cio's guide to enterprise cloud adoption

16
CIO’S GUIDE TO ENTERPRISE CLOUD ADOPTION CIPHERCLOUD | © 2015 | ALL RIGHTS RESERVED

Upload: ciphercloud

Post on 10-Aug-2015

271 views

Category:

Technology


2 download

TRANSCRIPT

CIO’S GUIDE TO ENTERPRISE CLOUD ADOPTION

CIPHERCLOUD | © 2015 | ALL RIGHTS RESERVED

Trends Transforming Enterprises

CIPHERCLOUD | © 2015 | ALL RIGHTS RESERVED

User adopted and mission critical applications increasingly reside outside the enterprise narrowing visibility and introducing unknown risks

Apps and People on the Move = No Visibility, Unknown Risks

CIPHERCLOUD | © 2015 | ALL RIGHTS RESERVED

9 Steps to Enable the Cloud While Maintaining Visibility and Control

CIPHERCLOUD | © 2015 | ALL RIGHTS RESERVED

STEP 1: Discover all cloud applications in use

Without visibility into all your organization’s cloud usage you may be risking security, allowing leaks of sensitive data, and reducing efficiency.

STEP 2: Assess the risk of your applications

Find applications that can be conduits for malware attacks, data theft, and security breaches.

STEP 3: Enable the right applications

Standardize whenever possible, discourage the use of free services, block risky applications and monitor alerts for new risky applications.

STEP 4: Understand how your users work

Work with your users to understand what applications are critical and what functionality is important to them.

STEP 5: Enforce data loss prevention policies

By extending your DLP controls to cloud applications, you can have assurance that cloudapplications are being used wisely and not becoming avenues for data loss or harmful breaches.

STEP 6: Monitor user activity and detect anomalies

Consistent user activity monitoring provides a baseline of known behavior. Noticeable changes in typical behavior can be important indicators of suspicious activity or serious breaches.

STEP 7: Understand compliance requirements

In order to effectively protect sensitive data your organization needs to understand the specific compliance requirements for any data it is handling and potentially putting in the cloud.

STEP 8: Encrypt or tokenize sensitive data fields

Encrypt or tokenize your sensitive data in the cloud and keep the keys to assure security and compliance, data residency and sovereignty.

STEP 9: Preserve business functionality

Apply effective security tools that do not break key business functionality, else this would defeat the purpose of using the cloud.

Does encryption/tokenization of your cloud data :

• Preserve format & length?

• Supports search, sort of data?

• Enable advanced reports & list filters?

• Impact user experience?

Summary

Regardless of your stage of cloud adoption, fundamental requirements remain the same:

• Understand what your users are doing and how their business needs have changed

• Gain visibility to where your sensitive data is going and who should and should not

have access

• Take proactive steps to protect business-critical information and retain control regardless of where it goes

CIPHERCLOUD | © 2015 | ALL RIGHTS RESERVED

500+ Employees

Company

3.0+ MillionActive Users

13 Industries

25 Countries

7 Languages

P 13 Patents

Solutions

Cloud DiscoveryCloud DLP

Strong EncryptionTokenization

Activity MonitoringAnomaly Detection

Customers

5 out of 10Top US Banks

3 out of 5Top Health Providers

Top 2 GlobalTelecomm Company

40% of GlobalMail Delivery

Largest USMedia Company

3 out of 5Top Pharmaceuticals

About CipherCloud

CIPHERCLOUD | © 2015 | ALL RIGHTS RESERVED

Twitter.com/ciphercloud

Youtube.com/user/CipherCloudVideo

Linkedin.com/company/ciphercloud

Facebook.com/ciphercloud

Connect with Us!Download Complete Whitepaper :CIO’s Guide to Enterprise Cloud Adoption

Be sure to check out our Global Compliance Center!

For additional information :• Website: www.ciphercloud.com• Email: [email protected]• Phone: +1 855-5CIPHER

More Information

CIPHERCLOUD | © 2015 | ALL RIGHTS RESERVED