5 Ways to Keep Mission-Critical Data Safe in the Cloud

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next 5 Ways to Keep Mission-Critical Data Safe in the Cloud-4 Next

Architecture Matters

It is tempting to simply rely on a provider's SLAs and ignore the gory details – and many providers prefer you do just that, but when it comes to security, details matter. How can you be sure that the physical servers hosting your VMs and data are pristine and uncompromised? Intel has had chip-level technologies to address that issue for generations – specifically TXT – but providers often fail to enable these features. This is equally true for your private cloud servers as it is for providers. Do you have data locality requirements? Intel TXT addresses this concern as well with geo-location and geo-fencing. Refer to NIST 7904 for information about trusted geo-location. When combined with encryption, you can ensure that your company's virtual machines and data cannot be hijacked and copied to another cloud where they could be subjected to a brute force attack at the BIOS level. Ask your providers about their trusted platform and TXT support.

Before any company moves to the cloud, an inevitable question is asked: Will our data be secure? A 2014 IBM study found that while 85 percent of chief information security officers (CISOs) believe their company's move to the cloud is imminent, more than 40 percent also believe a significant security breach will happen at a major cloud provider. 

As businesses shift their mission-critical workloads to the cloud, IT departments are tasked with not only managing company data, but also securing it. Choosing a cloud service provider that fits your security strategy is key. IT Business Edge recently spoke with Sean Jennings, co-founder and SVP of solutions architecture at Virtustream, who shared five cloud security and compliance tips for IT leaders as they transition their companies to the cloud.


Related Topics : IBM Looks to Redefine Industry Standard Servers, APC, Brocade, Citrix Systems, Data Center

More Slideshows

Holiday20-190x128 5 Ways to Protect Your Data Center from a 'Zombie' Server Attack

It's easy to forget about the ghosts of servers past that are hiding in the background, continuing to consume electricity and potentially exposing organizations to malicious attacks. ...  More >>

cloud50-190x128.jpg How to Use the Cloud to Become a High-Velocity Business

Cloud SaaS adoption allows organizations to gain the flexibility and scalability necessary for creating a high-velocity business. ...  More >>

DynCloudInternetVisibility0x 8 Reasons the Enterprise Needs More Visibility into the Cloud

IT executives need the right tools to monitor and control their cloud infrastructure to maximize the positive impacts and mitigate security threats. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.