A Guide to Common Cloud Security Concerns. Why You Can Stop Worrying and Start Benefiting from SaaS



Similar documents
Famly ApS: Overview of Security Processes

KeyLock Solutions Security and Privacy Protection Practices

Security Practices, Architecture and Technologies

Is online backup right for your business? Eight reasons to consider protecting your data with a hybrid backup solution

Five keys to a more secure data environment

BMC s Security Strategy for ITSM in the SaaS Environment

Internet threats: steps to security for your small business

How To Protect Your Data From Being Hacked

Live Guide System Architecture and Security TECHNICAL ARTICLE

AWS Security. Security is Job Zero! CJ Moses Deputy Chief Information Security Officer. AWS Gov Cloud Summit II

Security. CLOUD VIDEO CONFERENCING AND CALLING Whitepaper. October Page 1 of 9

Top 4 Common Mistakes Made by IT Managers in Financial Services

Autodesk PLM 360 Security Whitepaper

Understanding Sage CRM Cloud

WhitePaper. Private Cloud Computing Essentials

Birst Security and Reliability

Enterprise Data Protection

What is Cloud-Based Security? Cloud-based Security = Security Management + Cloud Computing.

Colt Smart Office. Flexible network services for the smaller business. / Next

Gain the cloud advantage. Cloud computing explained Decide if the cloud is right for you See how to get started in the cloud

FACING SECURITY CHALLENGES

How to Evaluate DDoS Mitigation Providers:

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

EXIN Cloud Computing Foundation

2013 Market Outlook for Managed Service Providers

Enterprise level security, the Huddle way.

The Software-as-a Service (SaaS) Delivery Stack

Nine Steps to Smart Security for Small Businesses

Don't Wait Until It's Too Late: Choose Next-Generation Backup to Protect Your Business from Disaster

Secure, Scalable and Reliable Cloud Analytics from FusionOps

IBX Business Network Platform Information Security Controls Document Classification [Public]

VERISIGN DDoS PROTECTION SERVICES CUSTOMER HANDBOOK

Security Issues with Integrated Smart Buildings

White Paper: Librestream Security Overview

Security Policy JUNE 1, SalesNOW. Security Policy v v

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

The evolution of data connectivity

How On-Premise ERP Deployment Compares to a Cloud (SaaS) Deployment of Microsoft Dynamics NAV

Privacy + Security + Integrity

Cisco Wide Area Application Services Optimizes Application Delivery from the Cloud

Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services

Secure SSL, Fast SSL

Mapping Your Path to the Cloud. A Guide to Getting your Dental Practice Set to Transition to Cloud-Based Practice Management Software.

City of Coral Gables

Your complete guide to Cloud Computing

Securing the Service Desk in the Cloud

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud

Cloud Security In Your Contingency Plans

7QUESTIONSYOUNEEDTOASKBEFORE CHOOSINGACOLOCATIONFACILITY FORYOURBUSINESS

Simple security is better security Or: How complexity became the biggest security threat

MEDIAROOM. Products Hosting Infrastructure Documentation. Introduction. Hosting Facility Overview

Data Storage That Looks at Business the Way You Do. Up. cloud

Stop DDoS Attacks in Minutes

What You Should Know About Cloud- Based Data Backup

TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4

Contents. Introduction. What is the Cloud? How does it work? Types of Cloud Service. Cloud Service Providers. Summary

The Network and The Cloud: Addressing Security And Performance. How Your Enterprise is Impacted Today and Tomorrow

5 Essential Benefits of Hybrid Cloud Backup

THE SECURITY OF HOSTED EXCHANGE FOR SMBs

DDoS Attack Mitigation Report. Media & Entertainment Finance, Banking & Insurance. Retail

Chapter 11 Cloud Application Development

Who moved my cloud? Part I: Introduction to Private, Public and Hybrid clouds and smooth migration

Keyword: Cloud computing, service model, deployment model, network layer security.

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

Information Technology Security Procedures

How cloud computing can transform your business landscape

Move your business into the Cloud with one single, easy step.

SHAREPOINT CLOUD SOLUTIONS COMPARISON. A Technical Comparison of SharePoint Cloud Approaches

SECURITY OVERVIEW FOR MY.ENDNOTE.COM. In line with commercial industry standards, Thomson Reuters employs a dedicated security team to protect our

What is the Cloud and Saas? Introducing the Cloud and its Benefits

Security Features: Lettings & Property Management Software

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

Security Whitepaper: ivvy Products

Dooblo SurveyToGo: Security Overview

5 Critical Considerations for. Enterprise Cloud Backup

A Guide to Hybrid Cloud An inside-out approach for extending your data center to the cloud

Transcription:

A Guide to Common Cloud Security Concerns Why You Can Stop Worrying and Start Benefiting from SaaS

T he headlines read like a spy novel: Russian hackers access the President s email. A cyber attack on a health insurance company compromises the personal data of millions of customers. Ex-NSA Director claims Chinese hackers have breached every major corporation in the USA. 1 If the White House isn t immune, how can any business keep their data secure? It s no wonder that in a recent survey of new cloud service users, 47% of IT experts listed security as a significant challenge. 2 Yet, in spite of these concerns, spending on public cloud services is projected to more than double in just five years from $47 billion in 2013 to $107 billion in 2017. 3 Already 87% of CIOs surveyed reported running or experimenting with mission-critical business applications in the cloud. 4 94% of tech professionals report that their companies are using public or private cloud services. 2 What s driving the growth? More and more companies are creating and using cloud-based platforms and software because these services offer advantages that on-site server solutions simply can t match from security to flexibility. 47% 87% of IT professionals listed security as a significant challenge 2 2013 2017 $47 $107 BILLION BILLION projected spending on public cloud services 3 of CIOs are using the cloud for critical business applications 4 eventboard.io 415-423-2373 sales@eventboard.io 1

What Is the Cloud? Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources, e.g. networks, servers, storage, applications and services, that can be rapidly provisioned and released with minimal management effort or service provider interaction. 6 Cloud infrastructure makes the modern Internet possible from streaming Netflix and always on business services like Salesforce, Adobe and EventBoard, to personal uses like online photo storage and multi-player gaming. More Companies Are Moving to the Cloud Why? Despite the constant stream of news reporting security breaches, more companies are moving critical data systems into the cloud. Believe it or not, it s because of security concerns that so many companies of all sizes are making the move. Cloud computing is generally more secure and safer than hosting your data on local servers at your place of business. While some organizations still have concerns, today s SaaS (software as a service) solutions are a vast improvement over yesterday s data storage solutions. Cloud service providers have long recognized that effective security is key for their continued growth and success. They ve made significant progress in mitigating security hazards. The risk of accidental or deliberate theft, leakage or deletion of data has led these providers to create secure infrastructure for computing, storage and networking that help eliminate these problems. And while no system is completely immune from attacks or disaster, those provided by reputable cloud companies are among the best in the world. eventboard.io 415-423-2373 sales@eventboard.io 2

Security Starts with Physical Facility Protection Although the cloud refers to always-on, virtual software and data storage, the servers and other hardware that the cloud runs on are located in physical facilities around the world. Providing security for these facilities is the first step in making sure SaaS services are truly secure. The major cloud providers focus on physical security of their data centers by strictly limiting access. (It s easier to get into the White House than it is to get into a Rackspace or AWS hosting facility.) Trained security staff monitor facilities using video surveillance and intrusion detection systems. They also use other undisclosed security measures, kept secret to make detection more difficult. Access to these data centers is strictly limited to authorized staff, who can enter only after passing a two-factor authentication process (often multiple times). Visitors and contractors are escorted by authorized staff at all times. Protection from Disasters of All Kinds Of course, criminals aren t the only danger cloud systems face. That s why these facilities are also equipped with automatic fire detection and suppression systems to protect against catastrophic heat and fire damage. Power systems are fully redundant, providing back-up energy in case of power loss. And data centers are kept at optimal operating temperatures for servers and other hardware to prevent overheating and reduce the risk of service outages. When considering a cloud provider for your SaaS application or data storage, ask about facility security and redundancy. Make certain security there is better than you can provide on your own. Reputable cloud providers maintain data storage facilities in multiple geographic locations for data redundancy. If one facility suffers a catastrophic event, traffic can be shifted to a second facility where the data is backed up, to provide seamless access. In normal circumstances, cloud providers can balance traffic from various regions to speed up access to online services. These security measures have become standard at major cloud providers often dramatically exceeding the security and safety precautions that small and medium sized businesses are able to provide for their own onsite server rooms. For this reason alone, many organizations have begun to shift their data systems offsite to cloud providers. eventboard.io 415-423-2373 sales@eventboard.io 3

What Cloud Providers Do for Network Security Companies offering cloud services provide configurable systems that allow users to select the appropriate security levels for their needs. They employ standard network protections firewalls, proxies, gateways and other boundary devices to control access to your systems and data. If necessary, you can configure the system for secure access only. It is common practice for cloud providers to allow access via Secure Sockets Layer (SSL), a cryptographic protocol designed to protect data transfers against eavesdropping, tampering and forgery. Monitoring tools designed to detect unusual or unauthorized activities, stop intrusion and fight common security issues like Distributed Denial of Service (DDoS) attacks, Man in the Middle (MITM) attacks, IP Spoofing, Port Scanning and Packet Sniffing are standard practice. While enterprise-sized organizations may have the resources and scale to maintain this level of security for their own systems, most small to medium businesses don t. Which is why so many of them are shifting data to the cloud and taking advantage of the tough security protocols provided to all cloud customers. This doesn t mean that cloud customers can ignore potential issues and depend solely on providers. They can t. SaaS security is a responsibility shared by the provider and the client. Clients need to insure that open ports are protected using HTTP server software (like Apache), secure transactions are set up to use SSL, and sensitive traffic is encrypted. Security Standards and Legal Compliance Reputable cloud providers have established robust compliance systems to meet both industry and government compliance requirements for security and data protection. Current best practices include compliance with the latest IT security standards: SOC 2 FedRAMP ISO 27001 ITAR FIPS 140-2 (Note: the various protocols apply to different use cases. Check with your cloud provider about your specific compliance requirements.) When considering SaaS services, ask about the security measures the provider takes to protect your sensitive data. Have them talk about the standards they meet today. If they can t talk authoritatively about security standards, look for another solution. eventboard.io 415-423-2373 sales@eventboard.io 4

More Software-as-a-Service Business Advantages Physical and network security are among the most important advantages that cloud providers offer to small- and medium-sized businesses, but they aren t the only benefits. Here are a few other reasons companies of all sizes are moving more of their technical operations to the cloud: FLEXIBILITY One of the key advantages to cloud services is the ability to scale up or down as needs change. You can add or remove licenses as needed. When traffic threatens to overwhelm your current bandwidth, you can spin up additional instances to handle the excess volume. And when traffic decreases, removing excess capacity is as simple as a few clicks. AVAILABILITY Cloud services are always-on, regardless of business hours. Today s best cloud services deploy data in centers around the world and guarantee access to your data anywhere with virtually no downtime. Worldwide deployment also means customers everywhere have more immediate access to the services they need. REDUCED CAPITAL EXPENSES AND ENERGY USE Because SaaS servers are virtual, users don t need to budget capital expenses to support their growing networks. Instead, you pay as you go, depending on use. What s more, cloud servers use significantly less energy (30-90% less depending on the size of the company 5 ) thanks to multi-tenancy, dynamic provisioning and higher utilization rates. It can add up to significant IT savings. ENABLES TELE- WORKING AND OTHER EVOLVING BUSINESS PRACTICES In today s rapidly changing office environments, programs, data and networks are no longer tied to desktop machines in a physical location. The use of cloud technology has freed employees to connect and work anywhere they have an Internet connection. A growing number of smart business leaders rely on SaaS products to help employees increase creativity, productivity and collaboration then deliver on business objectives. AUTOMATIC SOFTWARE UPDATES The SaaS model offers a significant advantage to companies struggling with software updates for servers and desktop systems. Cloud providers do the software and server maintenance eliminating time-consuming software replacement processes. Updates happen automatically, usually invisibly to end-users. ENTERPRISE- LEVEL SOLUTIONS AT SMALL BUSINESS PRICES Just a few years ago, only big businesses could afford to invest in the kinds of tools available on the cloud today. But as SaaS solutions have been adopted by a variety of organizations of all sizes, the costs and hassles associated with developing and maintaining mission-critical systems and data in the cloud are significantly reduced meaning even small companies can access and use enterprise-level software solutions. eventboard.io 415-423-2373 sales@eventboard.io 5

Cautious Businesses Are Testing SaaS Despite the steady growth of cloud usage, some CIOs have taken a wait-and-see approach. These cloud watchers still have concerns with legacy application support, multi-tenancy, licensing costs and a lack of resources for managing cloud services. But as reputable cloud services have taken steps to address these issues (and others like them), even late adopters are making the shift. Organizations concerned about moving mission-critical systems to the cloud are adopting SaaS products and services from trusted vendors. Software solutions like customer and sales management tools, property management solutions, or dashboard and reporting software are low-risk opportunities to test the effectiveness and promised savings of cloud solutions in their businesses. As organizations adopt cloud more broadly, they realize increasingly more value, and the challenges of adopting cloud decline.2 eventboard.io 415-423-2373 sales@eventboard.io 6

Is It Time for Your Organization to Move into the Cloud? The benefits of adopting cloud services are compelling, from better security to improved uptime and around-the-world access. As the most compelling business concerns about the cloud are addressed and solved, more organizations are adopting cloud solutions. More than ever, moving to the cloud appears to be a smart business decision that will pay dividends for years to come. Sources 1 Headlines from The New York Times, April 25, 2015 and February 5, 2015; and CNN, March 13, 2015. 2 State of the Cloud Report, RightScale, 2014. 3 Worldwide and Regional Public IT Cloud Services 2013-2017 Forecast, IDC, 2013. 4 State of the Cloud Report, RightScale, 2014. 5 Cloud Computing and Sustainability: The Environmental Benefits of Moving to the Cloud, Accenture, 2010. 6 The NIST Definition of Cloud Computing, National Institute of Standards and Technology, U.S. Department of Commerce, 2011. About EventBoard EventBoard is a cloud-based platform that makes meeting room management easy for thousands of companies around the world, including AirBNB, MGM Grand and Disney. Successful businesses use EventBoard to optimize their workspaces, save millions and help employees work more efficiently. Sign up for a demo at info.eventboard.io/ request-a-demo or call us at 415-423-2373.