CLOUD DATA PRIVACY

Distribute data across multiple object store locations or vendors for business continuity and operational efficiency.

Stay on the Safe Side to Avoid Compliance Complications

Overview

Over the past few years cloud service providers (CSP’s) have increased their focus on data security and surveys show that confidence and trust of public cloud is growing. CSPs have created multiple, albeit mostly proprietary solutions such as identity management, multi-factor authentication, disk/file encryption, key management, auditing and other tools to address security concerns. However, more and more organizations are employing hybrid or multi-cloud strategies which increases complexity to support disparate data security tools and processes across vendors, and becomes especially challenging for managing compliance.

Regulation Highlights

Situation

Ultimately, organizations are responsible for the security of their data, not the cloud vendor. If you primarily use a single cloud provider and have the resources and business processes in place to manage the various components for cloud security, there is still the matter of data privacy – yes, security and privacy are different. CSP administrators need access to your IaaS servers or object storage disks to support your operations, but you need to ensure they cannot access, use or modify your critical data, whether accidentally or maliciously. This comes down to maintaining control of access, data encryption, key management and auditing on-premises so you can comfortably trust your data in the cloud.

Prepare and Protect with DataKeep

DataKeep offers role-based access controls, privileged access management and separation of security vs. administrative duties to prevent any one person or service provider from having complete system control. Built-in key management works transparently and provides organizations with the flexibility they require to stay in control of keys, and associated data, at all times. By implementing DataKeep organizations can easily manage who, what, when, where and how data is accessed and mitigate risk associated with unauthorized access to data and securely support their cloud strategy, whether employing a single provider strategy or implementing a multi-cloud strategy to expand data storage options and avoid vendor lock-in.

GDPR Overview

Trust the Security, Integrity and Availability of Your Data in the Cloud

Securely leverage cloud resources for sensitive workloads

Retain control and ownership of data security

Span across multiple cloud providers for high availability

Testimonials

“DataKeep’s data-centric model enables our government and DoD customers to leverage the benefits of cloud-based computing and storage without risk by protecting sensitive data from the point of creation to deletion, and not just while the data is in storage.”

Eric Vollmecke, president of SENGEX

"SecurityFirst's DataKeep solution is integral to CMA's overall cybersecurity Risk Management Framework solution portfolio with its best-in-class data-centric protection capabilities. DataKeep's ability to safeguard federal organizations’ data across on-premises, cloud or hybrid environments positions it ideally for most every solution strategy and architecture."

John H. Frey, Director, Channel & Alliances, GWAC Program Manager

Disclaimer: Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Copyright © 2018 Security First Corp.     Terms of Use     Privacy Policy     Support Desk    Contact Us

Pin It on Pinterest