11  Download (0)

Full text






What You Need

to Know About


Table of Contents

Cloud Adoption Drivers

Key Capabilities and Technologies

Usability and User Experience

Security Technology

Architecture Platform

Market Leadership

Report Card












Cloud Adoption Drivers

Businesses and other organizations

are increasingly moving to the cloud.

Gartner reports that the total market for public cloud services is expected to grow to $210 billion by 2016 and that SaaS, PaaS, and IaaS will achieve compound annual growth rates (CAGR) of 19.5, 27.7, and 41.3 percent respectively, through 2016.

As the cloud has become mainstream, the debate about cloud adoption has shifted from “if” to “how.” It’s the “cloud way” or the “highway” because:

The higher return on investment (ROI) and lower total cost of ownership (TOC) of cloud applications have been well documented

Business units are deploying applications – often without IT support

IT must play an enablement role in order to say relevant and in control.

According to Knowledge at Wharton, 85 percent of IT professionals believe cloud computing will transform their business.

Key considerations

However, moving business infrastructure to the cloud goes beyond financial and resource implications. Common questions and points to consider include:

Regulations around information privacy and

security are being adopted globally with increased penalties, and disclosure requirements for breaches.

Law enforcement in many countries can increasingly

compel disclosure of cloud-based information from service providers, often without consent or notification of the data owner.

The cloud doesn’t recognize national boundaries, and best practices often call for distributing information across data centers, regions, and countries for redundancy and accessibility. As data crosses borders complying with privacy and data residency laws in multiple countries becomes extremely complex.

Most cloud providers take reasonable steps to secure their infrastructure and applications, but do not take legal responsibility for the security of your information. At the same time, regulations are becoming increasingly explicit that the organization is legally responsible for protecting their sensitive data, regardless of where it resides in the cloud. This convergence of opportunities and challenges requires a new approach to cloud information protection. Organizations must assure their sensitive data is protected before it goes to the cloud, and cannot be accessed or leaked by third-parties.

It’s the “cloud way” or

the “highway.”


What you Need to Know: Cloud Information Protection Services 4 ©2013 Ⅰ CipherCloud

Usability and

User Experience

No security solution will be effective if it breaks the application or makes it impractical to use. In order to safely leverage the advantages of the cloud, you need solutions that:

Preserve the formats of various structured data elements such as email, phone, date and numbers and unstructured data like comments

Enable advanced search, sort, and reporting of data while it is secured in the cloud

Deliver negligible performance latency to accessing and

manipulating data in the cloud

Above all, the user

experience needs to be

seamless and transparent

for authorized users—

otherwise users will stop

using the application or

find a way around the

information protection.


By leveraging new cloud security

technology, organizations can

resolve the conflicting interests of

retaining control over their sensitive

information, while enabling the

business to realize the many benefits

of the cloud.

Finding effective and practical tools to protect the sensitive information assuring that:

Any cloud application can be secured

No unauthorized outsiders can ever access, leak or disclose data

Exclusive access to the keys to encrypt and decrypt the data

Encryption and tokenization controls can be made a on a field by field basis

Option to integrate with best of breed enterprise tools for Single Sign On and Data Loss Prevention

Maximum visibility into user activities

“...You have to make

security encryption

easy to use...you have

to integrate it with

applications to be a

seamless part of the

user experience...it

cannot interfere with

productivity, because if it

does users will ignore it

or route around it,

or they’ll hate

the application”

—Marc Andreessen

Andreessen Horowitz


What you Need to Know: Cloud Information Protection Services 6 ©2013 Ⅰ CipherCloud

Cloud Protection solutions must be

architected to support enhanced

security capabilities and extensible

enough to integrate with

customer-centric use cases and business logic

workflow now and into the future.

Before you can protect sensitive corporate

information in the cloud you first need to ensure that:

A single platform can be used to secure multiple cloud applications, each with its unique set of policies and encryption keys

The platform architecture is globally distributed and redundant and can be supported out-of-the-box to minimize downtime and performance overhead

Options are available to avoid storing any sensitive data in mission critical databases on-premise

Protection abilities can be extended to any SaaS,

PaaS or IaaS solution


Thus far, we have mostly discussed features

and benefits to help evaluate which

cloud-computing models, architectures,

technologies and best practices to adopt to

implement secure cloud computing services.

The following considerations are equally important:

The vendor has a solid history of live customer successes and deployments.

The vendor has several reference-able successful customers in your industry.

It is easy to locate positive media and industry

recognition (awards, press and analyst coverage) regarding the vendor’s solution.

The company is financially healthy and growing faster than the rest of the industry.

Market Leadership

How easy is

it to locate


media and




What you Need to Know: Cloud Information Protection Services 8 ©2013 Ⅰ CipherCloud

The solution preserves application capabilities including user search, sorting, and reporting

Preserves advanced reporting and list view capabilities Enables mobile support for any device

Delivers batch processing of structured and unstructured data Ensures negligible performance impact to accessing and manipulating data in the cloud

Supports AES-256 bit encryption, FIPS-compliant – enabling the data to be fully encrypted in the cloud.

Enables Tokenization—the ability to retain the original business data on premise while replacing it with random characters in the cloud

Ensures that the company or organization always retains the encryption keys

Delivers cloud malware detection to protect against viruses, spyware, Trojans, bots, rootkits and more

Supports cloud data loss prevention and the ability to scan, detect and take action to protect sensitive data going to the cloud

Provides easy to read and insightful dashboard to report on user activities and monitor out-of compliance and malicious activity







At this point it is time to review the important criteria in your discovery of the right cloud information protection. How does your vendor compare against the following criteria?


Delivers information protection to cloud business applications including Salesforce, SuccessFactors, and NetSuite

Supports information protection in collaboration applications like Box, Yammer, and Jive

Enables protection of content in email offerings like Microsoft Office 365 and Google Gmail

A high availability stateless architecture with redundancy and real-time replication for maximum performance

The platform can be installed on a physical server or virtual machine behind the firewall or in a virtual private cloud such Amazon Web Services (AWS)

Has a proven global and cross-industry customer base

Many strong customer references and high customer satisfaction Excellent industry recognition as a recipient of key awards and achievements

Both deep and broad consulting and implementation partner relationships

Architecture Platform

Market Leadership






What you Need to Know: Cloud Information Protection Services 10 ©2013 Ⅰ CipherCloud

Adoption of the cloud is passing a tipping point and is increasingly a fact of life for many

organizations, and IT will not succeed at trying to put the cloud genie back in the bottle. But this change in technology does not absolve organizations from their legal responsibilities to protect their customer’s data. In fact, the growth of the cloud has been met with an equal growth in privacy laws and data residency restrictions.

By leveraging new cloud security technology, organizations can resolve these conflicting interests—retaining control over their sensitive information, while enabling the business to realize the many benefits of the cloud. By deploying systems that encrypt or tokenize sensitive data at the gateway, while keeping all encryption keys within the enterprise, organizations can safely extend their virtual security perimeter to include global, distributed cloud services, while still maintaining privacy, security, and compliance.


CipherCloud is the industry leader in

cloud information protection, enabling

organizations to securely adopt cloud

applications by overcoming data privacy,

residency, security, and regulatory

compliance risks.

The award-winning CipherCloud Platform

has been deployed globally by Fortune

1000 companies in banking, insurance,

healthcare, hi-tech, and government.

Corporate headquarters:

99 Almaden Blvd, San Jose, CA 95113, USA Visit www.ciphercloud.com

for more information, online demos, or free trials.