programming4us
programming4us
ENTERPRISE

Control Your Cloud (Part 2)

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

Be careful with cloud-based file sharing

Cloud-based file sharing services are very popular in the consumer space, which is fine, but if your employees decide to bring these services into the workplace without your knowledge, “who knows what you’ve done to your security environment?” cautions Bartoletti. That’s why you need to establish controls that will limit the types of data that can be placed on file sharing sites and prevent sensitive information from exiting the company.

Be careful with cloud-based file sharing

Be careful with cloud-based file sharing

Sloan says that some file sharing services are better than others when it comes to integration and control. One such service features an enterprise version that can be integrated into “Active Directory management for access” as well as SharePoint, he says. This not only unlocks file sharing functionality in other applications, but also gives the company much more control over the data that can be moved into the cloud or downloaded from the cloud.

However, if you integrate a file sharing service into your business and put the appropriate controls in place, you may still encounter instances where those controls aren’t working and “you’re finding that people are copying sensitive data up into the cloud instances. If this is the case, you may need to reevaluate those workloads and determine whether or not they are a good it for a cloud environment.

Know what data belongs & implement usage policies

Some data and applications are a perfect it for the cloud, while others simply don’t belong. For instance, Bartoletti says that “systems of engagement,” such as Web presence systems that allow companies to interact with customers, are great for the cloud because you can “launch them quickly, you don’t have to buy a bunch of new infrastructure to build out a new offering, and the kind of data you put on their generally isn’t that sensitive.”

Sensitive data and applications are always in danger of being moved to the cloud simply because of human error or lack of employee education

Sensitive data and applications are always in danger of being moved to the cloud simply because of human error or lack of employee education

However, “systems of record,” like transaction, accounting, and ERP systems, “are probably not the best first it for the cloud because they contain sensitive data,” says Bartoletti. Plus, these solutions are often “high-performance database applications that require a lot of processing power,” he says. Bartoletti admits that it may seem attractive to move these to the cloud to save money on internal resources, but that it’s “probably not worth the loss of control to put it up there, since your business is really based on those systems being secure.”

Sensitive data and applications are always in danger of being moved to the cloud simply because of human error or lack of employee education. To help counteract this, Bartoletti recommends that companies put cloud usage policies in place to limit access to certain types of data as well as help you segment your workforce into much more manageable groups.

“It makes sense to think about developing cloud usage policies and doing it for different business groups,” says Bartoletti. “This business group may have one set of policies and this other business group might have another because they’re not customer-facing and they don’t touch sensitive data. A great way to get control over cloud in the organization is to start thinking about what your cloud usage policies should be.”

Communicate with service providers & vendors

Speaking to your service provider about identity and access management is crucial, but you also need to discuss SLAs (service level agreements) as well as what you can expect from the cloud provider in terms of security and transparency. “How much will the service provider tell them about how things are run, what geography data will be kept in, and what certifications the service provider has to date?” Bartoletti asks. “Big service providers are always actively getting more and more certifications so that they can handle more and more sensitive data, so you may want to talk to them first to see what kinds of certifications they have in place.”

Private clouds can come with their own control and management issues

Private clouds can come with their own control and management issues

When it comes to SLAs, it’s common for cloud providers to “do their best to give you a certain number of nines of availability” (referring to the number of nines in an availability percentage), but if for any reason they don’t hit the goal detailed in your SLA, you need to know what the compensation will amount to, says Bartoletti. You will feel much more in control of the cloud if you know where you stand with your service provider. You need to know if they’ll give you your money back in the event they don’t hit a certain availability figure or if they’ll “own the problem and try to fix it,” says Bartoletti.

If you are working with a private cloud or want to build one, then service providers won’t be involved, but vendors will be. Private clouds can come with their own control and management issues, so that’s why Bartoletti says that many “virtualization vendors offer suites of management tools that can help you turn a set of virtual resources into a cloud environment.” But they can also help you “manage things like security and multi-tenancy.” You may want to invest in licensed or open source cloud tools that not only let you build clouds on top of your existing virtualized infrastructure, but also help you “isolate groups from one another and automatically allocate resources as people request them,” says Bartoletti.  It all comes down to discussing available options with your vendor and finding the solution that fits your best.

Other  
 
Top 10
Free Mobile And Desktop Apps For Accessing Restricted Websites
MASERATI QUATTROPORTE; DIESEL : Lure of Italian limos
TOYOTA CAMRY 2; 2.5 : Camry now more comely
KIA SORENTO 2.2CRDi : Fuel-sipping slugger
How To Setup, Password Protect & Encrypt Wireless Internet Connection
Emulate And Run iPad Apps On Windows, Mac OS X & Linux With iPadian
Backup & Restore Game Progress From Any Game With SaveGameProgress
Generate A Facebook Timeline Cover Using A Free App
New App for Women ‘Remix’ Offers Fashion Advice & Style Tips
SG50 Ferrari F12berlinetta : Prancing Horse for Lion City's 50th
- Messages forwarded by Outlook rule go nowhere
- Create and Deploy Windows 7 Image
- How do I check to see if my exchange 2003 is an open relay? (not using a open relay tester tool online, but on the console)
- Creating and using an unencrypted cookie in ASP.NET
- Directories
- Poor Performance on Sharepoint 2010 Server
- SBS 2008 ~ The e-mail alias already exists...
- Public to Private IP - DNS Changes
- Send Email from Winform application
- How to create a .mdb file from ms sql server database.......
programming4us programming4us
programming4us
 
 
programming4us