Below, please find a transcription of the video’s content.
Thanks for joining us for another whiteboard session. Today, we’ll be discussing cloud data protection.
I want to talk about cloud data protection because Forrester came out with a market overview of the space focusing on three core takeaways in the report: 1) why does cloud data protection matter, 2) what does cloud data protection allow, and 3) what are the core criteria you should be looking at when assessing cloud data protection solutions.
Why Does Cloud Data Protection Matter?
Why is cloud data protection important? First of all, we’re seeing more and more sensitive data move into the cloud. The more organizations use personal apps, CRM applications, and ERP applications, for instance, the more data is being introduced to the cloud and the more collaboration with not only with internal colleagues, but also external collaborators. That certainly offers productivity and efficiency gains, but also introduces some risk into your organization.
The second point here is you can’t solely rely on the cloud applications themselves for security. While many are making great strides, you can’t outsource liability and you can’t outsource the security of your own data to the cloud application providers.
The third point here is shadow IT. You can look at the benefit of all those cloud apps, but you also want to make sure you understand what users are using what apps, and how they are using them, in order to protect their data.
What Does Cloud Data Protection Allow?
The second topic we’ll exploring is what cloud data protection allows. First and foremost, it allows you to disseminate data in a controlled way: what data do I want to share with my colleagues, what data do I want to share with partners – you now have control over that dissemination.
The second point here is ubiquitous access. We want users to use their apps the way they live. Today, we often talk about the consumerization of IT. Users want to access apps from the road, from the office, wherever they deem important for them.
The third piece here is security intelligence. We want to make sure we have early insight into anomalous behavior, that we understand what’s happening in our environments, and that we have early indicators to recognize potential breaches.
Seven Must-Have Criteria for Cloud Data Protection Solutions
Let’s switch gears and look at seven criteria Forrester deems essential for cloud data protection solutions.
- Tightly integrate with cloud apps. Make sure you can leverage the richness of the data coming through the cloud apps and the best way to do that is with API-level access – it gives you continuous monitoring and real time information protection that is much tighter than traditional non-API-based approaches like gateways and reverse-proxies.
- Encrypt, but encrypt without breaking functionality. Many of the encryption solutions out there sit between the user and the app, and they actually break functionality, impacting the user experience.
- Ensure a seamless user experience. Research cloud data protection solutions and make sure they have no impact on your end users. They shouldn’t be sitting between your users and the cloud as a middle man, they should be seamless to the end user.
- Enforce DLP in the cloud. Have a solution that allows you to create policies, allows you to search for PII and PCI, for example. You’ll want to be able to see if that information is in your environment or not.
- Performance and scale. You’ll want to look for solutions that scale, that are easy to implement, and our high-performing. The more tightly your cloud data protection solution integrates with the cloud app, the more probable it is that the solution will be scalable and performing at the rate that you need them to.
- Secure collaboration. This means no blocking. Open up collaboration and include your end users in the remediation experience and ensuring that your users are prioritized in your security strategy.
- Favor cloud data protection solutions that tightly integrate with existing identity and access management (IAM) solutions, as they allow complete visibility into your data, your users, and your applications.
Do I Really Need to Protect My Data in the Cloud?
Yes. Request a free cloud security assessment today, and find out why. We’ll help you uncover cybersecurity risk across your entire cloud environment – SaaS, PaaS, IaaS, and IDaaS.
- Expose potential compromised accounts, cloud malware, or data security violations
- Validate adherence with internal or industry-governed regulations– PCI, HIPAA, FERPA, and more
- Receive a business analysis, mapping findings to your organizational goals