Cloud Security is not equal to Cloud Data Security

Page 1

Cloud Security is not equal to Cloud Data Security


Overview

• Cloud security refers to the security used for the cloud infrastructure, including the security of the network in the cloud, the operating systems, and the applications provided.

OVERVIEW

• Cloud data protection is the practice of securing a company’s data in a cloud environment, wherever that data is located, whether it’s at rest or in motion, and whether it’s managed internally by the company or externally by a third party. • Enterprises must understand that the security of the cloud infrastructure is the cloud service provider’s responsibility, but that doesn’t transfer the responsibility of data security on the cloud. Enterprises must take measures to protect data going to the cloud themselves 2


Cloud Security Vs Cloud Data Security

• Cloud security refers to the security used for the cloud infrastructure, including the security of the network in the cloud, the operating systems, and the applications provided.

CLOUD SECURITY VS CLOUD DATA SECURITY

• Cloud data protection is the practice of securing a company’s data in a cloud environment, wherever that data is located, whether it’s at rest or in motion, and whether it’s managed internally by the company or externally by a third party.

3


Security Concern

The research conducted by the Wiz Research team about permissions provided to third-party vendors in cloud environments is an eye-opener:

SECURITY CONCERN

• 82% of companies provide third-party vendors with highly privileged roles, which poses a significant risk to sensitive data. • 15% of vendors receive extensive write-permissions that allow them to modify documents on the cloud. • 90% of cloud security teams are unaware of permission levels given to third-party vendors. 4


Data-Centric approach to the Cloud Data Security Taking a data-centric approach to the cloud data security is the only option here, which may include:

DATA-CENTRIC APPROACH TO THE CLOUD DATA SECURITY

Reduce data going to the cloud: Many times, it’s possible to simply remove the data stored in a cloud service if it is not required to be there. Detect and classify data going to the cloud: This is a standard functionality in any Cloud Access Security System (CASB) systems and some DLP systems, too, but there are also specialist discovery and classification systems that provide this functionality for cloud applications. Seclore a pioneer in industry best of breed data-centric solutions provides cloud data security solutions by adding granular, persistent usage controls to sensitive data accessed, downloaded, or emailed from the cloud.

5


About Seclore

ABOUT SECLORE

●Seclore offers the market’s first browser-based Data-Centric Security Platform, which gives organizations the agility to utilize best-of-breed solutions to discover, identify, protect, and audit the usage of data wherever it goes, both within and outside of the organization’s boundaries. ●The ability to automate the data-centric security process enables organizations to fully protect information with minimal friction and cost. ●Over 2000 companies in 29 countries are using Seclore to achieve their data security, governance, and compliance objectives. 6


Contact US

●691 S. MILPITAS BLVD SUITE # 217 MILPITAS, CA 95035

CONTACT US

●1-844-4-SECLORE 1-844-473-2567 ●INFO@SECLORE.COM

7


Thank you!


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.