Page 8 - CDM-Cyber-Warnings-March-2014
P. 8
Moving to the Cloud Ultimately, the benefits of moving to the cloud can outweigh the concerns over security. When looking to secure critical workloads, keep in mind these simple questions: What levels of encryption granularity are supported? For example, block storage, file storage, data volume, boot volume, file, folder, or full application lockdown Does the solution span private, hybrid and multi-tenant clouds? How is the solution deployed? Does my company need to modify its workloads or is it transparent? How is key management supported? Can customers control the keys? Whether your cloud strategy involves simply backing up enterprise data to a service provider or is as elaborate as building a multi-tenant hybrid cloud that includes a mix of private data center and multiple public clouds to support a group of internal departments, data encryption designed specifically for virtualized environments offers a simple and effective approach to securing sensitive data. Commentary provided by: Mike Byrnes, AFORE Director of Marketing Mike Byrnes serves as AFORE Director of Marketing with 20 years’ experience in technology product marketing with a focus on internet security and business communication systems. Prior to AFORE, Mike led product marketing for Entrust multi-factor authentication and fraud detection product lines and held previous roles with Nortel Networks and Mitel Networks. " # % " $ " # ! !