SlideShare a Scribd company logo
CloudMask thinks differently in the secure-cloud landscape.
The education industry keeps sensitive data secure with CloudMask.
The economic value proposition of Software as a Service (SaaS) is undeniable. SaaS is disrupting industry after industry,
making accessible to sole proprietors and small businesses software functionality that historically required significant
investment in hardware, software, and annual maintenance fees. This, in turn, is making smaller players even more agile
and efficient than they used to be, allowing them to run competitive circles around larger or laggard players.
The good news is that rich software functionality is often available for less than $100 per month, enabling high levels of
business management and administrative efficiencies.
The bad news is that the tempting sky of cloud and SaaS computing is filled with thunderclouds of cybersecurity concerns.
Despite the best efforts of traditional cybersecurity experts, the adoption of cloud computing has been accompanied by an
ever-growing number of egregious data breaches. These breaches damage brands and drive up significant costs for
investigations, notification, and identity-theft protection for clients whose personal information has drifted into malicious
hands.
So, what’s going on? Why do even the largest enterprises struggle with securing their data? Wouldn’t the National
Security Agency be one of the most rigorous security practitioners in the world? What leaks have we not yet detected?
One thought leader at a major global cybersecurity consultancy explained it like this: “We’re trying to examine every packet
that flows across the perimeter of the network and notice IP addresses that don’t make sense. This is incredibly hard.
There’s a ridiculous amount of data, and we’ve entered an age where the network no longer has clear boundaries. We
really haven’t solved that problem.
What is the problem?
The problem lies in the way traditional security thinkers have defined the problem. They’re working with a castle-and-moat
metaphor, where the internal network is protected with a set of security rings. Each ring, however, has costly hardware and
software searching for malevolent inbound and outbound data. But it’s like looking for needles in a haystack. And even if
security experts are successful at protecting the perimeter, there is little protection against insiders (employees or others
with access to the internal network).
Keep Student information
protected while
improving services
CloudMask thinks differently.
We see the problem in simpler terms: protecting sensitive data and ensuring that only authorized users, using known
devices, can see data in the clear. We’re happy to let the traditional security experts work on their perimeters, knowing that
when they fail, our customers’ data remains secure. And, in contrast with products designed for big enterprises, we’ve
created a solution that can be installed, configured, and afforded by small businesses without IT staff.
The SaaS Security Problem – Simplified
SaaS applications use best-practice security protocols and rely on their cloud provider to secure the infrastructure the
application runs on.
One vendor explains it this way: “We ensure that your communications are secure using bank-grade 256-bit SSL
encryption. All of (our) infrastructure is hosted using physically secure, managed data centers that meet the rigid SSAE 16
specifications. Geo-redundant backups are performed multiple times per day, and site security and privacy are routinely
audited by respected third parties.”
By means of 256-bit SSL encryption, the connection between your browser or app and database servers is secured. When
you submit a query or update, the data is encrypted as it transits the internet. Once the data reaches the data center, it is
decrypted for insertion into the app’s database.
The data center itself (e.g., Amazon Web Services) has a rigorous set of security controls and protocols, meaning that only
employees with the proper identification and access passwords can physically or virtually access the servers that hold the
application’s data. SSAE 16 is a standard according to which data centers are audited for their degree of compliance with
policy.
There are three vulnerabilities that should concern executives:
1. Anyone who tricks a user into revealing their username and password can impersonate that user and log in
from any browser in the world.
Such a hacker can impersonate the user and perform administrator functions. You don’t have to be a fool to have this
happen to you. Even a sophisticated user like CIA Director John Brennan has fallen prey to high school-age hackers.
2. Any insider (employee of the data center) can turn from “good” to “bad” overnight or have their credentials
stolen, meaning that an authorized system administrator could access application data for malevolent purposes.
Insiders don’t need to be “bad” to present a threat. They can simply be careless.
A recent report on cybersecurity suggests that less than 50 percent of organizations have adequate policies in place to
mitigate insider-threat risks. The challenge here is that executives depend on their SaaS provider, who in turn rely on their
cloud service providers to maintain security hygiene. That’s a lot of blind faith.
3. Governments have the desire, capacity and experience to tap into the cloud-service providers who hold the
world’s data.
The problem here is manifold. On the one hand, the government can access specific information based on a warrant. On
the other hand, it is an entirely different matter to access everything on an as-needs basis, under cover of National Security
Letters or their equivalent. Despite their best efforts to security screen and oversee intelligence and law enforcement
operations, the government also falls prey to “trusted” staff performing unauthorized actions. These vulnerabilities impact
the firm’s liability for data breaches and the capacity to deliver on a promise of client confidentiality and privacy.
In storing sensitive personal and other data, the firm is considered a data controller. As a data controller, the firm is subject
to a variety of data protection laws and regulations. Such regulations increasingly create a costly burden to notify
individuals affected by data breaches and to purchase several years of identity-theft protection. Emerging European laws
impose heavy fines for firms who violate data protection regulations.
Higher learning institutions are leading the way.
Increasingly, we are seeing instances of cloud use in universities and institutions of higher learning moving their applications
to the cloud. Although the rate of movement is somewhat lower than the broader market, the trend is clearly visible.
Universities are moving to the cloud for a large number of applications, including student engagement, learning, research,
inter-university collaboration and routine management of university operations.
While many educational institutions tend to be conservative about their use of technology, there is no doubt that cloud-based
educational services will dominate information technology use in higher learning institutions in the years to come. When
researchers studied the adoption of cloud computing in a large number of universities, they found that universities welcomed
the agility, scalability and functionality that cloud computing offered them. It became clear that their own resources would not
be adequate to build the capabilities that cloud computing gave them. The day is not far away when researchers will ask for
100 hours of virtual server time rather than ask for a server. In a large number of cases users are already setting up virtual
servers on popular cloud-service providers. The benefits are simply too great to ignore.
Cloud security is still a major concern.
There is a very real nervousness shared by the higher learning community about cloud security, and many universities prefer
private clouds to public ones. With security as their number one concern, all universities are very wary about putting any
intellectual property on public clouds. This is not just about students breaking into question banks and altering marks; there
are also serious issues of export control over research material and implementation of intellectual property rights (IPR). Data
centers could exist outside the country, and there are serious cross-border data transfer issues, especially for institutes
engaged in cutting-edge research. Institutes that violate export control and IPR laws could easily find their funding cut off
and criminal charges being pressed.
Compliance costs are soaring.
A study by Vanderbilt University found that the cost of regulatory compliance in higher education was as high as 6.4% of the
total operating expenditures. Research-related security compliance could go as high as 25% of the overall research
expenditure, and when the cost of compliance was extrapolated to the entire education sector, the figure came to an
astounding $27 billion. While this covers compliance with all federal laws, a substantial portion of it would be related to
managing security of data. Therefore, it is important to understand some of the laws that govern the functions of schools and
universities in the country.
There are a large number of laws that apply to educational institutions. Many of these can be infringed if data stored in the
cloud is disclosed, lost or stolen. The most well-known of these, of course, is the FERPA Act—the Family Education Rights
and Privacy Act. This law applies to all schools that receive funds from the US Department of Education. FERPA defines
how student records are to be handled and what can and cannot be disclosed. An institution that does not comply with
FERPA may be deprived of federal funds and even be liable to fines and monetary damages.
Other laws include the Campus Safety and Security Act (Clery Act), that requires collection and classification of crime
statistics, the Drug and alcohol abuse prevention Drug Free Schools and Communities Act (DFSCA), various Financial Aid
programs, Sexual misconduct Title IX, Violence Against Women Act (VAWA), FISMA Federal Information Security
Management Act. Growing numbers of students admitted from foreign countries will require a means to manage their
admission process and visa applications. All of these management tasks can be processed in the cloud but will require to be
adequately protected. There are also non-education related laws requiring compliance. For example, the HIPAA Health
Insurance Portability and Accountability Act of 1996 requires that all medical data about student and employee health has to
be held in accordance with HIPAA regulations.
The requirement of securing data required under these acts can be met only if data is encrypted completely during storage
or during transmission. However, the problem occurs during data processing. Encrypted data cannot be processed unless
every application is specifically rewritten to be built to handle such data. This is simply not possible, and thus all applications
decrypt data before processing it.
Where does data exposure take place?
The threat of data exposure lies in the duration when data is decrypted prior to processing. A hacker could gain access to
data at this vulnerable stage. The university would be forced to make a disclosure as required by law, and there would be
severe consequences. Besides legal consequences, there would be a major loss of intellectual property. Such a proprietary
fear is holding back the deployment of cloud technology in education at a sufficient pace.
As a result, universities are losing money.
The solution lies in a data protection mechanism that understands the various components of data and knows how to encrypt
and protect them selectively so that processing of this data in a cloud-based application does not require the entire data to
be decrypted. For example, if the personal details of a student were to be secured, then the rest of the data collected under
the Drug Free Schools Act would no longer be sensitive data. Going case by case, a data security specialist can create a
program to ensure complete security and compliance while allowing the university to use cloud-based resources.
Who is CloudMask?
CloudMask is a specialist company in the domain of data security whether in the cloud or in premises. Using technology that
CloudMask has developed itself, data is segregated into several groups. One kind of data can be encrypted; another can be
masked or tokenized. Masked or tokenized data has the same format as the original data except that the original student
name or Social Security Number, for example, would be replaced by a dummy value. This dummy value would allow for all
processing to be carried out in the cloud and even if there is a loss of data, there would be no repercussions because the
identifying elements are masked and other elements are encrypted. In this manner, data is anonymized, and universities can
now use the cloud with confidence.
When CloudMask protection is applied to data, even if an attacker has complete access to the application or database, he
will not be able to obtain any data of value. In such a situation, the organization may not even have to report any loss of data
because what has been stolen is, after all, encrypted gibberish.
CloudMask solutions can be deployed rapidly at very low costs. Universities will not be required to install any expensive and
complex encryption gateways. Encryption starts at the PC of the user who is creating the data, and every individual element
is protected as data is being keyed in. Though your university could be using any software solution, CloudMask will be able
to provide protection without needing to alter the application in any way.
If you think the solution is not to use cloud, think again.
The concerns outlined above have caused many organizations to have misgivings about adopting cloud-based solutions,
presuming that an on-premise solution (a server running in your office) is safer. Unfortunately, that is not the case. Your
office or server room isn’t nearly as secure as an access-controlled data center.
CloudMask: a silver lining for SaaS
CloudMask addresses these vulnerabilities in a way that enables executives to immunize their firms against data-
breaches, differentiate by offering highly secure data management and communications, and using economical cloud
services with confidence.
CloudMask can provide SaaS users with an easy-to-install browser extension that automatically masks sensitive data
before it enters the 256-bit encryption channel to the data center. When that data arrives at the data center where the 256-
bit protection ends, CloudMask data stays masked.
This process also works in reverse, as in the case when the user requests sensitive data. Here the masked data is double-
encrypted as it moves through the secured communications channel. When it arrives in the browser, the 256-bit encryption
is removed, and CloudMask seamlessly unmasks to present the data in the clear.
Alongside controlling users and their access rights, practice management account owners/administrators have the capacity
to select specific fields to be masked. Not all data needs to be masked and protected, but data categorized as sensitive
personal data, personally identifying, or otherwise confidential, can be selected for automated, seamless masking and
unmasking.
From a functional perspective, CloudMask resolves the concerns that executives
might have with respect to using SaaS applications:
1. Each user authorized to access the SaaS account installs a CloudMask browser extension that is activated through a
simple process generating the personal, private and public keys required for the encryption process. What’s more, the
extension can be installed on multiple personal devices, each of which is personalized with a private key. Thus, even if a
username and password are somehow compromised, which under normal circumstances would allow anyone anywhere in
the world to log into the account and see data in the clear, the unauthorized user cannot do so without access to the
specific devices configured with the personalized browser extension.
2. The data stored under care of the data center remains masked while at rest or in motion. Neither the practice
management SaaS vendor nor CloudMask administrators nor data center administrators, have keys that can be used to
unmask the data. If the data center suffers a breach (e.g., an unauthorized insider penetrates the database, or a
government agency serves a National Security Letter), data the user has designated as sensitive remains protected.
3. The data stored under care of the data center is masked in such a way (“tokenization”) that anonymizes what was
previously sensitive data. Thus, even if that data is stolen, it is no longer considered sensitive personal information or
personally identifying information, so it no longer falls under data protection regulations or requirements. In other words,
breaches of systems holding tokenized data do not trigger the costly response and remediation efforts associated with
breaches of systems holding sensitive personal information.
The Technical Story
A separate e-book explains the technical details behind this process and the software that automates it, as well as
describing the benefits of encrypting and tokenizing data, which we collectively refer to as “masking.” The e-book also
provides a brief explanation of the well-established public/private key methods used by the encryption process.
Grounded Confidence
CloudMask is unique in having its “CloudMask engine” certified through a Common Criteria for Information Technology
Security Evaluation (Common Criteria) process, which is used by twenty-six federal governments to evaluate security
products for their own use.
The process of independent evaluation assesses whether a product’s functional claims live up to the way it is coded and
performs. Many products claim to be “bank-grade” or “military-grade,” both of which are subjective assessments.
CloudMask is the only data-masking product capable of working with SaaS offers to achieve Common Criteria certification.
More expensive competitors like Cipher Cloud and Ionic have not achieved such objective criteria. Technical advisors can
access CloudMask’s Common Criteria Assessment here.
It’s easy to get started with CloudMask. Visit www.cloudmask.com

More Related Content

What's hot

Big Data Dectives
Big Data DectivesBig Data Dectives
Big Data Dectives
- Mark - Fullbright
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
Authentic8
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for Businesses
CompTIA
 
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-clouddrewz lin
 
Data Sovereignty and the Cloud
Data Sovereignty and the CloudData Sovereignty and the Cloud
Data Sovereignty and the Cloud
IESL - The Institution of Engineers, Sri Lanka
 
Funsec3e ppt ch14
Funsec3e ppt ch14Funsec3e ppt ch14
Funsec3e ppt ch14
Skillspire LLC
 
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...Tania Mushtaq
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production Environments
LindaWatson19
 
Hacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetHacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder Target
LexisNexis
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänster
Transcendent Group
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
Cognizant
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
IOSR Journals
 
Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...
Ulf Mattsson
 
Perspec sys knowledge_series__solving_privacy_residency_and_security
Perspec sys knowledge_series__solving_privacy_residency_and_securityPerspec sys knowledge_series__solving_privacy_residency_and_security
Perspec sys knowledge_series__solving_privacy_residency_and_securityAccenture
 
Is your infrastructure holding you back?
Is your infrastructure holding you back?Is your infrastructure holding you back?
Is your infrastructure holding you back?
Gabe Akisanmi
 
Getting ahead of compromise
Getting ahead of compromiseGetting ahead of compromise
Getting ahead of compromise
CMR WORLD TECH
 
Storgrid-Encryption-White-Paper
Storgrid-Encryption-White-PaperStorgrid-Encryption-White-Paper
Storgrid-Encryption-White-PaperToshio Spoor
 
What I learned at the Infosecurity ISACA North America Conference 2019
What I learned at the Infosecurity ISACA North America Conference 2019What I learned at the Infosecurity ISACA North America Conference 2019
What I learned at the Infosecurity ISACA North America Conference 2019
Ulf Mattsson
 

What's hot (20)

Big Data Dectives
Big Data DectivesBig Data Dectives
Big Data Dectives
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for Businesses
 
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-cloud
 
Case study
Case studyCase study
Case study
 
Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417
 
Data Sovereignty and the Cloud
Data Sovereignty and the CloudData Sovereignty and the Cloud
Data Sovereignty and the Cloud
 
Funsec3e ppt ch14
Funsec3e ppt ch14Funsec3e ppt ch14
Funsec3e ppt ch14
 
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production Environments
 
Hacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetHacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder Target
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänster
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
 
Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...
 
Perspec sys knowledge_series__solving_privacy_residency_and_security
Perspec sys knowledge_series__solving_privacy_residency_and_securityPerspec sys knowledge_series__solving_privacy_residency_and_security
Perspec sys knowledge_series__solving_privacy_residency_and_security
 
Is your infrastructure holding you back?
Is your infrastructure holding you back?Is your infrastructure holding you back?
Is your infrastructure holding you back?
 
Getting ahead of compromise
Getting ahead of compromiseGetting ahead of compromise
Getting ahead of compromise
 
Storgrid-Encryption-White-Paper
Storgrid-Encryption-White-PaperStorgrid-Encryption-White-Paper
Storgrid-Encryption-White-Paper
 
What I learned at the Infosecurity ISACA North America Conference 2019
What I learned at the Infosecurity ISACA North America Conference 2019What I learned at the Infosecurity ISACA North America Conference 2019
What I learned at the Infosecurity ISACA North America Conference 2019
 

Viewers also liked

Box live tv streaming
Box live tv streamingBox live tv streaming
Box live tv streaming
oneworlddigitalsolutions
 
Figure 1.5
Figure 1.5Figure 1.5
Figure 1.5
L H
 
P 005 micromachismos-el-poder-masculino-en-la-pareja-moderna
P 005 micromachismos-el-poder-masculino-en-la-pareja-modernaP 005 micromachismos-el-poder-masculino-en-la-pareja-moderna
P 005 micromachismos-el-poder-masculino-en-la-pareja-moderna
KIARA OJEDA NAVARRO
 
Importancia de la educación a distancia
Importancia de la educación a distanciaImportancia de la educación a distancia
Importancia de la educación a distancia
BlancoEduardo1985
 
Finished codes and conventions front cover
Finished codes and conventions   front coverFinished codes and conventions   front cover
Finished codes and conventions front cover
amberderbyshire123
 
Tarea seminario 2 fundamentos
Tarea seminario 2 fundamentosTarea seminario 2 fundamentos
Tarea seminario 2 fundamentos
fisiobgmh
 
Frases de filósofos
Frases de filósofosFrases de filósofos
Frases de filósofos
lauraa012
 
Why Techietechno is your IT Offshore Development Partner?
Why Techietechno is your IT Offshore Development Partner?Why Techietechno is your IT Offshore Development Partner?
Why Techietechno is your IT Offshore Development Partner?
Ratna Basu
 
Visión del indio desde el XIX hasta López Albújar
Visión del indio desde el XIX hasta López AlbújarVisión del indio desde el XIX hasta López Albújar
Visión del indio desde el XIX hasta López Albújar
Evelyn Sotomayor
 
No Control - Storyboard
No Control - StoryboardNo Control - Storyboard
No Control - Storyboard
airidascironka
 
marketing internationnel cas en tunisie
marketing internationnel cas en tunisiemarketing internationnel cas en tunisie
marketing internationnel cas en tunisie
Borhène Bahria
 
Các chính sách thu hút lao động nhập cư từ sinh viên quốc tế của Canada
Các chính sách thu hút lao động nhập cư từ sinh viên quốc tế của CanadaCác chính sách thu hút lao động nhập cư từ sinh viên quốc tế của Canada
Các chính sách thu hút lao động nhập cư từ sinh viên quốc tế của Canada
Công ty Du học Toàn cầu ASCI
 
Presentación EcoInteligencia Editorial
Presentación  EcoInteligencia  EditorialPresentación  EcoInteligencia  Editorial
Presentación EcoInteligencia Editorial
jesusbarrio
 

Viewers also liked (13)

Box live tv streaming
Box live tv streamingBox live tv streaming
Box live tv streaming
 
Figure 1.5
Figure 1.5Figure 1.5
Figure 1.5
 
P 005 micromachismos-el-poder-masculino-en-la-pareja-moderna
P 005 micromachismos-el-poder-masculino-en-la-pareja-modernaP 005 micromachismos-el-poder-masculino-en-la-pareja-moderna
P 005 micromachismos-el-poder-masculino-en-la-pareja-moderna
 
Importancia de la educación a distancia
Importancia de la educación a distanciaImportancia de la educación a distancia
Importancia de la educación a distancia
 
Finished codes and conventions front cover
Finished codes and conventions   front coverFinished codes and conventions   front cover
Finished codes and conventions front cover
 
Tarea seminario 2 fundamentos
Tarea seminario 2 fundamentosTarea seminario 2 fundamentos
Tarea seminario 2 fundamentos
 
Frases de filósofos
Frases de filósofosFrases de filósofos
Frases de filósofos
 
Why Techietechno is your IT Offshore Development Partner?
Why Techietechno is your IT Offshore Development Partner?Why Techietechno is your IT Offshore Development Partner?
Why Techietechno is your IT Offshore Development Partner?
 
Visión del indio desde el XIX hasta López Albújar
Visión del indio desde el XIX hasta López AlbújarVisión del indio desde el XIX hasta López Albújar
Visión del indio desde el XIX hasta López Albújar
 
No Control - Storyboard
No Control - StoryboardNo Control - Storyboard
No Control - Storyboard
 
marketing internationnel cas en tunisie
marketing internationnel cas en tunisiemarketing internationnel cas en tunisie
marketing internationnel cas en tunisie
 
Các chính sách thu hút lao động nhập cư từ sinh viên quốc tế của Canada
Các chính sách thu hút lao động nhập cư từ sinh viên quốc tế của CanadaCác chính sách thu hút lao động nhập cư từ sinh viên quốc tế của Canada
Các chính sách thu hút lao động nhập cư từ sinh viên quốc tế của Canada
 
Presentación EcoInteligencia Editorial
Presentación  EcoInteligencia  EditorialPresentación  EcoInteligencia  Editorial
Presentación EcoInteligencia Editorial
 

Similar to Keep Student information protected while improving services

Securing sensitive data for the health care industry
Securing sensitive data for the health care industrySecuring sensitive data for the health care industry
Securing sensitive data for the health care industry
CloudMask inc.
 
Protect your Data even under breach
Protect your Data even under breachProtect your Data even under breach
Protect your Data even under breach
CloudMask inc.
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
CloudMask inc.
 
Is data sovereignty the answer to cloud computing risks
Is data sovereignty the answer to cloud computing risksIs data sovereignty the answer to cloud computing risks
Is data sovereignty the answer to cloud computing risks
CloudMask inc.
 
27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx
lorainedeserre
 
27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx
jesusamckone
 
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyCyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
Organization
 
4.5.cloud security
4.5.cloud security4.5.cloud security
4.5.cloud security
DrRajapraveenkN
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data Governance
Kim Cook
 
Get The Information Here For Mobile Phone Investigation Tools
Get The Information Here For Mobile Phone Investigation ToolsGet The Information Here For Mobile Phone Investigation Tools
Get The Information Here For Mobile Phone Investigation Tools
Paraben Corporation
 
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Manish Sahani
 
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdf
Techugo
 
9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud
kairostech
 
Security and the cloud
Security and the cloudSecurity and the cloud
Security and the cloud
FREVVO
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
IT-Toolkits.org
 
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdf
Techugo
 
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix LLC
 
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx
durantheseldine
 
Big data security
Big data securityBig data security
Big data security
Anne ndolo
 
Big data security
Big data securityBig data security
Big data security
Anne ndolo
 

Similar to Keep Student information protected while improving services (20)

Securing sensitive data for the health care industry
Securing sensitive data for the health care industrySecuring sensitive data for the health care industry
Securing sensitive data for the health care industry
 
Protect your Data even under breach
Protect your Data even under breachProtect your Data even under breach
Protect your Data even under breach
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
 
Is data sovereignty the answer to cloud computing risks
Is data sovereignty the answer to cloud computing risksIs data sovereignty the answer to cloud computing risks
Is data sovereignty the answer to cloud computing risks
 
27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx
 
27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx
 
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyCyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
 
4.5.cloud security
4.5.cloud security4.5.cloud security
4.5.cloud security
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data Governance
 
Get The Information Here For Mobile Phone Investigation Tools
Get The Information Here For Mobile Phone Investigation ToolsGet The Information Here For Mobile Phone Investigation Tools
Get The Information Here For Mobile Phone Investigation Tools
 
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...
Research Report on Preserving Data Confidentiality & Data Integrity in ...
 
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdf
 
9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud
 
Security and the cloud
Security and the cloudSecurity and the cloud
Security and the cloud
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdf
 
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdf
 
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx
 
Big data security
Big data securityBig data security
Big data security
 
Big data security
Big data securityBig data security
Big data security
 

More from CloudMask inc.

Case Study - Global Collaboration Multidisciplinary Professional Services
Case Study - Global Collaboration Multidisciplinary Professional ServicesCase Study - Global Collaboration Multidisciplinary Professional Services
Case Study - Global Collaboration Multidisciplinary Professional Services
CloudMask inc.
 
Advanced persistent threat (apt) & data centric audit and protection (dacp)
Advanced persistent threat (apt) & data centric audit and protection (dacp)Advanced persistent threat (apt) & data centric audit and protection (dacp)
Advanced persistent threat (apt) & data centric audit and protection (dacp)
CloudMask inc.
 
Renewed Context for the Defense and Security Sector
Renewed Context for the Defense and Security SectorRenewed Context for the Defense and Security Sector
Renewed Context for the Defense and Security Sector
CloudMask inc.
 
Improve service while cutting cost
Improve service while cutting costImprove service while cutting cost
Improve service while cutting cost
CloudMask inc.
 
Protect your data against the Risk of unauthorized intrusions
Protect your data against the Risk of unauthorized intrusionsProtect your data against the Risk of unauthorized intrusions
Protect your data against the Risk of unauthorized intrusions
CloudMask inc.
 
Data breaach mitigation
Data breaach mitigationData breaach mitigation
Data breaach mitigation
CloudMask inc.
 
Securing data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsSecuring data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law Firms
CloudMask inc.
 

More from CloudMask inc. (7)

Case Study - Global Collaboration Multidisciplinary Professional Services
Case Study - Global Collaboration Multidisciplinary Professional ServicesCase Study - Global Collaboration Multidisciplinary Professional Services
Case Study - Global Collaboration Multidisciplinary Professional Services
 
Advanced persistent threat (apt) & data centric audit and protection (dacp)
Advanced persistent threat (apt) & data centric audit and protection (dacp)Advanced persistent threat (apt) & data centric audit and protection (dacp)
Advanced persistent threat (apt) & data centric audit and protection (dacp)
 
Renewed Context for the Defense and Security Sector
Renewed Context for the Defense and Security SectorRenewed Context for the Defense and Security Sector
Renewed Context for the Defense and Security Sector
 
Improve service while cutting cost
Improve service while cutting costImprove service while cutting cost
Improve service while cutting cost
 
Protect your data against the Risk of unauthorized intrusions
Protect your data against the Risk of unauthorized intrusionsProtect your data against the Risk of unauthorized intrusions
Protect your data against the Risk of unauthorized intrusions
 
Data breaach mitigation
Data breaach mitigationData breaach mitigation
Data breaach mitigation
 
Securing data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsSecuring data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law Firms
 

Recently uploaded

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 

Recently uploaded (20)

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 

Keep Student information protected while improving services

  • 1. CloudMask thinks differently in the secure-cloud landscape. The education industry keeps sensitive data secure with CloudMask. The economic value proposition of Software as a Service (SaaS) is undeniable. SaaS is disrupting industry after industry, making accessible to sole proprietors and small businesses software functionality that historically required significant investment in hardware, software, and annual maintenance fees. This, in turn, is making smaller players even more agile and efficient than they used to be, allowing them to run competitive circles around larger or laggard players. The good news is that rich software functionality is often available for less than $100 per month, enabling high levels of business management and administrative efficiencies. The bad news is that the tempting sky of cloud and SaaS computing is filled with thunderclouds of cybersecurity concerns. Despite the best efforts of traditional cybersecurity experts, the adoption of cloud computing has been accompanied by an ever-growing number of egregious data breaches. These breaches damage brands and drive up significant costs for investigations, notification, and identity-theft protection for clients whose personal information has drifted into malicious hands. So, what’s going on? Why do even the largest enterprises struggle with securing their data? Wouldn’t the National Security Agency be one of the most rigorous security practitioners in the world? What leaks have we not yet detected? One thought leader at a major global cybersecurity consultancy explained it like this: “We’re trying to examine every packet that flows across the perimeter of the network and notice IP addresses that don’t make sense. This is incredibly hard. There’s a ridiculous amount of data, and we’ve entered an age where the network no longer has clear boundaries. We really haven’t solved that problem. What is the problem? The problem lies in the way traditional security thinkers have defined the problem. They’re working with a castle-and-moat metaphor, where the internal network is protected with a set of security rings. Each ring, however, has costly hardware and software searching for malevolent inbound and outbound data. But it’s like looking for needles in a haystack. And even if security experts are successful at protecting the perimeter, there is little protection against insiders (employees or others with access to the internal network). Keep Student information protected while improving services
  • 2. CloudMask thinks differently. We see the problem in simpler terms: protecting sensitive data and ensuring that only authorized users, using known devices, can see data in the clear. We’re happy to let the traditional security experts work on their perimeters, knowing that when they fail, our customers’ data remains secure. And, in contrast with products designed for big enterprises, we’ve created a solution that can be installed, configured, and afforded by small businesses without IT staff. The SaaS Security Problem – Simplified SaaS applications use best-practice security protocols and rely on their cloud provider to secure the infrastructure the application runs on. One vendor explains it this way: “We ensure that your communications are secure using bank-grade 256-bit SSL encryption. All of (our) infrastructure is hosted using physically secure, managed data centers that meet the rigid SSAE 16 specifications. Geo-redundant backups are performed multiple times per day, and site security and privacy are routinely audited by respected third parties.” By means of 256-bit SSL encryption, the connection between your browser or app and database servers is secured. When you submit a query or update, the data is encrypted as it transits the internet. Once the data reaches the data center, it is decrypted for insertion into the app’s database. The data center itself (e.g., Amazon Web Services) has a rigorous set of security controls and protocols, meaning that only employees with the proper identification and access passwords can physically or virtually access the servers that hold the application’s data. SSAE 16 is a standard according to which data centers are audited for their degree of compliance with policy. There are three vulnerabilities that should concern executives: 1. Anyone who tricks a user into revealing their username and password can impersonate that user and log in from any browser in the world. Such a hacker can impersonate the user and perform administrator functions. You don’t have to be a fool to have this happen to you. Even a sophisticated user like CIA Director John Brennan has fallen prey to high school-age hackers. 2. Any insider (employee of the data center) can turn from “good” to “bad” overnight or have their credentials stolen, meaning that an authorized system administrator could access application data for malevolent purposes. Insiders don’t need to be “bad” to present a threat. They can simply be careless. A recent report on cybersecurity suggests that less than 50 percent of organizations have adequate policies in place to mitigate insider-threat risks. The challenge here is that executives depend on their SaaS provider, who in turn rely on their cloud service providers to maintain security hygiene. That’s a lot of blind faith. 3. Governments have the desire, capacity and experience to tap into the cloud-service providers who hold the world’s data. The problem here is manifold. On the one hand, the government can access specific information based on a warrant. On the other hand, it is an entirely different matter to access everything on an as-needs basis, under cover of National Security Letters or their equivalent. Despite their best efforts to security screen and oversee intelligence and law enforcement operations, the government also falls prey to “trusted” staff performing unauthorized actions. These vulnerabilities impact the firm’s liability for data breaches and the capacity to deliver on a promise of client confidentiality and privacy. In storing sensitive personal and other data, the firm is considered a data controller. As a data controller, the firm is subject to a variety of data protection laws and regulations. Such regulations increasingly create a costly burden to notify individuals affected by data breaches and to purchase several years of identity-theft protection. Emerging European laws impose heavy fines for firms who violate data protection regulations.
  • 3. Higher learning institutions are leading the way. Increasingly, we are seeing instances of cloud use in universities and institutions of higher learning moving their applications to the cloud. Although the rate of movement is somewhat lower than the broader market, the trend is clearly visible. Universities are moving to the cloud for a large number of applications, including student engagement, learning, research, inter-university collaboration and routine management of university operations. While many educational institutions tend to be conservative about their use of technology, there is no doubt that cloud-based educational services will dominate information technology use in higher learning institutions in the years to come. When researchers studied the adoption of cloud computing in a large number of universities, they found that universities welcomed the agility, scalability and functionality that cloud computing offered them. It became clear that their own resources would not be adequate to build the capabilities that cloud computing gave them. The day is not far away when researchers will ask for 100 hours of virtual server time rather than ask for a server. In a large number of cases users are already setting up virtual servers on popular cloud-service providers. The benefits are simply too great to ignore. Cloud security is still a major concern. There is a very real nervousness shared by the higher learning community about cloud security, and many universities prefer private clouds to public ones. With security as their number one concern, all universities are very wary about putting any intellectual property on public clouds. This is not just about students breaking into question banks and altering marks; there are also serious issues of export control over research material and implementation of intellectual property rights (IPR). Data centers could exist outside the country, and there are serious cross-border data transfer issues, especially for institutes engaged in cutting-edge research. Institutes that violate export control and IPR laws could easily find their funding cut off and criminal charges being pressed. Compliance costs are soaring. A study by Vanderbilt University found that the cost of regulatory compliance in higher education was as high as 6.4% of the total operating expenditures. Research-related security compliance could go as high as 25% of the overall research expenditure, and when the cost of compliance was extrapolated to the entire education sector, the figure came to an astounding $27 billion. While this covers compliance with all federal laws, a substantial portion of it would be related to managing security of data. Therefore, it is important to understand some of the laws that govern the functions of schools and universities in the country. There are a large number of laws that apply to educational institutions. Many of these can be infringed if data stored in the cloud is disclosed, lost or stolen. The most well-known of these, of course, is the FERPA Act—the Family Education Rights and Privacy Act. This law applies to all schools that receive funds from the US Department of Education. FERPA defines how student records are to be handled and what can and cannot be disclosed. An institution that does not comply with FERPA may be deprived of federal funds and even be liable to fines and monetary damages. Other laws include the Campus Safety and Security Act (Clery Act), that requires collection and classification of crime statistics, the Drug and alcohol abuse prevention Drug Free Schools and Communities Act (DFSCA), various Financial Aid programs, Sexual misconduct Title IX, Violence Against Women Act (VAWA), FISMA Federal Information Security Management Act. Growing numbers of students admitted from foreign countries will require a means to manage their admission process and visa applications. All of these management tasks can be processed in the cloud but will require to be adequately protected. There are also non-education related laws requiring compliance. For example, the HIPAA Health Insurance Portability and Accountability Act of 1996 requires that all medical data about student and employee health has to be held in accordance with HIPAA regulations.
  • 4. The requirement of securing data required under these acts can be met only if data is encrypted completely during storage or during transmission. However, the problem occurs during data processing. Encrypted data cannot be processed unless every application is specifically rewritten to be built to handle such data. This is simply not possible, and thus all applications decrypt data before processing it. Where does data exposure take place? The threat of data exposure lies in the duration when data is decrypted prior to processing. A hacker could gain access to data at this vulnerable stage. The university would be forced to make a disclosure as required by law, and there would be severe consequences. Besides legal consequences, there would be a major loss of intellectual property. Such a proprietary fear is holding back the deployment of cloud technology in education at a sufficient pace. As a result, universities are losing money. The solution lies in a data protection mechanism that understands the various components of data and knows how to encrypt and protect them selectively so that processing of this data in a cloud-based application does not require the entire data to be decrypted. For example, if the personal details of a student were to be secured, then the rest of the data collected under the Drug Free Schools Act would no longer be sensitive data. Going case by case, a data security specialist can create a program to ensure complete security and compliance while allowing the university to use cloud-based resources. Who is CloudMask? CloudMask is a specialist company in the domain of data security whether in the cloud or in premises. Using technology that CloudMask has developed itself, data is segregated into several groups. One kind of data can be encrypted; another can be masked or tokenized. Masked or tokenized data has the same format as the original data except that the original student name or Social Security Number, for example, would be replaced by a dummy value. This dummy value would allow for all processing to be carried out in the cloud and even if there is a loss of data, there would be no repercussions because the identifying elements are masked and other elements are encrypted. In this manner, data is anonymized, and universities can now use the cloud with confidence. When CloudMask protection is applied to data, even if an attacker has complete access to the application or database, he will not be able to obtain any data of value. In such a situation, the organization may not even have to report any loss of data because what has been stolen is, after all, encrypted gibberish. CloudMask solutions can be deployed rapidly at very low costs. Universities will not be required to install any expensive and complex encryption gateways. Encryption starts at the PC of the user who is creating the data, and every individual element is protected as data is being keyed in. Though your university could be using any software solution, CloudMask will be able to provide protection without needing to alter the application in any way. If you think the solution is not to use cloud, think again. The concerns outlined above have caused many organizations to have misgivings about adopting cloud-based solutions, presuming that an on-premise solution (a server running in your office) is safer. Unfortunately, that is not the case. Your office or server room isn’t nearly as secure as an access-controlled data center.
  • 5. CloudMask: a silver lining for SaaS CloudMask addresses these vulnerabilities in a way that enables executives to immunize their firms against data- breaches, differentiate by offering highly secure data management and communications, and using economical cloud services with confidence. CloudMask can provide SaaS users with an easy-to-install browser extension that automatically masks sensitive data before it enters the 256-bit encryption channel to the data center. When that data arrives at the data center where the 256- bit protection ends, CloudMask data stays masked. This process also works in reverse, as in the case when the user requests sensitive data. Here the masked data is double- encrypted as it moves through the secured communications channel. When it arrives in the browser, the 256-bit encryption is removed, and CloudMask seamlessly unmasks to present the data in the clear. Alongside controlling users and their access rights, practice management account owners/administrators have the capacity to select specific fields to be masked. Not all data needs to be masked and protected, but data categorized as sensitive personal data, personally identifying, or otherwise confidential, can be selected for automated, seamless masking and unmasking. From a functional perspective, CloudMask resolves the concerns that executives might have with respect to using SaaS applications: 1. Each user authorized to access the SaaS account installs a CloudMask browser extension that is activated through a simple process generating the personal, private and public keys required for the encryption process. What’s more, the extension can be installed on multiple personal devices, each of which is personalized with a private key. Thus, even if a username and password are somehow compromised, which under normal circumstances would allow anyone anywhere in the world to log into the account and see data in the clear, the unauthorized user cannot do so without access to the specific devices configured with the personalized browser extension. 2. The data stored under care of the data center remains masked while at rest or in motion. Neither the practice management SaaS vendor nor CloudMask administrators nor data center administrators, have keys that can be used to unmask the data. If the data center suffers a breach (e.g., an unauthorized insider penetrates the database, or a government agency serves a National Security Letter), data the user has designated as sensitive remains protected. 3. The data stored under care of the data center is masked in such a way (“tokenization”) that anonymizes what was previously sensitive data. Thus, even if that data is stolen, it is no longer considered sensitive personal information or personally identifying information, so it no longer falls under data protection regulations or requirements. In other words, breaches of systems holding tokenized data do not trigger the costly response and remediation efforts associated with breaches of systems holding sensitive personal information. The Technical Story A separate e-book explains the technical details behind this process and the software that automates it, as well as describing the benefits of encrypting and tokenizing data, which we collectively refer to as “masking.” The e-book also provides a brief explanation of the well-established public/private key methods used by the encryption process. Grounded Confidence CloudMask is unique in having its “CloudMask engine” certified through a Common Criteria for Information Technology Security Evaluation (Common Criteria) process, which is used by twenty-six federal governments to evaluate security products for their own use. The process of independent evaluation assesses whether a product’s functional claims live up to the way it is coded and performs. Many products claim to be “bank-grade” or “military-grade,” both of which are subjective assessments. CloudMask is the only data-masking product capable of working with SaaS offers to achieve Common Criteria certification. More expensive competitors like Cipher Cloud and Ionic have not achieved such objective criteria. Technical advisors can access CloudMask’s Common Criteria Assessment here. It’s easy to get started with CloudMask. Visit www.cloudmask.com