Top Banner
CLOUD COMPUTING IS HERE TO STAY, AND IS ONLY GAINING MOMENTUM. WHILE ITS BENEFITS ARE CLEAR, THERE’S ONE MAJOR CONCERN: KEEPING INFORMATION SAFE. HOW CAN YOU EFFECTIVELY SECURE DATA IN ORDER TO TAKE FULL ADVANTAGE OF THE CLOUD’S BENEFITS? Verizon Enterprise Solutions A SHIFT IN THINKING. PROTECT DEFINE THE BUSINESS VALUE OF THE DATA SETS. CREATE A HIERARCHY. 50% OF SENSITIVE DATA SERVES NO BUSINESS PURPOSE. MORE THAN 1 2 START WITH THE DATA. 3 CHOOSE THE RIGHT CLOUD. How will data affect reputation, compliance, costs, and agility? Classify data based on risk and sensitivity levels according to your business values. Archive or delete unnecessary data. Determine standards using your business-based data hierarchy. Choose the cloud provider with the expertise and inherent security that will help you meet those standards. FIND THE CLOUD ENVIRONMENT THAT FITS YOUR ENTERPRISE BASED ON YOUR DATA. ADDRESS THE USERS. INVENTORY YOUR USERS (employees, contractors, partners) AND ASSIGN THEM ROLES. DESIGNATE USER ACCESS BASED ON ROLES AND A NEED-TO-KNOW BASIS. BRING IT ALL TOGETHER. 6 ENSURE USERS HAVE LEAST-PRIVILEGE ACCESS. MIGRATE DATA TO THE CLOUD. SECURE AND FLEXIBLE MIGRATION SOLUTIONS. FOR BEST RESULTS, ENGAGE A CLOUD PROVIDER WHO OFFERS SECURITY IS OUR BUSINESS. 5 DETERMINE YOUR CONTROLS. 4 SO, WHAT’S NEXT? THINK BROADER. Look beyond IT and think about your business as a whole to define data classifications. Data-centric security will free your company to confidently take advantage of all that cloud computing can offer you. And more. VALIDATE AND MONITOR. W I T H A D A T A - C E N T R I C P E R S P E C T I V E , B U S I N E S S E S C A N A C H I E V E G R E A T E R R E S U L T S . GREATER AGILITY AND ASSET OPTIMIZATION. RIGHT LEVEL OF CONTROL STRENGTH TAKE A DATA-CENTRIC APPROACH TO ENSURE THE SIX STEPS TO A SECURE CLOUD STRATEGY USING DATA-CENTRIC SECURITY MANAGEMENT TO PROTECT THE DATA, WHAT’S AROUND IT. IDENTIFY AND IMPLEMENT CONTROLS (technical, administrative, physical) BASED ON YOUR DATA STANDARDS AND CLOUD FEASIBILITIES. CONTINUOUS MONITORING WILL VERIFY CONTROLS ARE PROTECTING ASSETS AS INTENDED. VERIZON HAS ANALYZED INVOLVING OVER 1 BILLION COMPROMISED RECORDS. 2,000 SO IS THE CLOUD. WHEN IT COMES TO SECURITY AND CLOUD, VERIZON LEADS THE WAY. IN FACT, LEADING ANALYST FIRM GARTNER, INC., HAS POSITIONED VERIZON IN THE LEADER QUADRANT IN: VERIZON HAS THE EXPERTISE TO OFFER A TRULY SECURE CLOUD—FROM MIGRATING DATA TO PREVENTING, DETECTING AND RESPONDING TO THREATS. verizon.com/enterprise/security verizon.com/enterprise/cloud The Magic Quadrant is copyrighted by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner’s analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the “Leaders” quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. Gartner: Magic Quadrant for Hosting, by Lydia Leong and Ted Chamberlin, March 5, 2012 Gartner: Magic Quadrant for Public Cloud Infrastructure as a Service, by Lydia Leong and Ted Chamberlin, December 8, 2011 Gartner: Magic Quadrant for MSSPs, North America, by Kelly Kavanagh and John Pescatore, November 28, 2011 © 2012 Verizon. All Rights Reserved. OLD MODEL IT Drives Data Security NEW MODEL Business Priorities Drive Data Security SECURE YOUR DATA BY CHANGING THE GAME. Confidence is vital when dealing with data security, and the secret to a secure cloud is taking a top-down approach. First, assess your core business priorities to determine cloud security standards. Then, move on to technology and procedures. And finally, choose the right cloud provider—it does matter who you choose. By thinking of your business as a whole, you’ve created a data-centric model you can trust. REDUCE COSTS INCREASE AGILITY MAINTAIN COMPLIANCE INCREASE REPUTATION INFRASTRUCTURE APPS USERS NO BREACHES HIPAA, GLBA, PCI DSS MORE EFFICIENT MAINTENANCE EASIER ACCESS UNLOCKING THE SECRET TO A SECURE CLOUD MAGIC QUADRANT FOR MANAGED HOSTING, 2012 MAGIC QUADRANT FOR PUBLIC CLOUD INFRASTRUCTURE AS A SERVICE, 2011 MAGIC QUADRANT FOR MANAGED SECURITY SERVICES PROVIDER (MSSPS), NORTH AMERICA, 2011 DATA BREACHES
1

Cloud Security

Jun 29, 2015

Download

Documents

C LOUD COMPUT ING I S H E R E TO STAY, AND I S ONLY G A INING MOMENTUM. WH I L E I T S
B ENE F I T S A R E C L E A R , T H E R E ’ S ONE MA JOR CONC E RN: K E E P ING INFORMAT ION
SA F E . HOW CAN YOU E F F E C T I V E LY S E CUR E DATA IN OR D E R TO TA K E FUL L
A DVANTAG E OF T H E C LOUD ’ S B ENE F I T S ?
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cloud Security

CLOUD COMPUTING IS HERE TO STAY, AND IS ONLY GAINING MOMENTUM. WHILE ITS BENEFITS ARE CLEAR, THERE’S ONE MAJOR CONCERN: KEEPING INFORMATION SAFE. HOW CAN YOU EFFECTIVELY SECURE DATA IN ORDER TO TAKE FULL ADVANTAGE OF THE CLOUD’S BENEFITS?

Verizon Enterprise Solutions

A SHIFT IN THINKING.

PROTECT

DEFINE THE BUSINESS VALUE OF THE DATA SETS. CREATE A HIERARCHY.

50% OF SENSITIVE DATA

SERVES NO BUSINESS PURPOSE.MORE THAN

1

2

START WITH THE DATA.

3 CHOOSE THE RIGHT CLOUD.

How will data affect reputation, compliance,

costs, and agility?

Classify data based on risk and sensitivity levels according

to your business values.

Archive or delete unnecessary data.

Determine standards using your business-based data hierarchy.

Choose the cloud provider with the expertise and inherent security that will help you meet those standards.

FIND THE CLOUD ENVIRONMENT THAT FITS YOUR ENTERPRISE BASED ON YOUR DATA.

ADDRESS THE USERS.INVENTORY YOUR USERS (employees, contractors, partners) AND ASSIGN THEM ROLES.

DESIGNATE USER ACCESS BASED ON ROLES AND A NEED-TO-KNOW BASIS.

BRING IT ALL TOGETHER.

6

ENSURE USERSHAVE LEAST-PRIVILEGE ACCESS.

MIGRATE DATATO THE CLOUD.

SECURE AND FLEXIBLEMIGRATION SOLUTIONS.

FOR BEST RESULTS,ENGAGE A CLOUD PROVIDER WHO OFFERS

SECURITY IS OUR BUSINESS.

5

DETERMINE YOUR CONTROLS.4

SO, WHAT’S NEXT?THINK BROADER. Look beyond IT and think about your business as a whole to define data classifications. Data-centric security will free your company to confidently take advantage of all that cloud computing can offer you. And more.

VALIDATE AND MONITOR.

WIT

H A

DATA

-CEN

TRIC

PERSPECTIVE, BUSINESSES CAN ACHIEVE GREATER RESULTS.

GREATER AGILITY AND ASSET OPTIMIZATION.

RIGHT LEVEL OF

CONTROL STRENGTH

TAKE A DATA-CENTRICAPPROACH TO ENSURE THE

SIX STEPS TO A SECURE CLOUD STRATEGY

USING DATA-CENTRIC SECURITY MANAGEMENT

TO PROTECT THE DATA,

WHAT’S AROUND IT.

IDENTIFY AND IMPLEMENT CONTROLS (technical, administrative, physical) BASED ON YOUR DATA STANDARDS AND CLOUD FEASIBILITIES.

CONTINUOUS MONITORING WILL VERIFY CONTROLS ARE PROTECTING ASSETS AS INTENDED.

VERIZON HAS ANALYZED

INVOLVING OVER 1 BILLION COMPROMISED RECORDS. 2,000

SO IS THE CLOUD.WHEN IT COMES TO SECURITY AND CLOUD, VERIZON LEADS THE WAY. IN FACT, LEADING ANALYST FIRM GARTNER, INC., HAS POSITIONED VERIZON IN THE LEADER QUADRANT IN:

VERIZON HAS THE EXPERTISE TO OFFER A TRULY SECURE CLOUD—FROM MIGRATING DATA TO PREVENTING, DETECTING AND RESPONDING TO THREATS.

verizon.com/enterprise/securityverizon.com/enterprise/cloud

The Magic Quadrant is copyrighted by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner’s analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the “Leaders” quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Gartner: Magic Quadrant for Hosting, by Lydia Leong and Ted Chamberlin, March 5, 2012Gartner: Magic Quadrant for Public Cloud Infrastructure as a Service, by Lydia Leong and Ted Chamberlin, December 8, 2011Gartner: Magic Quadrant for MSSPs, North America, by Kelly Kavanagh and John Pescatore, November 28, 2011

© 2012 Verizon. All Rights Reserved.

OLD MODELIT Drives

Data Security

NEW MODELBusiness

Priorities Drive Data Security

SECURE YOUR DATA BY CHANGING THE GAME. Confidence is vital when dealing with data security, and the secret to a secure cloud is taking a top-down approach. First, assess your core business priorities to determine cloud security standards. Then, move on to technology and procedures. And finally, choose the right cloud provider—it does matter who you choose. By thinking of your business as a whole, you’ve created a data-centric model you can trust.

REDUCECOSTS

INCREASEAGILITY

MAINTAINCOMPLIANCE

INCREASEREPUTATION

INFRASTRUCTURE

APPS USERS

NO BREACHES

HIPAA, GLBA,PCI DSS

MORE EFFICIENTMAINTENANCE

EASIER ACCESS

U N L O C K I N G T H E S E C R E T TO A

SECURE CLOUD

MAGIC QUADRANT FOR MANAGED HOSTING, 2012

MAGIC QUADRANT FOR PUBLIC CLOUD

INFRASTRUCTURE AS A SERVICE, 2011

MAGIC QUADRANT FOR MANAGED SECURITY

SERVICES PROVIDER (MSSPS), NORTH AMERICA, 2011

DATA BREACHES