ALL >> Computers >> View Article
Cloud Security Cup: Usa Vs. Europe (spoiler – It’s Not A 0-0 Draw)
With the World cup in full swing, one cannot help but compare the US to our neighbors around the world. The event begs it. We see our skills, our style, our strategy and our fans all juxtaposed with more established soccer powers from around the globe.
And, I have to admit, some things are just better in Europe: Soccer for one. If pressed, I’ll concede fashion, sports cars, and public transportation as well. But what about Cloud Security?
Privacy: Europe 1 – US 0
Given the concerns around the US Patriot Act and US government-issued blind subpoenas, there is a growing school of thought encouraging IT shops to use cloud services that are headquartered in privacy-friendly countries (i.e. EU).
Why? Well, under the US Patriot Act, US intelligence agencies are permitted to access data owned by non-US citizens stored on clouds hosted by US companies.
This perspective has been championed by European IT leaders such as John Finch, CIO of the Bank of England. He’s said, “You need to think about where Cloud companies are domiciled. Even if that well-known cloud provider says ‘don’t ...
... worry’, if they’re an American company, your data is linked to the American Patriot Act. That means if the FBI or CIA want it, they’ve got it. Think about what you’re giving and when.”
Security: US 1 – Europe 0
However, the data tells a different story. While privacy is important, one cannot ignore data security. Based on statistics from Skyhigh’s Cloud Registry, which uses a security framework developed in conjunction with the Cloud Security Alliance (CSA), 9% of cloud services headquartered in the EU are high risk, compared to only 5% of cloud services headquartered in the US. So, while EU-based cloud services provide some protection from the US Patriot Act, they do expose organizations to greater security risks.
WWJKD (What Would Jürgen Klinsmann Do)?
So, if using US providers isn’t the answer, what is? Encryption is one effective solution that is gaining traction for many cloud consumers. It’s important that your cloud provider provide encryption for data not just in transit, but at rest as well. Equally important, especially for European customers concerned with the privacy of their data hosted by US cloud providers, is encryption key management. If your cloud provider owns the encryption keys, the US government can subpoena your cloud provider, forcing them to de-crypt and share your data. Further, they can issue a gag order to your cloud service provider so this is done without your knowledge. In order to protect your company’s security and privacy, make sure you encrypt sensitive data AND manage your own encryption keys.
Author :
Skyhigh Networks, the Cloud Security Services company, enables companies to embrace Cloud Security Services with appropriate levels of security, compliance, and governance while lowering overall risk and cost. With customers in financial services, healthcare, high technology, media, manufacturing, and legal verticals, the company was a finalist for the RSA Conference 2013 Most Innovative Company award and was recently named a "Cool Vendor" by Gartner, Inc. Headquartered in Cupertino, Calif., Skyhigh Networks is led by an experienced team and is venture-backed by Greylock Partners and Sequoia Capital. For more information, visit us at http://www.skyhighnetworks.com or follow us on Twitter@skyhighnetworks.
Add Comment
Computers Articles
1. Few Good Insights To Follow With Pc Gaming In Australia!Author: Jack Williams
2. Transform Your Online Store With Australia's Leading Ecommerce Developers
Author: themerchantbuddy
3. How To Choose The Right Technology For Your mobile App?
Author: goodcoders
4. The Rise Of User Centered Web Design
Author: goodcoders
5. Reasons Why Laravel Perfect For Web Development?
Author: goodcoders
6. Ssd Vs Sas Vs Sata Drives: Which Is Better For Your Dedicated Server Hardware?
Author: The CyberTech
7. Raid Servers And Data Protection: Common Myths About Raid Servers
Author: The CyberTech
8. Top 8 Do's And Don’ts When Dealing With A Corrupted Sd Card
Author: The CyberTech
9. Nvme Vs Ssd: What To Choose For Your Storage Solutions?
Author: The CyberTech
10. 8 Common Data Recovery Myths Exposed!
Author: The CyberTech
11. Understanding Ssd Lifespan: Signs, Durability, Data Recovery, And Factors Affecting The Life Of An Ssd
Author: The CyberTech
12. Server Data Recovery Solutions: When Your Raid Server Is Crashed!
Author: The CyberTech
13. Data Recovery Solutions For Undetected Ssd On Bios
Author: The CyberTech
14. Problems Faced By Mobile Phone Users: Green Line Issue, Motherboard Failure, Phone Stuck On Logo And Mobile Data Recovery Possibilities
Author: The CyberTech
15. Ssd Vs Hdd: Weaknesses, Data Recovery Factors And Failure Rates
Author: The CyberTech