Balancing the Sharing of Information

CyberSecurity Journal

Subscribe to CyberSecurity Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get CyberSecurity Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Security Authors: Ambuj Kumar, Shelly Palmer, Slavik Markovich, Elizabeth White, Greg Ness

Related Topics: Cloud Computing, Enterprise Architecture, Government Cloud Computing, Secure Cloud Computing, CyberSecurity Journal

Article

What PRISM & NSA Surveillance Mean for Enterprise Data on the Cloud

How to maintain security and privacy from all types of cyber surveillance – governmental and otherwise

With recent revelations about NSA surveillance programs including PRISM and now XKeyscore, many organizations are concerned about the privacy of customer data and other sensitive business information being put on the cloud. Some are predicting that the public uncovering of these programs will lead to a decrease in use of U.S. cloud providers. It's been reported though, that other countries are obtaining information from the NSA's surveillance, including the UK, and there are regularly stories about China and Russia maintaining similar surveillance programs, making the avoidance of just U.S. vendors not a viable strategy for protecting data.

Anyone engaging in today's cyber environment realizes that there are also non-governmental organizations and individuals attempting to gain access to business and individual information online, perhaps with a far more malicious intent in mind. The real issue for the enterprise, then, is how to maintain security and privacy from all types of cyber surveillance - governmental and otherwise.

Securely Utilizing the Cloud
PerspecSys' view, as stated in our press release from this week, is that recent revelations about the NSA's programs do not necessitate organizations pulling back from cloud adoption or specifically moving away from the use of cloud providers. The best approach for an enterprise is to keep important business and customer information on premise and secured within its own physical boundaries, only sending data to the cloud by means of a Cloud Data Protection Gateway.

Cloud Data Protection Gateways allow the enterprise to control data, keep it resident and encrypt or tokenize all data before it travels to the cloud. The advancements that PerspecSys has been making in this security category we created in 2009 are incredibly timely and appropriate for today's cyber environment - which is characterized by a growing number of data privacy and data residency obligations. Our data protection solution gives an organization the opportunity to take full advantage of the cloud without compensating security or safety of any sensitive information. You can learn more about the use tokenization and encryption techniques to secure sensitive data in the cloud by visiting our Knowledge Center.

Read the original blog entry...


PerspecSys Inc. is a leading provider of cloud protection and cloud encryption solutions that enable mission-critical cloud applications to be adopted throughout the enterprise. Cloud security companies like PerspecSys remove the technical, legal and financial risks of placing sensitive company data in the cloud. PerspecSys accomplishes this for many large, heavily regulated companies across the world by never allowing sensitive data to leave a customer's network, while maintaining the functionality of cloud applications. For more information please visit http://www.perspecsys.com/ or follow on Twitter @perspecsys.

More Stories By Gerry Grealish

Gerry Grealish is Vice President, Marketing & Products, at PerspecSys. He is responsible for defining and executing PerspecSys’ marketing vision and driving revenue growth through strategic market expansion and new product development. Previously, he ran Product Marketing for the TNS Payments Division, helping create the marketing and product strategy for its cloud-based payment gateway and tokenization/encryption security solutions. He has held senior marketing and leadership roles for venture-backed startups as well as F500 companies, and his industry experience includes enterprise analytical software, payment processing and security services, and marketing and credit risk decisioning platforms.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.