Date post: | 10-Aug-2015 |
Category: |
Technology |
Upload: | ciphercloud |
View: | 271 times |
Download: | 2 times |
User adopted and mission critical applications increasingly reside outside the enterprise narrowing visibility and introducing unknown risks
Apps and People on the Move = No Visibility, Unknown Risks
CIPHERCLOUD | © 2015 | ALL RIGHTS RESERVED
9 Steps to Enable the Cloud While Maintaining Visibility and Control
CIPHERCLOUD | © 2015 | ALL RIGHTS RESERVED
STEP 1: Discover all cloud applications in use
Without visibility into all your organization’s cloud usage you may be risking security, allowing leaks of sensitive data, and reducing efficiency.
STEP 2: Assess the risk of your applications
Find applications that can be conduits for malware attacks, data theft, and security breaches.
STEP 3: Enable the right applications
Standardize whenever possible, discourage the use of free services, block risky applications and monitor alerts for new risky applications.
STEP 4: Understand how your users work
Work with your users to understand what applications are critical and what functionality is important to them.
STEP 5: Enforce data loss prevention policies
By extending your DLP controls to cloud applications, you can have assurance that cloudapplications are being used wisely and not becoming avenues for data loss or harmful breaches.
STEP 6: Monitor user activity and detect anomalies
Consistent user activity monitoring provides a baseline of known behavior. Noticeable changes in typical behavior can be important indicators of suspicious activity or serious breaches.
STEP 7: Understand compliance requirements
In order to effectively protect sensitive data your organization needs to understand the specific compliance requirements for any data it is handling and potentially putting in the cloud.
STEP 8: Encrypt or tokenize sensitive data fields
Encrypt or tokenize your sensitive data in the cloud and keep the keys to assure security and compliance, data residency and sovereignty.
STEP 9: Preserve business functionality
Apply effective security tools that do not break key business functionality, else this would defeat the purpose of using the cloud.
Does encryption/tokenization of your cloud data :
• Preserve format & length?
• Supports search, sort of data?
• Enable advanced reports & list filters?
• Impact user experience?
Summary
Regardless of your stage of cloud adoption, fundamental requirements remain the same:
• Understand what your users are doing and how their business needs have changed
• Gain visibility to where your sensitive data is going and who should and should not
have access
• Take proactive steps to protect business-critical information and retain control regardless of where it goes
CIPHERCLOUD | © 2015 | ALL RIGHTS RESERVED
500+ Employees
Company
3.0+ MillionActive Users
13 Industries
25 Countries
7 Languages
P 13 Patents
Solutions
Cloud DiscoveryCloud DLP
Strong EncryptionTokenization
Activity MonitoringAnomaly Detection
Customers
5 out of 10Top US Banks
3 out of 5Top Health Providers
Top 2 GlobalTelecomm Company
40% of GlobalMail Delivery
Largest USMedia Company
3 out of 5Top Pharmaceuticals
About CipherCloud
CIPHERCLOUD | © 2015 | ALL RIGHTS RESERVED
Twitter.com/ciphercloud
Youtube.com/user/CipherCloudVideo
Linkedin.com/company/ciphercloud
Facebook.com/ciphercloud
Connect with Us!Download Complete Whitepaper :CIO’s Guide to Enterprise Cloud Adoption
Be sure to check out our Global Compliance Center!
For additional information :• Website: www.ciphercloud.com• Email: [email protected]• Phone: +1 855-5CIPHER
More Information
CIPHERCLOUD | © 2015 | ALL RIGHTS RESERVED