SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
WHITE PAPER: KVH Cloud Solutions




 Cloud Security: Perception VS
 Reality

 A breakdown of the top misconceptions enterprises
 are facing when assessing the security levels of
 cloud computing environments, and the realities
 behind them


        Table of Contents
        2    Introduction
        2    Perception 1: The cloud cannot be secure
        2    Perception 2: Cloud computing is less secure than on-premise
             alternatives
        3    Perception 3: Private Clouds are secure, Public Clouds are not
        4    Perception 4: Compliance guarantees ssecurity
        4    Conclusion
        5    Appendix: Cloud Security Must-Haves
        6    About KVH



                                  Copyright© 2012 by KVH Co. LTD

    All Rights Reserved. Not to be copied or reproduced without express permission of KVH Co LTD

                                            Page 1 of 6
Cloud Security: Perception VS Reality



Introduction                                           to the kind of server being used and the
                                                       network connecting their systems.
Ranked as the top technology priority among
CIOs in Asia in the 2011 Gartner Executive             For industries that need to align with specific
Programs (EXP) CIO Agenda Survey, cloud                regulations, such as the financial services
computing has attracted significant attention          sector, ensure your service provider not only
as businesses are becoming keen to                     offers security services that meet these
understand how they can effectively                    standards by holding certifications in ITIL, ISO
leverage these services at minimal risk and for        27001, and SSAE16, but is also experienced
maximum benefit. With the continued growth             enough through servicing other businesses in
of online security threats and ways that these         your industry to understand the role security
can spread, security is repeatedly being               solutions play in how your business functions
reported as a key concern among businesses             and transfers data.
when determining whether they should move
to the cloud and, if so, what kind of cloud            Depending on the service and provider,
solution they should be adopting.                      cloud computing solutions should be able to
                                                       meet       the    security   requirements   of   any
This whitepaper aims to outline and verify the         business from a technology perspective, as
truth behind some of the common                        well as throughout their internal processes,
misconceptions about security and cloud                operations, and personnel.
computing that can often deter businesses
from adopting this evolving and potentially            Perception 2: Cloud computing
highly beneficial technology.
                                                       is less secure than on-premise
Perception 1: The cloud cannot                         alternatives
be secure                                              Reality: As cloud computing is strongly based
                                                       on automated systems, it actually avoids the
Reality: Cloud environments can be highly
                                                       common security breaches that occur with
secure and levels of security can be scaled to
                                                       on-premise systems due to human errors.
suit a business’ specific needs and existing IT
systems. Before implementing a cloud service,
                                                       Also, outsourcing ensures that physical access
ask the service provider what level of security
                                                       to your servers is strictly monitored 24 x 7 by
they offer through public, private, or hybrid
                                                       highly experienced professionals. Vendors
cloud solutions, and how this differs according
                                                       place high importance on these technologies,




                           Copyright© 2011 by KVH Co., Ltd.   All Rights Reserved

                                               Page 2 of 6
Cloud Security: Perception VS Reality



staff, and processes to ensure that their                Reality: This perception is fundamentally built
customers’ data is kept secure at all times. A           on the understanding that there are two kinds
security breach can be just as detrimental to            of cloud services. However, depending on
customers as it is to their service providers, not       the use of hybrid configurations, on-premise
only due to the expenses of solving the issue            hosting and colocation, dedicated servers
and implementing new technology and                      and       networks,       VPS,    and     various     other
processes where necessary to ensure the                  technologies, the security of a cloud service
problem cannot arise in the future, but also             can significantly change. Just as a network or
because of the significant blow to their                 server configuration can be tailored to meet
reputation that can take months, if not years,           certain        business      requirements,      a     cloud
to earn back.                                            environment’s           security        can    also     be
                                                         customized to meet compliance issues and
For cloud computing service providers, this is           other needs.
a core part of their business, allowing them to
make expensive, long-term investments in                 For example, the use of dedicated VLANs
their security offerings to ensure they can              would          logically         separate       customer
succeed    in this   increasingly competitive            environments and provide security control at
market by providing customers with the best              layer 2. Intrusion prevention systems, Firewalls,
services available. Furthermore, as more                 Encryption,        Authentication,          Authorization,
businesses in the financial services sector are          and Audit Trails provide the required security
adopting cloud computing solutions, service              controls to protect your assets and data.
providers are being forced to improve their              Leverage your provider’s Professional Services
standards to meet the regulatory compliance              to determine these details since, depending
and operational security needs of these                  on the equipment used and configuration, a
organizations, inevitably leading to an overall          public cloud could be just as secure as a
rise in security standards across the industry.          private cloud and, despite the perception,
                                                         private clouds can have security weaknesses
Perception 3: Private Clouds                             in     their   infrastructure      or   how    they     are
                                                         managed.
are secure, Public Clouds are
not




                             Copyright© 2011 by KVH Co., Ltd.   All Rights Reserved

                                                 Page 3 of 6
Cloud Security: Perception VS Reality




                                         Example Use Case of a Closed L2 Network




Perception              4:         Compliance                 has been supplied. As well as assessing the
                                                              actual solution being provided, ensure your
guarantees security                                           provider’s certifications are up to date and
                                                              that they regularly conduct internal and
Reality: A service provider’s certifications in
                                                              external audits to maintain a high level of
ITIL, ISO   27001,     and    SSAE16       should     be
                                                              security across their infrastructure, processes,
thoroughly assessed to ensure the provider is
                                                              and daily activities.
adhering to their own industry standards as
well   as   your     industry’s     regulations     and
                                                              Conclusion:
compliance requirements. However, it should
also be recognized that a service provider                    Despite the security concerns mentioned
should not be considered ‘secure’ merely                      above, more and more companies are
because of their certifications.                              adopting        cloud        computing   solutions   to
                                                              remain competitive and meet the evolving
These certifications determine the standards a
                                                              needs of their business and customers. The
provider has met at a certain time, and do
                                                              CIO Global Cloud Computing Adoption
not necessarily ensure that these standards
                                                              Survey of 2011 showed that two-thirds of
are being maintained after the certification
                                                              organizations        are      planning   or   currently



                                  Copyright© 2011 by KVH Co., Ltd.   All Rights Reserved

                                                      Page 4 of 6
Cloud Security: Perception VS Reality



adopting cloud computing, with 22% already                 measures deter you from leveraging this
in    department         and       enterprise-wide         highly valuable technology. Instead, assess
deployments.                                               your business needs, the IT challenges you are
                                                           trying to overcome, and your current IT
When assessing the security of your cloud                  systems to ensure the right security solution is
solution,   do    not   let   necessary      security      provided for you.




Appendix: Cloud Security Must-Haves

      Certifications      ITIL, ISO27001, and SSAE16 certifications for industry-standard
                          processes, data center design, SDLC, operations, and maintenance



      Encryption          Protects data from interception



      Firewall            Provides access control filtering



      Authentication      Ensures access to the system and data is only allowed to users who
                          have been granted permission



      Authorization       Ensures users can only perform actions that are permitted



      Auditing and        Provides management teams with a clear window into what
      Reporting           resources are being used by who and how



      Replication &       Reliable backup and redundant systems support BCP and enable
      Redundancy          fast data recovery when required



      Data Center         Manages the physical access control of who has access to the
      Access Controls     systems housing your data




                               Copyright© 2011 by KVH Co., Ltd.   All Rights Reserved

                                                   Page 5 of 6
Cloud Security: Perception VS Reality



About KVH

KVH was established in Tokyo in 1999 by Fidelity Investments as a Japan focused IT /
communications service provider. As an information delivery platform that allows enterprise
customers to store, process, protect and deliver their vital business information, KVH offers
integrated cloud and network solutions that include infrastructure-as-a-service, managed
services, data center services, professional services, data networking, internet access, and voice
services. KVH operates the lowest latency network in Japan, and with over 450 financial services
customers, is the leading provider of ultra low-latency network and proximity hosting solutions to
the high-frequency trading community in Tokyo and Osaka. KVH also offers low-latency
connectivity services between major financial markets in the Asia/Pacific region and the US
including Tokyo, Chicago, New York, Singapore, Hong Kong, Shanghai, and Sydney.


More information on KVH can be found at www.kvh.co.jp/en/




                            Copyright© 2011 by KVH Co., Ltd.   All Rights Reserved

                                                Page 6 of 6

Contenu connexe

Tendances

AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Amazon Web Services
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...HyTrust
 
Cloudsecurity
CloudsecurityCloudsecurity
Cloudsecuritydrewz lin
 
Case_Study__Juniper_Expedient_2015
Case_Study__Juniper_Expedient_2015Case_Study__Juniper_Expedient_2015
Case_Study__Juniper_Expedient_2015John White
 
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesSecure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesHyTrust
 
Protecting Data in the Cloud
Protecting Data in the CloudProtecting Data in the Cloud
Protecting Data in the CloudNeil Readshaw
 
A study on securing cloud environment from d do s attack to preserve data ava...
A study on securing cloud environment from d do s attack to preserve data ava...A study on securing cloud environment from d do s attack to preserve data ava...
A study on securing cloud environment from d do s attack to preserve data ava...Manimaran A
 
The Cloud Crossover
The Cloud CrossoverThe Cloud Crossover
The Cloud CrossoverArmor
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...white paper
 
Cloud Security for U.S. Military Agencies
Cloud Security for U.S. Military AgenciesCloud Security for U.S. Military Agencies
Cloud Security for U.S. Military AgenciesNJVC, LLC
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security StrategyCapgemini
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15finalMahmoud Moustafa
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceUNIT4 IT Solutions
 
Cloud Security Best Practices - Part 2
Cloud Security Best Practices - Part 2Cloud Security Best Practices - Part 2
Cloud Security Best Practices - Part 2Cohesive Networks
 
Why the Cloud can be Compliant and Secure
Why the Cloud can be Compliant and SecureWhy the Cloud can be Compliant and Secure
Why the Cloud can be Compliant and SecureInnoTech
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guideYury Chemerkin
 

Tendances (20)

AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
Cloudsecurity
CloudsecurityCloudsecurity
Cloudsecurity
 
TrendMicro
TrendMicroTrendMicro
TrendMicro
 
Case_Study__Juniper_Expedient_2015
Case_Study__Juniper_Expedient_2015Case_Study__Juniper_Expedient_2015
Case_Study__Juniper_Expedient_2015
 
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesSecure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
 
Protecting Data in the Cloud
Protecting Data in the CloudProtecting Data in the Cloud
Protecting Data in the Cloud
 
A study on securing cloud environment from d do s attack to preserve data ava...
A study on securing cloud environment from d do s attack to preserve data ava...A study on securing cloud environment from d do s attack to preserve data ava...
A study on securing cloud environment from d do s attack to preserve data ava...
 
The Cloud Crossover
The Cloud CrossoverThe Cloud Crossover
The Cloud Crossover
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
 
Cloud Security for U.S. Military Agencies
Cloud Security for U.S. Military AgenciesCloud Security for U.S. Military Agencies
Cloud Security for U.S. Military Agencies
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security Strategy
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15final
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
 
Cloud Security Best Practices - Part 2
Cloud Security Best Practices - Part 2Cloud Security Best Practices - Part 2
Cloud Security Best Practices - Part 2
 
Why the Cloud can be Compliant and Secure
Why the Cloud can be Compliant and SecureWhy the Cloud can be Compliant and Secure
Why the Cloud can be Compliant and Secure
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guide
 

En vedette

Bringing Communities Together
Bringing Communities TogetherBringing Communities Together
Bringing Communities TogetherSSyam
 
Emergency Medical Technician
Emergency Medical TechnicianEmergency Medical Technician
Emergency Medical TechnicianExcite Education
 
Air Ambulance Patient Evacuation from Peru - AirCARE1 international
Air Ambulance Patient Evacuation from Peru - AirCARE1 internationalAir Ambulance Patient Evacuation from Peru - AirCARE1 international
Air Ambulance Patient Evacuation from Peru - AirCARE1 internationalaircare1international
 
Abdul Sattar Edhi – Pakistan's only true living hero
Abdul Sattar Edhi – Pakistan's only true living heroAbdul Sattar Edhi – Pakistan's only true living hero
Abdul Sattar Edhi – Pakistan's only true living heroKhawaja Umer Farooq Uddin
 
UCSF Life Sciences Week 2 devices
UCSF Life Sciences Week 2 devicesUCSF Life Sciences Week 2 devices
UCSF Life Sciences Week 2 devicesStanford University
 
Emergency medical aid, promotion tools &planning
Emergency medical aid, promotion tools &planningEmergency medical aid, promotion tools &planning
Emergency medical aid, promotion tools &planning Dr.Priyanka Phonde
 
Accident & emergency
Accident & emergencyAccident & emergency
Accident & emergencyvikastyagi
 
Hospital emergency services
Hospital emergency servicesHospital emergency services
Hospital emergency servicesNc Das
 
Detailed case study leading insurance company - alfresco based invoice appr...
Detailed case study   leading insurance company - alfresco based invoice appr...Detailed case study   leading insurance company - alfresco based invoice appr...
Detailed case study leading insurance company - alfresco based invoice appr...Datamatics Global Services GmbH
 
Kauppi: Mielikuvituksen ja fantasioiden merkitys nuorten mielenterveydessä ja...
Kauppi: Mielikuvituksen ja fantasioiden merkitys nuorten mielenterveydessä ja...Kauppi: Mielikuvituksen ja fantasioiden merkitys nuorten mielenterveydessä ja...
Kauppi: Mielikuvituksen ja fantasioiden merkitys nuorten mielenterveydessä ja...Kouluterveyskysely
 
SAS Curriculum Density #11- Day 3
SAS Curriculum   Density #11- Day 3SAS Curriculum   Density #11- Day 3
SAS Curriculum Density #11- Day 3jmori1
 
Science Eportfolio Powerpoint
Science Eportfolio PowerpointScience Eportfolio Powerpoint
Science Eportfolio Powerpointlimmervin24
 
Mass, Volume and Density Labs --Day 1
Mass, Volume and Density Labs --Day 1Mass, Volume and Density Labs --Day 1
Mass, Volume and Density Labs --Day 1jmori1
 

En vedette (20)

Bringing Communities Together
Bringing Communities TogetherBringing Communities Together
Bringing Communities Together
 
Emergency Medical Technician
Emergency Medical TechnicianEmergency Medical Technician
Emergency Medical Technician
 
Air Ambulance Patient Evacuation from Peru - AirCARE1 international
Air Ambulance Patient Evacuation from Peru - AirCARE1 internationalAir Ambulance Patient Evacuation from Peru - AirCARE1 international
Air Ambulance Patient Evacuation from Peru - AirCARE1 international
 
SOS Emergency Evacuation Tutorial
SOS Emergency Evacuation TutorialSOS Emergency Evacuation Tutorial
SOS Emergency Evacuation Tutorial
 
Medical emergency planning
Medical emergency planningMedical emergency planning
Medical emergency planning
 
Abdul Sattar Edhi – Pakistan's only true living hero
Abdul Sattar Edhi – Pakistan's only true living heroAbdul Sattar Edhi – Pakistan's only true living hero
Abdul Sattar Edhi – Pakistan's only true living hero
 
UCSF Life Sciences Week 2 devices
UCSF Life Sciences Week 2 devicesUCSF Life Sciences Week 2 devices
UCSF Life Sciences Week 2 devices
 
Emergency medical aid, promotion tools &planning
Emergency medical aid, promotion tools &planningEmergency medical aid, promotion tools &planning
Emergency medical aid, promotion tools &planning
 
Marketing for Medical Device Startups
Marketing for Medical Device StartupsMarketing for Medical Device Startups
Marketing for Medical Device Startups
 
Accident & emergency
Accident & emergencyAccident & emergency
Accident & emergency
 
Hospital emergency services
Hospital emergency servicesHospital emergency services
Hospital emergency services
 
Us2aware
Us2awareUs2aware
Us2aware
 
Trololo
TrololoTrololo
Trololo
 
Detailed case study leading insurance company - alfresco based invoice appr...
Detailed case study   leading insurance company - alfresco based invoice appr...Detailed case study   leading insurance company - alfresco based invoice appr...
Detailed case study leading insurance company - alfresco based invoice appr...
 
Kauppi: Mielikuvituksen ja fantasioiden merkitys nuorten mielenterveydessä ja...
Kauppi: Mielikuvituksen ja fantasioiden merkitys nuorten mielenterveydessä ja...Kauppi: Mielikuvituksen ja fantasioiden merkitys nuorten mielenterveydessä ja...
Kauppi: Mielikuvituksen ja fantasioiden merkitys nuorten mielenterveydessä ja...
 
SAS Curriculum Density #11- Day 3
SAS Curriculum   Density #11- Day 3SAS Curriculum   Density #11- Day 3
SAS Curriculum Density #11- Day 3
 
Group 8 OIM
Group 8 OIMGroup 8 OIM
Group 8 OIM
 
Science Eportfolio Powerpoint
Science Eportfolio PowerpointScience Eportfolio Powerpoint
Science Eportfolio Powerpoint
 
Mass, Volume and Density Labs --Day 1
Mass, Volume and Density Labs --Day 1Mass, Volume and Density Labs --Day 1
Mass, Volume and Density Labs --Day 1
 
Aarathanai aarathanai
Aarathanai aarathanaiAarathanai aarathanai
Aarathanai aarathanai
 

Similaire à Cloud Security: Perception VS Reality

Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud securityArun Gopinath
 
Ast 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_securityAst 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_securityAccenture
 
Are you ready for the private cloud? [WHITEPAPER]
Are you ready for the  private cloud? [WHITEPAPER]Are you ready for the  private cloud? [WHITEPAPER]
Are you ready for the private cloud? [WHITEPAPER]KVH Co. Ltd.
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0David Spinks
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the CloudCloudSmartz
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmgNeha Dhawan
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar reportshafzonly
 
Information Security Governance: Government Considerations for the Cloud Comp...
Information Security Governance: Government Considerations for the Cloud Comp...Information Security Governance: Government Considerations for the Cloud Comp...
Information Security Governance: Government Considerations for the Cloud Comp...Booz Allen Hamilton
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfDataSpace Academy
 
Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?doan_slideshares
 
Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...
Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...
Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...IBM India Smarter Computing
 
A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...SafeNet
 
Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14L S Subramanian
 

Similaire à Cloud Security: Perception VS Reality (20)

Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud security
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud security
 
Ast 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_securityAst 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_security
 
Are you ready for the private cloud? [WHITEPAPER]
Are you ready for the  private cloud? [WHITEPAPER]Are you ready for the  private cloud? [WHITEPAPER]
Are you ready for the private cloud? [WHITEPAPER]
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
 
Security of the Cloud
Security of the CloudSecurity of the Cloud
Security of the Cloud
 
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Securitynull Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmg
 
Ccsw
CcswCcsw
Ccsw
 
Myths About Cloud Computing
Myths About Cloud ComputingMyths About Cloud Computing
Myths About Cloud Computing
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
Information Security Governance: Government Considerations for the Cloud Comp...
Information Security Governance: Government Considerations for the Cloud Comp...Information Security Governance: Government Considerations for the Cloud Comp...
Information Security Governance: Government Considerations for the Cloud Comp...
 
Information Security Governance
Information Security GovernanceInformation Security Governance
Information Security Governance
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
 
Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?
 
Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...
Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...
Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...
 
A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...
 
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTINGSECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTING
 
Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14
 

Plus de KVH Co. Ltd.

企業における情報漏えいの効果的な防止 方法
企業における情報漏えいの効果的な防止 方法企業における情報漏えいの効果的な防止 方法
企業における情報漏えいの効果的な防止 方法KVH Co. Ltd.
 
お客様事例紹介 systemsGo株式会社様
お客様事例紹介 systemsGo株式会社様お客様事例紹介 systemsGo株式会社様
お客様事例紹介 systemsGo株式会社様KVH Co. Ltd.
 
KVH - systemsGo Customer Case Study
KVH - systemsGo Customer Case StudyKVH - systemsGo Customer Case Study
KVH - systemsGo Customer Case StudyKVH Co. Ltd.
 
KVH NetXpress (日本語版)
KVH NetXpress (日本語版)KVH NetXpress (日本語版)
KVH NetXpress (日本語版)KVH Co. Ltd.
 
KVH IP VPN (日本語版)
KVH IP VPN (日本語版)KVH IP VPN (日本語版)
KVH IP VPN (日本語版)KVH Co. Ltd.
 
KVH 東京大手町データセンター (TODC)
KVH 東京大手町データセンター (TODC)KVH 東京大手町データセンター (TODC)
KVH 東京大手町データセンター (TODC)KVH Co. Ltd.
 
KVH Tokyo Otemachi Data Center (TODC)
KVH Tokyo Otemachi Data Center (TODC)KVH Tokyo Otemachi Data Center (TODC)
KVH Tokyo Otemachi Data Center (TODC)KVH Co. Ltd.
 
お客様事例紹介 ライド株式会社様
お客様事例紹介 ライド株式会社様お客様事例紹介 ライド株式会社様
お客様事例紹介 ライド株式会社様KVH Co. Ltd.
 
KVH Customer Case Study - Ride Co. Ltd.
KVH Customer Case Study - Ride Co. Ltd.KVH Customer Case Study - Ride Co. Ltd.
KVH Customer Case Study - Ride Co. Ltd.KVH Co. Ltd.
 
KVH Data Center Solutions
KVH Data Center SolutionsKVH Data Center Solutions
KVH Data Center SolutionsKVH Co. Ltd.
 
TSE – OSE経営統合への見解
TSE – OSE経営統合への見解TSE – OSE経営統合への見解
TSE – OSE経営統合への見解KVH Co. Ltd.
 
アジアにおける広帯域ネットワークサービス需要の活況
アジアにおける広帯域ネットワークサービス需要の活況アジアにおける広帯域ネットワークサービス需要の活況
アジアにおける広帯域ネットワークサービス需要の活況KVH Co. Ltd.
 
KVH Singapore Data Center 1
KVH Singapore Data Center 1KVH Singapore Data Center 1
KVH Singapore Data Center 1KVH Co. Ltd.
 
KVH シンガポールデータセンター1(SGDC1)
KVH シンガポールデータセンター1(SGDC1)KVH シンガポールデータセンター1(SGDC1)
KVH シンガポールデータセンター1(SGDC1)KVH Co. Ltd.
 
KVH 香港データセンター1(HKDC1)
KVH 香港データセンター1(HKDC1)KVH 香港データセンター1(HKDC1)
KVH 香港データセンター1(HKDC1)KVH Co. Ltd.
 
KVH Hong Kong Data Center 1
KVH Hong Kong Data Center 1KVH Hong Kong Data Center 1
KVH Hong Kong Data Center 1KVH Co. Ltd.
 
お客様事例紹介 株式会社アプリクス様
お客様事例紹介 株式会社アプリクス様お客様事例紹介 株式会社アプリクス様
お客様事例紹介 株式会社アプリクス様KVH Co. Ltd.
 

Plus de KVH Co. Ltd. (20)

KVH DCNet 資料
KVH DCNet 資料KVH DCNet 資料
KVH DCNet 資料
 
企業における情報漏えいの効果的な防止 方法
企業における情報漏えいの効果的な防止 方法企業における情報漏えいの効果的な防止 方法
企業における情報漏えいの効果的な防止 方法
 
お客様事例紹介 systemsGo株式会社様
お客様事例紹介 systemsGo株式会社様お客様事例紹介 systemsGo株式会社様
お客様事例紹介 systemsGo株式会社様
 
KVH - systemsGo Customer Case Study
KVH - systemsGo Customer Case StudyKVH - systemsGo Customer Case Study
KVH - systemsGo Customer Case Study
 
KVH NetXpress (日本語版)
KVH NetXpress (日本語版)KVH NetXpress (日本語版)
KVH NetXpress (日本語版)
 
KVH NetXpress
KVH NetXpressKVH NetXpress
KVH NetXpress
 
KVH IP VPN
KVH IP VPNKVH IP VPN
KVH IP VPN
 
KVH IP VPN (日本語版)
KVH IP VPN (日本語版)KVH IP VPN (日本語版)
KVH IP VPN (日本語版)
 
KVH 東京大手町データセンター (TODC)
KVH 東京大手町データセンター (TODC)KVH 東京大手町データセンター (TODC)
KVH 東京大手町データセンター (TODC)
 
KVH Tokyo Otemachi Data Center (TODC)
KVH Tokyo Otemachi Data Center (TODC)KVH Tokyo Otemachi Data Center (TODC)
KVH Tokyo Otemachi Data Center (TODC)
 
お客様事例紹介 ライド株式会社様
お客様事例紹介 ライド株式会社様お客様事例紹介 ライド株式会社様
お客様事例紹介 ライド株式会社様
 
KVH Customer Case Study - Ride Co. Ltd.
KVH Customer Case Study - Ride Co. Ltd.KVH Customer Case Study - Ride Co. Ltd.
KVH Customer Case Study - Ride Co. Ltd.
 
KVH Data Center Solutions
KVH Data Center SolutionsKVH Data Center Solutions
KVH Data Center Solutions
 
TSE – OSE経営統合への見解
TSE – OSE経営統合への見解TSE – OSE経営統合への見解
TSE – OSE経営統合への見解
 
アジアにおける広帯域ネットワークサービス需要の活況
アジアにおける広帯域ネットワークサービス需要の活況アジアにおける広帯域ネットワークサービス需要の活況
アジアにおける広帯域ネットワークサービス需要の活況
 
KVH Singapore Data Center 1
KVH Singapore Data Center 1KVH Singapore Data Center 1
KVH Singapore Data Center 1
 
KVH シンガポールデータセンター1(SGDC1)
KVH シンガポールデータセンター1(SGDC1)KVH シンガポールデータセンター1(SGDC1)
KVH シンガポールデータセンター1(SGDC1)
 
KVH 香港データセンター1(HKDC1)
KVH 香港データセンター1(HKDC1)KVH 香港データセンター1(HKDC1)
KVH 香港データセンター1(HKDC1)
 
KVH Hong Kong Data Center 1
KVH Hong Kong Data Center 1KVH Hong Kong Data Center 1
KVH Hong Kong Data Center 1
 
お客様事例紹介 株式会社アプリクス様
お客様事例紹介 株式会社アプリクス様お客様事例紹介 株式会社アプリクス様
お客様事例紹介 株式会社アプリクス様
 

Dernier

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Dernier (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Cloud Security: Perception VS Reality

  • 1. WHITE PAPER: KVH Cloud Solutions Cloud Security: Perception VS Reality A breakdown of the top misconceptions enterprises are facing when assessing the security levels of cloud computing environments, and the realities behind them Table of Contents 2 Introduction 2 Perception 1: The cloud cannot be secure 2 Perception 2: Cloud computing is less secure than on-premise alternatives 3 Perception 3: Private Clouds are secure, Public Clouds are not 4 Perception 4: Compliance guarantees ssecurity 4 Conclusion 5 Appendix: Cloud Security Must-Haves 6 About KVH Copyright© 2012 by KVH Co. LTD All Rights Reserved. Not to be copied or reproduced without express permission of KVH Co LTD Page 1 of 6
  • 2. Cloud Security: Perception VS Reality Introduction to the kind of server being used and the network connecting their systems. Ranked as the top technology priority among CIOs in Asia in the 2011 Gartner Executive For industries that need to align with specific Programs (EXP) CIO Agenda Survey, cloud regulations, such as the financial services computing has attracted significant attention sector, ensure your service provider not only as businesses are becoming keen to offers security services that meet these understand how they can effectively standards by holding certifications in ITIL, ISO leverage these services at minimal risk and for 27001, and SSAE16, but is also experienced maximum benefit. With the continued growth enough through servicing other businesses in of online security threats and ways that these your industry to understand the role security can spread, security is repeatedly being solutions play in how your business functions reported as a key concern among businesses and transfers data. when determining whether they should move to the cloud and, if so, what kind of cloud Depending on the service and provider, solution they should be adopting. cloud computing solutions should be able to meet the security requirements of any This whitepaper aims to outline and verify the business from a technology perspective, as truth behind some of the common well as throughout their internal processes, misconceptions about security and cloud operations, and personnel. computing that can often deter businesses from adopting this evolving and potentially Perception 2: Cloud computing highly beneficial technology. is less secure than on-premise Perception 1: The cloud cannot alternatives be secure Reality: As cloud computing is strongly based on automated systems, it actually avoids the Reality: Cloud environments can be highly common security breaches that occur with secure and levels of security can be scaled to on-premise systems due to human errors. suit a business’ specific needs and existing IT systems. Before implementing a cloud service, Also, outsourcing ensures that physical access ask the service provider what level of security to your servers is strictly monitored 24 x 7 by they offer through public, private, or hybrid highly experienced professionals. Vendors cloud solutions, and how this differs according place high importance on these technologies, Copyright© 2011 by KVH Co., Ltd. All Rights Reserved Page 2 of 6
  • 3. Cloud Security: Perception VS Reality staff, and processes to ensure that their Reality: This perception is fundamentally built customers’ data is kept secure at all times. A on the understanding that there are two kinds security breach can be just as detrimental to of cloud services. However, depending on customers as it is to their service providers, not the use of hybrid configurations, on-premise only due to the expenses of solving the issue hosting and colocation, dedicated servers and implementing new technology and and networks, VPS, and various other processes where necessary to ensure the technologies, the security of a cloud service problem cannot arise in the future, but also can significantly change. Just as a network or because of the significant blow to their server configuration can be tailored to meet reputation that can take months, if not years, certain business requirements, a cloud to earn back. environment’s security can also be customized to meet compliance issues and For cloud computing service providers, this is other needs. a core part of their business, allowing them to make expensive, long-term investments in For example, the use of dedicated VLANs their security offerings to ensure they can would logically separate customer succeed in this increasingly competitive environments and provide security control at market by providing customers with the best layer 2. Intrusion prevention systems, Firewalls, services available. Furthermore, as more Encryption, Authentication, Authorization, businesses in the financial services sector are and Audit Trails provide the required security adopting cloud computing solutions, service controls to protect your assets and data. providers are being forced to improve their Leverage your provider’s Professional Services standards to meet the regulatory compliance to determine these details since, depending and operational security needs of these on the equipment used and configuration, a organizations, inevitably leading to an overall public cloud could be just as secure as a rise in security standards across the industry. private cloud and, despite the perception, private clouds can have security weaknesses Perception 3: Private Clouds in their infrastructure or how they are managed. are secure, Public Clouds are not Copyright© 2011 by KVH Co., Ltd. All Rights Reserved Page 3 of 6
  • 4. Cloud Security: Perception VS Reality Example Use Case of a Closed L2 Network Perception 4: Compliance has been supplied. As well as assessing the actual solution being provided, ensure your guarantees security provider’s certifications are up to date and that they regularly conduct internal and Reality: A service provider’s certifications in external audits to maintain a high level of ITIL, ISO 27001, and SSAE16 should be security across their infrastructure, processes, thoroughly assessed to ensure the provider is and daily activities. adhering to their own industry standards as well as your industry’s regulations and Conclusion: compliance requirements. However, it should also be recognized that a service provider Despite the security concerns mentioned should not be considered ‘secure’ merely above, more and more companies are because of their certifications. adopting cloud computing solutions to remain competitive and meet the evolving These certifications determine the standards a needs of their business and customers. The provider has met at a certain time, and do CIO Global Cloud Computing Adoption not necessarily ensure that these standards Survey of 2011 showed that two-thirds of are being maintained after the certification organizations are planning or currently Copyright© 2011 by KVH Co., Ltd. All Rights Reserved Page 4 of 6
  • 5. Cloud Security: Perception VS Reality adopting cloud computing, with 22% already measures deter you from leveraging this in department and enterprise-wide highly valuable technology. Instead, assess deployments. your business needs, the IT challenges you are trying to overcome, and your current IT When assessing the security of your cloud systems to ensure the right security solution is solution, do not let necessary security provided for you. Appendix: Cloud Security Must-Haves Certifications ITIL, ISO27001, and SSAE16 certifications for industry-standard processes, data center design, SDLC, operations, and maintenance Encryption Protects data from interception Firewall Provides access control filtering Authentication Ensures access to the system and data is only allowed to users who have been granted permission Authorization Ensures users can only perform actions that are permitted Auditing and Provides management teams with a clear window into what Reporting resources are being used by who and how Replication & Reliable backup and redundant systems support BCP and enable Redundancy fast data recovery when required Data Center Manages the physical access control of who has access to the Access Controls systems housing your data Copyright© 2011 by KVH Co., Ltd. All Rights Reserved Page 5 of 6
  • 6. Cloud Security: Perception VS Reality About KVH KVH was established in Tokyo in 1999 by Fidelity Investments as a Japan focused IT / communications service provider. As an information delivery platform that allows enterprise customers to store, process, protect and deliver their vital business information, KVH offers integrated cloud and network solutions that include infrastructure-as-a-service, managed services, data center services, professional services, data networking, internet access, and voice services. KVH operates the lowest latency network in Japan, and with over 450 financial services customers, is the leading provider of ultra low-latency network and proximity hosting solutions to the high-frequency trading community in Tokyo and Osaka. KVH also offers low-latency connectivity services between major financial markets in the Asia/Pacific region and the US including Tokyo, Chicago, New York, Singapore, Hong Kong, Shanghai, and Sydney. More information on KVH can be found at www.kvh.co.jp/en/ Copyright© 2011 by KVH Co., Ltd. All Rights Reserved Page 6 of 6