Welcome!

SDN Journal Authors: Yeshim Deniz, Liz McMillan, Elizabeth White, Pat Romanski, TJ Randall

Related Topics: @CloudExpo, Microservices Expo, Agile Computing, Cloud Security, @DXWorldExpo, SDN Journal

@CloudExpo: Article

Business Implications for Cloud Information Protection

Three specific benefits to implementing a cloud computing security system

For some organizations, cloud computing can be a hard sell, even before you come to the question of how to handle cloud-computing security. Public cloud, private cloud, hybrid cloud, encryption, tokenization, data residency, privacy regulations - all are factors involved and the perceived effort can sometimes seem to overshadow the benefits. But just as cloud computing comes with a slew of demonstrated business benefits, so does effective cloud computing security. Included below are three specific benefits to implementing a cloud computing security system.

1. Regulatory compliance prevents costly fines.
One of the most common reasons enterprises have for investing in cloud computing security is, of course, regulatory compliance. Heavily regulated industries like finance and health care - industries that handle the most sensitive personal information - must remain in compliance with relevant regional, national, and international laws, as well as with industry-specific standards. Failure to do so can come with a high price. In fact, banks that fail to comply with the PCI DSS requirements, for example, may face fines of anywhere from $5,000 to $100,000 per month, costs that tend to get passed downstream, resulting in higher costs for all, according to the PCI Compliance Guide's FAQ.

As companies begin to see cost efficiency returns from their cloud investment, they are also finding the need to deploy a robust security system to protect customer data while complying with privacy regulations to mitigate against costly fines and reputational damage.

2. Cloud computing security preserves consumer confidence.
Data that is improperly protected with non-encryption or with poor encrypted data welcomes intruders, hackers and bots to compromise that data causing a data breach that results in irreparable harm to a business's reputation. In most regions, laws mandate that the businesses that lost the data disclose the breach to the public. Between February 2005 to December 2006, for example, "100 million personal records were reportedly lost or exposed," according to the IT Law Wiki.

And cyber crime is on the rise. Ponemon Institute recently reported that organizations suffered an average of nine cyber attacks in 2013 and that 50 percent of survey respondents indicated that these breaches successfully stole sensitive information. With the bulk of the holiday shopping season remaining, this is the most profitable time of the year for retailers, banks and card processors. But since cyber criminals follow the money trail, now is also the time for businesses to shore up their data protection measures through encryption and other recommended security practices from PCI and the 40-some breach notification mandates in the US.

3. Secure cloud computing improves reliability and flexibility and lowers costs (lower TCO).
Today, regulative noncompliance and data breaches pose significant dangers to businesses. Some say it's better to avoid the cloud, however, if a business decides to do so, they lose the opportunities for far greater reliability and flexibility in the business's computing infrastructure. As Abby Shagin wrote in the SAP blog, cloud computing liberates employees from dependence on in-house infrastructure, "creating a more flexible and mobile work lifestyle"; the cloud also allows for far more agility in implementing change.

Shagin points out that the economies of scale in the cloud allow for greater reliability, since "the vendor is more able to give 24/7 technical support and highly trained experienced staff to support the infrastructure at its best condition." Additionally, cloud computing can reduce business costs by shifting the burden of IT staffing away from your enterprise and onto the cloud provider, as TechRadar's Kate O'Flaherty observes.

Cloud computing is essential in creating an ecosystem that scales and adapts in the data-centric environment that drives business. In this data influx, cloud, and more important, security, ensures success and safety for customers, employees and the entire business today.

More Stories By Paige Leidig

Paige Leidig is SVP at CipherCloud. He has 20 years of experience in technology, marketing, and selling enterprise application solutions and managing trusted customer relationships. As SVP of Marketing, he is responsible for all aspects of marketing at CipherCloud. Paige was previously in the Office of the CEO at SAP, where he was responsible for leading and coordinating SAP’s acquisition and integration activities on a global basis. He has managed a number of marketing initiatives at SAP, including responsibility for all go-to-market activities for SAP’s Cloud applications portfolio. Preceding his SAP career, Paige held senior management positions with Ariba, Elance, and E*Trade.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


CloudEXPO Stories
With more than 30 Kubernetes solutions in the marketplace, it's tempting to think Kubernetes and the vendor ecosystem has solved the problem of operationalizing containers at scale or of automatically managing the elasticity of the underlying infrastructure that these solutions need to be truly scalable. Far from it. There are at least six major pain points that companies experience when they try to deploy and run Kubernetes in their complex environments. In this presentation, the speaker will detail these pain points and explain how cloud can address them.
Discussions of cloud computing have evolved in recent years from a focus on specific types of cloud, to a world of hybrid cloud, and to a world dominated by the APIs that make today's multi-cloud environments and hybrid clouds possible. In this Power Panel at 17th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the importance of customers being able to use the specific technologies they need, through environments and ecosystems that expose their APIs to make true change and transformation possible.
"Space Monkey by Vivent Smart Home is a product that is a distributed cloud-based edge storage network. Vivent Smart Home, our parent company, is a smart home provider that places a lot of hard drives across homes in North America," explained JT Olds, Director of Engineering, and Brandon Crowfeather, Product Manager, at Vivint Smart Home, in this SYS-CON.tv interview at @ThingsExpo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
We are seeing a major migration of enterprises applications to the cloud. As cloud and business use of real time applications accelerate, legacy networks are no longer able to architecturally support cloud adoption and deliver the performance and security required by highly distributed enterprises. These outdated solutions have become more costly and complicated to implement, install, manage, and maintain.SD-WAN offers unlimited capabilities for accessing the benefits of the cloud and Internet. SD-WAN helps enterprises to take advantage of the exploding landscape of cloud applications and services, due to its unique capability to support all things cloud related.
In an era of historic innovation fueled by unprecedented access to data and technology, the low cost and risk of entering new markets has leveled the playing field for business. Today, any ambitious innovator can easily introduce a new application or product that can reinvent business models and transform the client experience. In their Day 2 Keynote at 19th Cloud Expo, Mercer Rowe, IBM Vice President of Strategic Alliances, and Raejeanne Skillern, Intel Vice President of Data Center Group and GM, discussed how clients in this new era of innovation can apply data, technology, plus human ingenuity to springboard to advance new business value and opportunities.