Cloud Data Protection Done Right: When Bringing Your Own Key Just Isn’t Enough
- LANGUAGE: English DATE: Thursday, April 12, 2018 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Data encryption is undoubtedly the most popular technology for securing data in the cloud, but also one of the most misunderstood ones. Although most cloud service providers offer their own capabilities for encrypting data at rest or in transit, their implementations may vary dramatically in scope and quality. Without understanding of underlying principles, it is too difficult for most customers to see behind marketing buzzwords and to estimate what grade of security they are actually getting. Protecting your data from unauthorized access isn’t even your cloud provider’s legal responsibility – you are still fully responsible for all consequences of any data breach.
Although many SaaS vendors will gladly offer you to handle all your encryption needs and even let you manage your own encryption keys with absolute security, the bitter truth is that anyone that has access to your keys can potentially access your data – and that includes external administrators and overly curious intelligence agencies. Only by taking the matters in your own hands and establishing a holistic data encryption platform you are able to be absolutely sure that your data remains safe and compliant with the most stringent industry regulations. You stay in control of your data!
Join this KuppingerCole webinar and learn:
- Why not all encryption solutions are equally secure and how to see beyond marketing buzzwords;
- What operational, security and compliance challenges businesses face when dealing with cloud data encryption;
- Reaping the benefits of third generation encryption solutions and overcoming their traditional drawbacks;
- Keeping your cryptographic keys safe, your data secured and your auditors happy with a transparent end-to-end encryption gateway.
In the first part of the webinar, Alexei Balaganski, Lead Analyst at KuppingerCole, will talk about the challenges businesses are facing when moving their sensitive data into the cloud and explain why data encryption and tokenization are the most effective measures they can take to protect sensitive data in cloud environments. Finally, he will outline the ideal requirements an encryption solution must meet to ensure strong protection and full compliance for sensitive data in the cloud.
In the second part, Elmar Eperiesi-Beck, CEO & Founder of eperi GmbH, will share his decades-long experience in data tokenization, encryption and key management and will demonstrate how transparent encryption gateways can solve many problems traditionally associated with end-to-end encryption and demonstrate once again that security vs. convenience does not have to be a dichotomy.
eperi GmbH is a leading provider of Cloud Data Protection (CDP) solutions with several hundred customers addressing data security, compliance and data control use cases for custom applications and leading SaaS applications such as Office 365, Salesforce, ServiceNow, Custom Apps and others. eperi enables cloud usage while maintaining data compliance requirements, such as GDPR, PCI/DSS or HiPPA, and protects sensitive data from unauthorized access by encrypting all critical data proactively before it is transferred to the cloud.
eperi CDP solutions are software based solutions that can be used as on-premises gateway solutions under the full control of the enterprise, or are available through MSSP (Managed Service Security Partners) such as IBM, T-Systems and others. The eperi CDP solutions are unique in offering the broadest and deepest supports for cloud SaaS, applications, databases and files and are designed with a powerful template concept to support hundreds of different cloud SaaS applications.
The security landscape has changed in the recent decade, and the methods we used to protect our enterprise networks are no longer working. The network perimeter has dissipated, the adversary has become increasingly skilled at alternative methods to gain entry, and enterprise applications and data are spread across multiple environments, on-premises and in the cloud. With more sensitive information getting out of our control every day, a data breach is just waiting to occur, and the consequences, if successful, can be disastrous for your business.
The Consumer Identity World USA is the place where you get input for your perfect CIAM Strategy. Learn more about Privacy by Design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.