Story image

Securing data in the cloud

01 Oct 11

Software-as-a-service (SaaS), managed services and cloud computing offer enormous benefits to organisations. But cloud and other virtualised or shared computing infrastructures also introduce an array of security concerns that must be addressed if businesses, governments and consumers are going to trust and use them.
Recent high-profile data security and privacy breaches underscore how individuals and organisations should never assume their data is safe when they expose it to a public service.
In this environment, there is growing attention to the importance of securing user access and validating identities. With it, demand is rising for strong authentication solutions to replace simple passwords. Right now, it is being driven by managed services and SaaS applications and it will accelerate further with the adoption of cloud computing.
As a result, the market for authentication solutions has expanded from large enterprise and government organisations – which traditionally need to manage large numbers of complex passwords – to include small to medium sized businesses (SMBs).
For all these organisations, authentication solutions can improve business control, visibility and productivity through centralised and simplified administration, deployment and manageability. Multiple passwords can all be replaced by a single token, for example, to provide a simpler and more secure method of authentication for users.
When first introduced in the early 1960s passwords were regarded as
cheap, easy to use,and secure. Fifty years and many technological developments later, this is no longer the case. Passwords are difficult to use – studies reveal that users today have on average approximately 15 password-protected accounts. One password may be easy to remember, but handling many passwords is a time consuming task and a security hazard.
Passwords are also expensive – every forgotten or lost password results in significant costs.
And passwords are not secure. To handle their multiple credentials, many users choose easy-to-guess passwords, use the same passwords for several accounts, or even write downpasswords where they can be easily found. Add to these security risks the abundance of available password cracking tools and it is easy to see that passwords are no longer sufficient.
To overcome the inherent weakness of passwords, organisations are turning to stronger multi-factor authentication solutions, including one-time passwords (OTP) and certificate-based authentication (CBA). These solutions can be deployed using a choice of hardware and/or software tokens, or conveniently on existing mobile devices.
Strong channel interest
Authentication to applications and the management of passwords will become even more onerous and potentially less secure as these points of authentication increase and move beyond the organisation’s own traditional perimeters. To meet this demand, we are currently seeing strong interest from channel organisations such as managed service providers, SaaS resellers and information security resellers.
When applications move to the cloud, employee access to core applications and the company’s most sensitive information by default becomes remote access. Organisations need to ensure that these critical assets are available only to authorised employees – even when they are no longer stored in the company’s data centre. Addressing this are out-of-the-box authentication solutions which take minutes to implement and are thus very suitable for SMB deployment. The latest solutions will also work with popular SaaS applications such as Google Mail and Salesforce out of the box. These can be supported by resellers with minimal investment in training or with back-up from a value-added distributor.
Whether you have previous experience selling them or not, now could be a good time to start examining whether your clients’ authentication solutions are up to scratch before they go looking themselves.

How Schneider Electric aims to simplify IT management
With IT Expert, Schneider Electric aims to ensure secure, vendor agnostic, wherever-you-go monitoring and visibility of all IoT-enabled physical infrastructure assets.
Pitfalls to avoid when configuring cloud firewalls
Flexibility and granularity of security controls is good but can still represent a risk for new cloud adopters that don’t recognise some of the configuration pitfalls.
Cisco dominates record-high Ethernet switch & router markets
While the market is flourishing, it’s tough-going as Cisco has increased its majority share of the pie.
Why total visibility is the key to zero trust
Over time, the basic zero trust model has evolved and matured into what Forrester calls the Zero Trust eXtended (ZTX) Ecosystem.
Gartner names Proofpoint Leader in enterprise information archiving
The report provides a detailed overview of the enterprise information archiving market and evaluates vendors based on completeness of vision and ability to execute.
QNAP introduces new 10GbE and Thunderbolt 3 NAS series
The new series is supposedly an all-in-one NAS solution for file storage, backup, sharing, synchronisation and centralised management. 
Tensions on the rise after Huawei CFO arrest
“Recently our corporate CFO, Meng Wanzhou, was provisionally detained by the Canadian authorities on behalf of the United States of America."
CyrusOne investing in new Amsterdam data centre
CyrusOne is continuing its rapid and relentless investment into Europe, with news emerging of a new facility in the Netherlands.