Skyhigh Networks, a Cupertino, California-based startup offering cloud visibility and control solutions, on Monday emerged from stealth mode and officially launched its new solution designed to help enterprises know which cloud services their employees use.
Despite the fact that a majority of IT respondents say that their cloud deployments were successful, and have saved their respective organization money, many still do not trust the cloud with sensitive or personal information.
HighCloud Version 2.0 enables enterprises and cloud service providers to protect data in private, hybrid and public cloud environments by securing selected virtual disks and other files within the VM using NIST-approved AES 128 and 256-bit encryption.
According to a report form Forrester, despite their security concerns – and perhaps because most IT managers simply have no other option – as many as one-third of enterprises are placing sensitive data into the cloud.
What happens when a lack of control over the technologies on which trust is built means you can no longer trust them? Take a look, for example, at our reliance on cryptographic keys and digital certificates—technologies that were once thought of as intrinsically trustworthy.
Cloud bursting's ability to temporarily move or expand a workload that normally runs on a private cloud out to a public cloud is an easy thing to do, but when we start looking at the variety of hypervisors and management tools being used, things get murky.
When it comes to setting the standards for crucial internet functionality such as authentication, the Internet community must remain vigilant and carefully examine and scrutinize change proposals, to ensure they support the greater good of all of the Internet users.
There are various characteristics of the AWS model that we can extend to security -- the ability to leverage economies of scale for security analysis, or to work more closely with application developers to embrace their speed of innovation.
Modern data centers are in the midst of an ongoing period of very dynamic evolution that has fundamentally changed the speed and efficiency of enterprise computing. For this reason alone, it is critically important that we design modern security controls into our virtualized data centers.