Page 21 - TelecomReseller JanFeb 2016
P. 21


C

January/February 2016
Telecom Reseller 21 

PATTERSON
continued from page 13
M

enterprise-ready services procured by the IT “Whether it’s the underlying components that P
department such as O ce 365 to far lesser Cybersecurity concerns have led many decision-makers to take a step back make up this infrastructure (e.g. CPU caches, 
known and riskier services such as FreakShare.”
GPUs, etc.) that were not designed to o er 
 e report further estimates that sensitive and consider private cloud or hybrid solutions as the starting point
strong isolation properties for a multi-tenant 
corporate data makes its way to the cloud architecture (IaaS), re-deployable platforms 
routinely, with 15.8 percent of documents in (PaaS), or multi-customer applications (SaaS), 
 le-sharing services containing some form of the threat of shared vulnerabilities exists in all managers are increasingly concerned about the best ways to deal with cloud abuse?  e
sensitive content.
delivery models,” writes the Cloud Security security risk of those devices?
Cloud Security Alliance de nes cloud abuse
As we mentioned in our mid-year review, Alliance.
#4: Do you allow employees to use their as “a bad guy using a cloud service to break
“Cybersecurity concerns have led many decision- #1: Are you using the right tools? 60 percent own devices?  e rise of bring-your-own- an encryption key too di cult to crack on a 
makers to take a step back and consider private of UK IT managers surveyed by  e Register‘s device (BYOD) and bring-your-own-application standard computer. Another example might be 
cloud or hybrid solutions as the starting point. cloud survey said they were using VPN (BYOA) means that many cloud services and a malicious hacker using cloud servers to launch 
Intrusions into corporate databases at Target, connections, but only 34 percent said they were tools are sneaking into organizations under the a DDoS attack, propagate malware, or share 
Sony, Home Depot and, just recently, the hacking using cloud  rewalls or encrypting data at rest. noses of IT leaders. In a recent survey, more pirated so ware.”
of 22.1 million Federal employee records have led “ e numbers continued to drop in regards to than half of the IT respondents said that when
#2: What cloud technologies are being 
companies to think twice. Security issues, which other preventative measures until the bottom
it came to cloud services, the biggest challenge shared, and with whom? Cloud service 
have always been part of the cloud debate, are of the list where only 15 percent said they were was assessing the security risk before employee providers o en share infrastructure, platforms 
now center stage.”
using obfuscation or tokenization of sensitive adoption.
and applications to deliver their services in a 
While the above-named breaches generated data,”  e Register reported. ■
#3: How do you de ne and determine the
scalable way.
quite a bit of attention, a study by the Ponemon 
Institute showed that breaches are much more 
widespread, with an estimated 43 percent of 
companies having experienced at least one data 
breach in 2014. Clearly, the enterprise cloud and 
local applications are both under attack. So what 
are corporations expected to do?
 e bright side of this story is that many of the 
same security practices used to secure traditional 
enterprise applications also apply to the cloud.
To focus on preventing the risk of data 
breaches, ask yourself:
#12: What is your company policy when
it comes to managing sensitive data and  le 
sharing? On average, more than 25 percent of 
employees will upload  les containing sensitive DOES YOUR COMPANY NEED TO
data to the cloud.
COLLABORATIVE AGE 
#11: Are your cloud-based applications 
being monitored for inbound and outbound n Co-Create Value with Customers, F O R U M A N D E X P O
tra c anomalies?  e di erence between a 2016
minor incident and massive breach o en comes Employees, Partners, Vendors?
down to the ability to quickly detect, contain 
and mitigate an attack. Analysts at the Ponemon n Innovate amidst Disruption instead 
Institute estimate it took retailers, on average, of Fearing Change?
197 days to identify an advanced threat and
APRIL 4–5, 2016 
39 days to contain it, while  nancial services Accelerate Growth by Collaborating 
organizations needed 98 days to identify and 26 n 
to contain.
with Anyone, Anytime, Everywhere?
COBB GALLERIA CENTRE 
#10: How  exible and collaborative is your 
IT department in meeting the challenges ATLANTA, USA
associated with new technologies and quickly THEN YOU CANNOT AFFORD TO MISS
ge
responding to security threats?  e majority COLLABORATIVE
a
of IT managers are seeing a shi  toward more 
collaboration and pooling of previously siloed 
resources, opening up opportunities for better FORUM AND EXPOSITION
cloud security measures.
#9: Is your cloud service provider responsible “ExEcutivE Boot camp for BusinEss collaBoration”
for security? To fully secure data in the cloud, 
enterprise IT teams should never solely rely on 
their cloud provider. Ensure you have a solid n Roll up your sleeves with the world’s leading 
security strategy in place that is agnostic to the collaboration experts, including keynoters Ron Ricci, 
location of your data and applications.
Cisco’s VP of customer experience services, and 
#8: How do you handle the riskiest of apps, 
storage? Cloud-based storage applications SMART Technologies CMO Jeff Lowe.
have access to very sensitive corporate data, 
particularly  nancial data.
n Learn how the culture, process, technologies, and 
#7: When do you identify and stop malicious workplaces of business collaboration can help you 
insiders? A 2015 Experian study claimed that 
employees, particularly those working remotely navigate change and thrive in the new economy.
or using their own mobile device, accounted for 
more than half of security incidents last year.
n Build your collaboration roadmap—and prepare to 
A current or former employee, contractor, or a reach your company’s highest goals!
business partner with access through IaaS, PaaS, 
SaaS or traditional infrastructure, can o en be 
the source of an enterprise’s greatest risk.
#6: How do you protect credentials from 
the ? In 2010, Amazon was subject to a cross- SPECIAL HALF-DAY “DEEP DIVE” WORKSHOPS FOR CIOS AND IT/TELECOM EXECS
site attack that used malicious scripts in a benign 
account to launch more attacks. Many companies “Uni ed Communications, Security and Privacy” with CyberTraps author Frederick Lane 
are prohibiting the sharing of accounts and
n 
now require strong two-factor authentication n
“The Real Deal about Real Time Communications” with Delphi Inc.’s Gary Audin
techniques.
#5: Are you ready for next-generation 
technology and the Internet of  ings (IoT)? ACT NOW! EARLY BIRD DISCOUNT ENDS JANUARY 29, 2016! 
Gartner predicts that the IoT market will grow 
to 26 billion units by 2020. With the proliferation REGISTER NOW AT COLLABORATIVEAGEEXPO.COM
of connected devices, is it any surprise that IT




   19   20   21   22   23