2016 Cloud Security Trends: Confidence on the Rise

1 | 2 | 3 | 4 | 5 | 6 | 7
Next 2016 Cloud Security Trends: Confidence on the Rise-5 Next

More Tokenization

Tokenization has long been used by the PCI industry to protect credit card data from breach while retaining its vital usability for business processes. Now organizations from every sector are taking advantage of the technology in the cloud to confidently desensitize important information in order to meet ever more astringent data laws and regulations. Long established regulatory authorities have updated or are reissuing guidelines to ensure data security is extended into the cloud, and governments across the globe are rewriting their data protection laws to reflect technological advances made since their inception. The European Court of Justice recently declared EU-US data-sharing framework Safe Harbor invalid, leaving international businesses under considerable pressure to find alternatives before the new EU Data Protection Regulation is published at the end of this year. Tokens have no mathematical relationship to the original data and can be used in SaaS applications to protect multiple data types from exposure as they travel across international borders. And, as no real data is present, data sovereignty and privacy laws can be honored.

As a direct response to the market, cloud service providers have sought to address concerns that inhibited widespread mainstream adoption. Companies like Amazon, Salesforce and Xactly -- keen to reassure customers and make their services ubiquitous -- have made huge improvements in transparency, identifying vulnerabilities, offering encryption, automated updates and more stringent authentication, while other vendors are offering cloud data protection gateways, security as a service or allowing business users to bring their own encryption keys.

As a result, cloud security is no longer seen as such a vulnerability and businesses in every sector are now confidently adopting the technology despite the sensitive nature of the information they hold. However, it is important that organizations are cognizant that responsibility for data is not outsourced along with the service; the responsibility remains that of the owner. In this slideshow, Protegrity highlights five trends on cloud security in today's most data-driven organizations.


Related Topics : IBM Looks to Redefine Industry Standard Servers, APC, Brocade, Citrix Systems, Data Center

More Slideshows

HCI 10 Reasons Why the Enterprise Is Turning to Hyperconverged Infrastructure

While HCI is certainly innovative in design, its true measure lies in the practical benefits it brings to data center management and operations. ...  More >>

DataM63-290x195 Data Storage Today: Key Takeaways from VMworld 2016

Survey findings include pain points for secondary storage, average restore times, the growth of hyperconvergence and rate of cloud adoption in enterprises.  ...  More >>

cloud51-190x128 5 Best Practices for Managing Zombie Cloud Infrastructure

IT administrators need to identify zombie assets, verify idle status and shut off anything that is unused. Here's how to get your dormant infrastructure back in shape. ...  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.