Implementing Cloud Security Solutions

Post on 03-Feb-2022

4 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

Transcript

Implementing Cloud Security Solutions

Tim MatthewsSr. Director, Product Marketing

© 2010 • PGP Corporation • Confidential

Ancient Times vs. Modern Times

© 2010 • PGP Corporation • Confidential 2

Google Data Center in Lenoir, NC circa 2005

1999

2009

Starbucks launches HotSpots in August 2002

Desktop Data Center

Risks at the New Corporate Perimeter

© 2010 • PGP Corporation • Confidential 3

Breach in the Google Cloud

© 2010 • PGP Corporation • Confidential 4

Data Protection Fundamentals

© 2010 • PGP Corporation • Confidential 5

Key Management

Laptop Encryption

File Encryption

Email Encryption

Device Control

DLP

Cost of Data Breach

© 2010 • PGP Corporation • Confidential 6

Fourth annual report by The Ponemon Institute© & PGP Corporation (Feb 2010)

• Costs grew to $204/record or $6.7m per breach

• Lost business now accounts for 69% of breach losses

• 56% of breaches are “inside” jobs

• 42% of breaches caused by 3rd parties

Source: Ponemon, Feb 2010www.encryptionreports.com

Primary Cause of a Data Breach

© 2010 • PGP Corporation • Confidential 7

Where is Your Data?

© 2010 • PGP Corporation • Confidential 8

Where is your data in the physical world?

Where is your data in the cloud?

Google Docs Cloud Provider Data Centers

USB Drives Laptops Smart Phones

Backup

The Hybrid Cloud

© 2010 • PGP Corporation • Confidential 9

Hybrid Cloud

Private Cloud

Transactional Data

SaaS Solutions

Public Cloud

Transformation/RoutingData Services Layer

Use Case #1:Deploying Encryption Management to a Private Cloud

© 2010 • PGP Corporation • Confidential 10

Storage as a Service; File Encryption

Secure File Transfer & Cloud Backups

Central Management of Encryption Applications

Smartphone Encryption

Desktop & Gateway Email Encryption

Use Case #2:Email Security as a Service

© 2010 • PGP Corporation • Confidential 11

Gateway Email Encryption

Desktop Email Encryption

Use Case #3:Securing Backups to Cloud Storage

© 2010 • PGP Corporation • Confidential 12

Cloud Storage Provider

Encrypted Backups

Encryption allows use of almost any cloud storage provider.

Encrypted Backups

Encrypted Archives

Use Case #4:Secure Collaboration/File Sharing

© 2010 • PGP Corporation • Confidential 13

Authorized UserUnauthorized User

PaaS

Pervasive file encryption ensures files are secured no matter where they are stored.

Authorized User

Keys and the Cloud

• Lost password, token

• Employee termination

• Employee malfeasance• Lawsuit – eDiscovery

• Government request

© 2010 • PGP Corporation • Confidential 14

Encryption, Key Recovery and the Cloud

• Client Encryption– Secure client or encrypt on client– Key recovery left to client, and potentially corporate key escrow

• Server Encryption– Secure server or encrypt on server– Key recovery managed by company, and potentially corporate

key escrow

• Cloud Encryption– Data sent to cloud and encrypted by cloud provider– Company loses control over surrender or keys– Unclear what recovery options are

© 2010 • PGP Corporation • Confidential 15

Security Considerations for the Cloud

© 2010 • PGP Corporation • Confidential 16

Key Management

File Encryption Email Encryption

Secure File Transfer & Backups

top related