123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Cloud Encryption Frustrates Government Surveillance

Profile Picture
By Author: skyhighnetworks
Total Articles: 54
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

For Jeremy Lindhoff, one NSA powerpoint slide in a recent article based on materials released by whistleblower Edward Snowden caught his eye. “The diagram shows the NSA intercepting data between our datacenters, without approaching us with a court order to discover our customer’s information.”

His operations team at a large US cloud provider was tasked with identifying ways to protect their customer’s data from what they saw as rogue surveillance. Cloud Encryption, that is encrypting data as it travels between the company’s datacenters, was decided to solve the surveillance problems.

Inside the firewall, data is protected by encryption and data loss prevention policies. With more corporate data moving to the cloud, the network edge is also moving from the firewall into the cloud. Companies need more than a firewall, they need a virtual “cloud edge” to protect data wherever it goes.

The cloud encryption schemes not only protect data as it transits between datacenters, they also apply it to data stored in server farms. That way, ...
... if an attacker were to breach the network defenses and gain access to the information, it would be inaccessible and unreadable without the encryption keys to decrypt the information. In a sense, encryption is an additional layer of protection, a final defense against security breaches or third party surveillance of data as it moves around the Internet.

Their solution does not distinguish between an attacker and any unauthorized third party. “We liked the solution because it doesn’t matter if the intruder is a government agency without permission to view the data, or a cyber criminal, the data is always protected no matter if it’s stored or being moved between datacenters or between a datacenter and the customer,” said Lindhoff.

“Ultimately, every cloud provider will need to embrace a level of security that meets the needs of their customers in order to address customer fears,” says Luke Abbott, an information security analyst and advisor to corporate clients investing in technology. According to Abbott, cloud encryption is the ideal defense because it prevents surveillance, security breaches, and maintains the end user experience.

Author:
Skyhigh Networks, the Cloud Security company, enables companies to embrace Cloud Services with appropriate levels of security, compliance, and governance while lowering overall risk and cost. With customers in financial services, healthcare, high technology, media, manufacturing, and legal verticals, the company was a finalist for the RSA Conference 2013 Most Innovative Company award and was recently named a "Cool Vendor" by Gartner, Inc. Headquartered in Cupertino, Calif., Skyhigh Networks is led by an experienced team and is venture-backed by Greylock Partners and Sequoia Capital. For more information on Cloud Encryption, visit us at http://www.skyhighnetworks.com/cloud-encryption/ or follow us on Twitter@skyhighnetworks.

Total Views: 369Word Count: 446See All articles From Author

Add Comment

Computers Articles

1. What Is Power Bi: Your Questions Are Answered By A Bi Consultant
Author: goodcoders

2. Unlocking The Power Of Digital Marketing In Bangalore: Why Choose A Leading Digital Marketing Agency
Author: Cubikeymedia

3. Top 5 Innovation Management Software Of 2025
Author: Ben Gross

4. Top 5 Mlops Tools Of 2025
Author: Ben Gross

5. Top Cybersecurity Trend 2025 | Vapt & Soc Services In India
Author: Reinfosec

6. Best Alternative Dating Apps Like Tinder
Author: goodcoders

7. Best 9 Programming Languages For Blockchain App Development
Author: goodcoders

8. The Significance Of Early Exposure To Ai And Robotics For Kids
Author: stem-xpert

9. Top 5 Cloud Analytics Platforms Of 2025
Author: Ben Gross

10. Top 5 Network Monitoring Systems Of 2025
Author: Ben Gross

11. Revolutionise Your Training Management With Xsosys Technology
Author: Xsosys Technology(S) Pte. Ltd.

12. Rugtek Printers: Your Complete Guide To Selecting The Perfect Model
Author: srikanth

13. Rsgoldfast Runescape Gold:fishing
Author: RuneScape gold

14. Understanding Mobile Intranet Workflow
Author: goodcoders

15. How To Personalize Your Mobile Ux?
Author: goodcoders

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: