2016 Cloud Security Trends: Confidence on the Rise

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next 2016 Cloud Security Trends: Confidence on the Rise-5 Next

More Tokenization

Tokenization has long been used by the PCI industry to protect credit card data from breach while retaining its vital usability for business processes. Now organizations from every sector are taking advantage of the technology in the cloud to confidently desensitize important information in order to meet ever more astringent data laws and regulations. Long established regulatory authorities have updated or are reissuing guidelines to ensure data security is extended into the cloud, and governments across the globe are rewriting their data protection laws to reflect technological advances made since their inception. The European Court of Justice recently declared EU-US data-sharing framework Safe Harbor invalid, leaving international businesses under considerable pressure to find alternatives before the new EU Data Protection Regulation is published at the end of this year. Tokens have no mathematical relationship to the original data and can be used in SaaS applications to protect multiple data types from exposure as they travel across international borders. And, as no real data is present, data sovereignty and privacy laws can be honored.

As a direct response to the market, cloud service providers have sought to address concerns that inhibited widespread mainstream adoption. Companies like Amazon, Salesforce and Xactly -- keen to reassure customers and make their services ubiquitous -- have made huge improvements in transparency, identifying vulnerabilities, offering encryption, automated updates and more stringent authentication, while other vendors are offering cloud data protection gateways, security as a service or allowing business users to bring their own encryption keys.

As a result, cloud security is no longer seen as such a vulnerability and businesses in every sector are now confidently adopting the technology despite the sensitive nature of the information they hold. However, it is important that organizations are cognizant that responsibility for data is not outsourced along with the service; the responsibility remains that of the owner. In this slideshow, Protegrity highlights five trends on cloud security in today's most data-driven organizations.


Related Topics : IBM Looks to Redefine Industry Standard Servers, APC, Brocade, Citrix Systems, Data Center

More Slideshows

Holiday20-190x128 5 Ways to Protect Your Data Center from a 'Zombie' Server Attack

It's easy to forget about the ghosts of servers past that are hiding in the background, continuing to consume electricity and potentially exposing organizations to malicious attacks. ...  More >>

cloud50-190x128.jpg How to Use the Cloud to Become a High-Velocity Business

Cloud SaaS adoption allows organizations to gain the flexibility and scalability necessary for creating a high-velocity business. ...  More >>

DynCloudInternetVisibility0x 8 Reasons the Enterprise Needs More Visibility into the Cloud

IT executives need the right tools to monitor and control their cloud infrastructure to maximize the positive impacts and mitigate security threats. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.