dcsimg

2016 Cloud Security Trends: Confidence on the Rise

  • 2016 Cloud Security Trends: Confidence on the Rise-

    More Control

    For some industries, the sensitivity of their data is greater and more of a priority due to the nature of their business, internal policy, industry regulation or national and international law.

    In this situation, organizations look to secure the enterprise for peace of mind and compliance but, as traditional boundaries are blending with the cloud, Gartner recognizes that the flow of data is hard to manage and suggests using Cloud Access Security Brokers (CASBs) as a "required" solution. CASBs protect data and enable cloud adoption without loss of control using an encryption or tokenization gateway and authentication, providing more granular access to data and visibility by defining and logging who sees what, where and when.

1 | 2 | 3 | 4 | 5 | 6 | 7

2016 Cloud Security Trends: Confidence on the Rise

  • 1 | 2 | 3 | 4 | 5 | 6 | 7
  • 2016 Cloud Security Trends: Confidence on the Rise-4

    More Control

    For some industries, the sensitivity of their data is greater and more of a priority due to the nature of their business, internal policy, industry regulation or national and international law.

    In this situation, organizations look to secure the enterprise for peace of mind and compliance but, as traditional boundaries are blending with the cloud, Gartner recognizes that the flow of data is hard to manage and suggests using Cloud Access Security Brokers (CASBs) as a "required" solution. CASBs protect data and enable cloud adoption without loss of control using an encryption or tokenization gateway and authentication, providing more granular access to data and visibility by defining and logging who sees what, where and when.

As a direct response to the market, cloud service providers have sought to address concerns that inhibited widespread mainstream adoption. Companies like Amazon, Salesforce and Xactly -- keen to reassure customers and make their services ubiquitous -- have made huge improvements in transparency, identifying vulnerabilities, offering encryption, automated updates and more stringent authentication, while other vendors are offering cloud data protection gateways, security as a service or allowing business users to bring their own encryption keys.

As a result, cloud security is no longer seen as such a vulnerability and businesses in every sector are now confidently adopting the technology despite the sensitive nature of the information they hold. However, it is important that organizations are cognizant that responsibility for data is not outsourced along with the service; the responsibility remains that of the owner. In this slideshow, Protegrity highlights five trends on cloud security in today's most data-driven organizations.