GDPR and the Cloud: 6 Key Points You Need to Know

Cloud Data Protection, GDPR, General Data Protection 1 Comment

The clock is ticking and the GDPR is coming to a jurisdiction near you. Although it was created by the EU, most businesses realize that the General Data Protection Regulation, which takes effect in May 2018, will have global reach, covering not just data in Europe, but the personal information of European citizens and residents – wherever it is globally. …

goalkeeper blocks soccer ball

Cloud Data Isn’t Lazy Data

Cloud Data Protection

Why your cloud security strategy shouldn’t rely solely on data-at-rest encryption In our last blog post, we revealed that cloud provider “Bring Your Own Keys” (BYOK) options merely let customers keep a copy of their keys, not own the whole set of keys. In this post, we’ll look at the SaaS application environment in detail to understand why data-at-rest encryption …

Six Reasons Why Encryption Back Doors Won’t Deter Terrorists

Cloud Data Protection, Cloud Security

Last month’s tragic events in Paris, and fears over similar terrorist attacks around the world, have revived a long-standing debate. Early evidence suggests that the terrorists used a readily available encryption app to hide their plans and thwart detection by law enforcement. This has led to finger-pointing by intelligence officials and politicians demanding that something be done to control this dangerous technology. Keep …

cloud data protection 101

Cloud Data Protection 101: Data Classification

Cloud Data Protection, Cloud Security

When it comes to protecting your sensitive customer and corporate data in the cloud, encryption and tokenization will no doubt be two of the most important weapons in your arsenal. But before you can begin applying them (along with your other cloud data protection tools) to your data, you’ll need to know where to encrypt and where to tokenize, and …

Shadow_IT_Cloud_Data_Protection

For Total Cloud Data Protection, Companies Must Gain Control of Shadow IT

Cloud Data Protection, Shadow IT

Think fast! How much of a problem is shadow IT at your organization? If you answered “not much” or “not at all,” then we have an unpleasant surprise for you. According to a recent report by 451 Research an estimated that 79% of employees use shadow IT applications. So unless you’ve taken steps to identify and address shadow IT in …

role_IT_cloud_data_protection

The Role of IT in the Era of Cloud Data Protection

Cloud, Cloud Data Protection, Latest Trends, Technology 0 Comments

There’s no question about it: cloud computing and workforce mobility have forced a dramatic change in the enterprise IT infrastructure. Gone are the days of the network perimeter keeping all data inside. Organizations looking to stay responsive and competitive must adopt the cloud, and cloud computing means enterprise data traveling far beyond the on-premises data center and, seemingly, far outside …

five tips cloud data protection

Are You Vulnerable? 5 Tips for Cloud Data protection

Best Practices, Cloud, Cloud Data Protection 0 Comments

The flexibility, agility, and anytime/anywhere accessibility of cloud applications confers advantages that few companies can do without. But you can’t adopt the Cloud without controls or a plan. To maintain both regulatory compliance and cybersecurity, you have to make sure your cloud data protection environments are up to scratch. Here are five ways to do so. 1. Know which clouds …