only designates that a cipher implements the AES algorithm, but does not meet additional rigorous requirements outlined in the FIPS 140-2 publication. (Only the latter may be used by U.S. government agencies and is equally adopted by leading enterprises.) iv. How are keys managed? Will the organization maintain control of the keys being used to encrypt the information per the recently published Cloud Security Alliance best practices on deploying encryption?  If using the vendor’s key management solution, does it comply with the NIST 800-57 publication on key management? Does the solution support crypto-periods, key revocation, key state management, multiple keys, etc.? > Download Full White Paper < Copyright © 2013, PerspecSys Inc., All rights reserved. PerspecSys is a trademark of PerspecSys Inc. This document is not warranted to be error-free, nor subject to any other warranties or conditions, whether expressed orally or implied in law, including implied warranties and conditions of merchantability or fitness for a particular purpose.