By Saaher Muzafer, Chief Sales Officer at SecurStore Online Backup
December 16, 2011

SecurStore Online Data Backup Expert Tips: Face It! Data Security is a Pain in the Neck

IT administrators commenting on the stink view environmental control as a constant battle. They aver that the more security you build in, the more sophisticated security threats become and there is no denying this fact. But, no one would really like to throw up their arms and compromise with the situation! The instinct for survival is strong in us and we would battle on against all odds.

As organizations transition to cloud computing frameworks for enterprise applications, they must learn to leverage the many advantages of the cloud and secure the application ecosystem to ensure success of their security mechanisms. They must begin by identifying and acknowledging the problems that come packaged with cloud computing:-

1. There are no hardened security perimeters around the data in the cloud
2. Security configurations are not so easily visible or manageable
3. Some types of cloud configurations enforce resource sharing
4. Software virtualization layers increase the mobility of data and the risk of resource attacks
5. There are no standards for recycling of memory or disk space as yet, and
6. Data privacy and data confidentiality can be compromised if adequate measures are not taken

The battle can be won with strategy. Strategizing security will reduce risks and enable enterprises operate safely in public, private or hybrid clouds.

Cloud vendors must ensure security:

1. Security perimeters can be created by utilizing user firewall and security mechanism information and customizing security policies for the initial server and cloning such information onto virtual servers that inherit from it.
2. Security configurations can be made visible and manageable by providing software agents installed on the client machines with user control panels.
3. Resource sharing risks can be reduced by enforcing access protocols and layered security protocols.
4. Industry standard kernel level AES encryption can be used for near foolproof security for sensitive data stores.
5. Consumers can be encouraged to maintain unique encryption keys that are not accessible to the cloud vendor.
6. Granular level controls can be built in to ensure that all machines do not have access to encrypted data.
7. Vendors must define and implement the standards for recycling of memory and disk space that is being adopted by them.
8. Full audit trail of key approvals occurring on the management server can be logged to ensure constant monitoring of server activity.

SecurStore provides a bespoke offsite backup solution catered for customers who have both mission-critical data and non-critical data, i.e., it provides customers with a secure & efficient backup and recovery solution which is sustainable over time. This coupled with agentless technology and advanced support for all environments and applications makes it suitable for any type of business, data centre provider or reseller.

Watch SecurStore video – guided tours here:

About the Author: Saaher Muzafer is Chief  Sales Officer at SecurStore, an Asigra based cloud backup provider certified by British Standards Institute for ISO 27001 and ANAB. Established in 1991, SecurStore provides businesses and enterprise customers a technically advanced solution in UK, Europe, USA, Africa, Asia and the Middle East.

General Tags: online backup news, backing up online, cloud computing, online data backup, online file storage, compare online backups, online backup providers directory, CEO interviews, top rated online backups, data security, software as a service, online backup reviews, online file backup, SaaS, online backup companies, data storage, online backup, online backup services

Like us on Facebook

Do you like this post? Subscribe to our RSS feed ===========================


Related posts:

  1. Securstore Online Data Backup Expert Tips: Endpoint Security – Study Reveals Status Quo
  2. Securstore Online Data Backup Expert Tips: Defense in Depth – Cloud Security Strategies
  3. Securstore Online Data Backup Expert Tips: Device and Application Risks—Cloud Security Strategies
  4. SecurStore Online Data Backup Expert Tips: Email Security and Online Backup
  5. Securstore Online Data Backup Expert Tips: New Technology, New Terminology?
  6. Securstore Online Data Backup Expert Tips: Range of Encryption Algorithms – The Choice is yours
  7. Securstore Online Data Backup Expert Tips: Exiting a Cloud Service
  8. SecurStore Online Data Backup Expert Tips: Getting the Best out of Storage Virtualization
  9. SecurStore Online Data Backup Expert Tips: Strategizing For Compliance
  10. SecurStore Online Data Backup Expert Tips: Maintaining Control Over the Cloud

Tags: , , ,