ALL >> Computers >> View Article
Cloud Encryption Frustrates Government Surveillance
For Jeremy Lindhoff, one NSA powerpoint slide in a recent article based on materials released by whistleblower Edward Snowden caught his eye. “The diagram shows the NSA intercepting data between our datacenters, without approaching us with a court order to discover our customer’s information.”
His operations team at a large US cloud provider was tasked with identifying ways to protect their customer’s data from what they saw as rogue surveillance. Cloud Encryption, that is encrypting data as it travels between the company’s datacenters, was decided to solve the surveillance problems.
Inside the firewall, data is protected by encryption and data loss prevention policies. With more corporate data moving to the cloud, the network edge is also moving from the firewall into the cloud. Companies need more than a firewall, they need a virtual “cloud edge” to protect data wherever it goes.
The cloud encryption schemes not only protect data as it transits between datacenters, they also apply it to data stored in server farms. That way, ...
... if an attacker were to breach the network defenses and gain access to the information, it would be inaccessible and unreadable without the encryption keys to decrypt the information. In a sense, encryption is an additional layer of protection, a final defense against security breaches or third party surveillance of data as it moves around the Internet.
Their solution does not distinguish between an attacker and any unauthorized third party. “We liked the solution because it doesn’t matter if the intruder is a government agency without permission to view the data, or a cyber criminal, the data is always protected no matter if it’s stored or being moved between datacenters or between a datacenter and the customer,” said Lindhoff.
“Ultimately, every cloud provider will need to embrace a level of security that meets the needs of their customers in order to address customer fears,” says Luke Abbott, an information security analyst and advisor to corporate clients investing in technology. According to Abbott, cloud encryption is the ideal defense because it prevents surveillance, security breaches, and maintains the end user experience.
Author:
Skyhigh Networks, the Cloud Security company, enables companies to embrace Cloud Services with appropriate levels of security, compliance, and governance while lowering overall risk and cost. With customers in financial services, healthcare, high technology, media, manufacturing, and legal verticals, the company was a finalist for the RSA Conference 2013 Most Innovative Company award and was recently named a "Cool Vendor" by Gartner, Inc. Headquartered in Cupertino, Calif., Skyhigh Networks is led by an experienced team and is venture-backed by Greylock Partners and Sequoia Capital. For more information on Cloud Encryption, visit us at http://www.skyhighnetworks.com/cloud-encryption/ or follow us on Twitter@skyhighnetworks.
Add Comment
Computers Articles
1. Few Good Insights To Follow With Pc Gaming In Australia!Author: Jack Williams
2. Transform Your Online Store With Australia's Leading Ecommerce Developers
Author: themerchantbuddy
3. How To Choose The Right Technology For Your mobile App?
Author: goodcoders
4. The Rise Of User Centered Web Design
Author: goodcoders
5. Reasons Why Laravel Perfect For Web Development?
Author: goodcoders
6. Ssd Vs Sas Vs Sata Drives: Which Is Better For Your Dedicated Server Hardware?
Author: The CyberTech
7. Raid Servers And Data Protection: Common Myths About Raid Servers
Author: The CyberTech
8. Top 8 Do's And Don’ts When Dealing With A Corrupted Sd Card
Author: The CyberTech
9. Nvme Vs Ssd: What To Choose For Your Storage Solutions?
Author: The CyberTech
10. 8 Common Data Recovery Myths Exposed!
Author: The CyberTech
11. Understanding Ssd Lifespan: Signs, Durability, Data Recovery, And Factors Affecting The Life Of An Ssd
Author: The CyberTech
12. Server Data Recovery Solutions: When Your Raid Server Is Crashed!
Author: The CyberTech
13. Data Recovery Solutions For Undetected Ssd On Bios
Author: The CyberTech
14. Problems Faced By Mobile Phone Users: Green Line Issue, Motherboard Failure, Phone Stuck On Logo And Mobile Data Recovery Possibilities
Author: The CyberTech
15. Ssd Vs Hdd: Weaknesses, Data Recovery Factors And Failure Rates
Author: The CyberTech