SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
WHITE PAPER: KVH Cloud Solutions




 Cloud Security: Perception VS
 Reality

 A breakdown of the top misconceptions enterprises
 are facing when assessing the security levels of
 cloud computing environments, and the realities
 behind them


        Table of Contents
        2    Introduction
        2    Perception 1: The cloud cannot be secure
        2    Perception 2: Cloud computing is less secure than on-premise
             alternatives
        3    Perception 3: Private Clouds are secure, Public Clouds are not
        4    Perception 4: Compliance guarantees ssecurity
        4    Conclusion
        5    Appendix: Cloud Security Must-Haves
        6    About KVH



                                  Copyright© 2012 by KVH Co. LTD

    All Rights Reserved. Not to be copied or reproduced without express permission of KVH Co LTD

                                            Page 1 of 6
Cloud Security: Perception VS Reality



Introduction                                           to the kind of server being used and the
                                                       network connecting their systems.
Ranked as the top technology priority among
CIOs in Asia in the 2011 Gartner Executive             For industries that need to align with specific
Programs (EXP) CIO Agenda Survey, cloud                regulations, such as the financial services
computing has attracted significant attention          sector, ensure your service provider not only
as businesses are becoming keen to                     offers security services that meet these
understand how they can effectively                    standards by holding certifications in ITIL, ISO
leverage these services at minimal risk and for        27001, and SSAE16, but is also experienced
maximum benefit. With the continued growth             enough through servicing other businesses in
of online security threats and ways that these         your industry to understand the role security
can spread, security is repeatedly being               solutions play in how your business functions
reported as a key concern among businesses             and transfers data.
when determining whether they should move
to the cloud and, if so, what kind of cloud            Depending on the service and provider,
solution they should be adopting.                      cloud computing solutions should be able to
                                                       meet       the    security   requirements   of   any
This whitepaper aims to outline and verify the         business from a technology perspective, as
truth behind some of the common                        well as throughout their internal processes,
misconceptions about security and cloud                operations, and personnel.
computing that can often deter businesses
from adopting this evolving and potentially            Perception 2: Cloud computing
highly beneficial technology.
                                                       is less secure than on-premise
Perception 1: The cloud cannot                         alternatives
be secure                                              Reality: As cloud computing is strongly based
                                                       on automated systems, it actually avoids the
Reality: Cloud environments can be highly
                                                       common security breaches that occur with
secure and levels of security can be scaled to
                                                       on-premise systems due to human errors.
suit a business’ specific needs and existing IT
systems. Before implementing a cloud service,
                                                       Also, outsourcing ensures that physical access
ask the service provider what level of security
                                                       to your servers is strictly monitored 24 x 7 by
they offer through public, private, or hybrid
                                                       highly experienced professionals. Vendors
cloud solutions, and how this differs according
                                                       place high importance on these technologies,




                           Copyright© 2011 by KVH Co., Ltd.   All Rights Reserved

                                               Page 2 of 6
Cloud Security: Perception VS Reality



staff, and processes to ensure that their                Reality: This perception is fundamentally built
customers’ data is kept secure at all times. A           on the understanding that there are two kinds
security breach can be just as detrimental to            of cloud services. However, depending on
customers as it is to their service providers, not       the use of hybrid configurations, on-premise
only due to the expenses of solving the issue            hosting and colocation, dedicated servers
and implementing new technology and                      and       networks,       VPS,    and     various     other
processes where necessary to ensure the                  technologies, the security of a cloud service
problem cannot arise in the future, but also             can significantly change. Just as a network or
because of the significant blow to their                 server configuration can be tailored to meet
reputation that can take months, if not years,           certain        business      requirements,      a     cloud
to earn back.                                            environment’s           security        can    also     be
                                                         customized to meet compliance issues and
For cloud computing service providers, this is           other needs.
a core part of their business, allowing them to
make expensive, long-term investments in                 For example, the use of dedicated VLANs
their security offerings to ensure they can              would          logically         separate       customer
succeed    in this   increasingly competitive            environments and provide security control at
market by providing customers with the best              layer 2. Intrusion prevention systems, Firewalls,
services available. Furthermore, as more                 Encryption,        Authentication,          Authorization,
businesses in the financial services sector are          and Audit Trails provide the required security
adopting cloud computing solutions, service              controls to protect your assets and data.
providers are being forced to improve their              Leverage your provider’s Professional Services
standards to meet the regulatory compliance              to determine these details since, depending
and operational security needs of these                  on the equipment used and configuration, a
organizations, inevitably leading to an overall          public cloud could be just as secure as a
rise in security standards across the industry.          private cloud and, despite the perception,
                                                         private clouds can have security weaknesses
Perception 3: Private Clouds                             in     their   infrastructure      or   how    they     are
                                                         managed.
are secure, Public Clouds are
not




                             Copyright© 2011 by KVH Co., Ltd.   All Rights Reserved

                                                 Page 3 of 6
Cloud Security: Perception VS Reality




                                         Example Use Case of a Closed L2 Network




Perception              4:         Compliance                 has been supplied. As well as assessing the
                                                              actual solution being provided, ensure your
guarantees security                                           provider’s certifications are up to date and
                                                              that they regularly conduct internal and
Reality: A service provider’s certifications in
                                                              external audits to maintain a high level of
ITIL, ISO   27001,     and    SSAE16       should     be
                                                              security across their infrastructure, processes,
thoroughly assessed to ensure the provider is
                                                              and daily activities.
adhering to their own industry standards as
well   as   your     industry’s     regulations     and
                                                              Conclusion:
compliance requirements. However, it should
also be recognized that a service provider                    Despite the security concerns mentioned
should not be considered ‘secure’ merely                      above, more and more companies are
because of their certifications.                              adopting        cloud        computing   solutions   to
                                                              remain competitive and meet the evolving
These certifications determine the standards a
                                                              needs of their business and customers. The
provider has met at a certain time, and do
                                                              CIO Global Cloud Computing Adoption
not necessarily ensure that these standards
                                                              Survey of 2011 showed that two-thirds of
are being maintained after the certification
                                                              organizations        are      planning   or   currently



                                  Copyright© 2011 by KVH Co., Ltd.   All Rights Reserved

                                                      Page 4 of 6
Cloud Security: Perception VS Reality



adopting cloud computing, with 22% already                 measures deter you from leveraging this
in    department         and       enterprise-wide         highly valuable technology. Instead, assess
deployments.                                               your business needs, the IT challenges you are
                                                           trying to overcome, and your current IT
When assessing the security of your cloud                  systems to ensure the right security solution is
solution,   do    not   let   necessary      security      provided for you.




Appendix: Cloud Security Must-Haves

      Certifications      ITIL, ISO27001, and SSAE16 certifications for industry-standard
                          processes, data center design, SDLC, operations, and maintenance



      Encryption          Protects data from interception



      Firewall            Provides access control filtering



      Authentication      Ensures access to the system and data is only allowed to users who
                          have been granted permission



      Authorization       Ensures users can only perform actions that are permitted



      Auditing and        Provides management teams with a clear window into what
      Reporting           resources are being used by who and how



      Replication &       Reliable backup and redundant systems support BCP and enable
      Redundancy          fast data recovery when required



      Data Center         Manages the physical access control of who has access to the
      Access Controls     systems housing your data




                               Copyright© 2011 by KVH Co., Ltd.   All Rights Reserved

                                                   Page 5 of 6
Cloud Security: Perception VS Reality



About KVH

KVH was established in Tokyo in 1999 by Fidelity Investments as a Japan focused IT /
communications service provider. As an information delivery platform that allows enterprise
customers to store, process, protect and deliver their vital business information, KVH offers
integrated cloud and network solutions that include infrastructure-as-a-service, managed
services, data center services, professional services, data networking, internet access, and voice
services. KVH operates the lowest latency network in Japan, and with over 450 financial services
customers, is the leading provider of ultra low-latency network and proximity hosting solutions to
the high-frequency trading community in Tokyo and Osaka. KVH also offers low-latency
connectivity services between major financial markets in the Asia/Pacific region and the US
including Tokyo, Chicago, New York, Singapore, Hong Kong, Shanghai, and Sydney.


More information on KVH can be found at www.kvh.co.jp/en/




                            Copyright© 2011 by KVH Co., Ltd.   All Rights Reserved

                                                Page 6 of 6

Weitere Àhnliche Inhalte

Was ist angesagt?

AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
Amazon Web Services
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
HyTrust
 
Cloudsecurity
CloudsecurityCloudsecurity
Cloudsecurity
drewz lin
 
Case_Study__Juniper_Expedient_2015
Case_Study__Juniper_Expedient_2015Case_Study__Juniper_Expedient_2015
Case_Study__Juniper_Expedient_2015
John White
 
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesSecure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
HyTrust
 
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
white paper
 
Cloud Security for U.S. Military Agencies
Cloud Security for U.S. Military AgenciesCloud Security for U.S. Military Agencies
Cloud Security for U.S. Military Agencies
NJVC, LLC
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15final
Mahmoud Moustafa
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guide
Yury Chemerkin
 

Was ist angesagt? (20)

AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
Cloudsecurity
CloudsecurityCloudsecurity
Cloudsecurity
 
TrendMicro
TrendMicroTrendMicro
TrendMicro
 
Case_Study__Juniper_Expedient_2015
Case_Study__Juniper_Expedient_2015Case_Study__Juniper_Expedient_2015
Case_Study__Juniper_Expedient_2015
 
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesSecure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
 
Protecting Data in the Cloud
Protecting Data in the CloudProtecting Data in the Cloud
Protecting Data in the Cloud
 
A study on securing cloud environment from d do s attack to preserve data ava...
A study on securing cloud environment from d do s attack to preserve data ava...A study on securing cloud environment from d do s attack to preserve data ava...
A study on securing cloud environment from d do s attack to preserve data ava...
 
The Cloud Crossover
The Cloud CrossoverThe Cloud Crossover
The Cloud Crossover
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
 
Cloud Security for U.S. Military Agencies
Cloud Security for U.S. Military AgenciesCloud Security for U.S. Military Agencies
Cloud Security for U.S. Military Agencies
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security Strategy
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15final
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
 
Cloud Security Best Practices - Part 2
Cloud Security Best Practices - Part 2Cloud Security Best Practices - Part 2
Cloud Security Best Practices - Part 2
 
Why the Cloud can be Compliant and Secure
Why the Cloud can be Compliant and SecureWhy the Cloud can be Compliant and Secure
Why the Cloud can be Compliant and Secure
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guide
 

Andere mochten auch

Bringing Communities Together
Bringing Communities TogetherBringing Communities Together
Bringing Communities Together
SSyam
 
UCSF Life Sciences Week 2 devices
UCSF Life Sciences Week 2 devicesUCSF Life Sciences Week 2 devices
UCSF Life Sciences Week 2 devices
Stanford University
 
Emergency medical aid, promotion tools &planning
Emergency medical aid, promotion tools &planningEmergency medical aid, promotion tools &planning
Emergency medical aid, promotion tools &planning
Dr.Priyanka Phonde
 
Accident & emergency
Accident & emergencyAccident & emergency
Accident & emergency
vikastyagi
 
SAS Curriculum Density #11- Day 3
SAS Curriculum   Density #11- Day 3SAS Curriculum   Density #11- Day 3
SAS Curriculum Density #11- Day 3
jmori1
 
Science Eportfolio Powerpoint
Science Eportfolio PowerpointScience Eportfolio Powerpoint
Science Eportfolio Powerpoint
limmervin24
 
Mass, Volume and Density Labs --Day 1
Mass, Volume and Density Labs --Day 1Mass, Volume and Density Labs --Day 1
Mass, Volume and Density Labs --Day 1
jmori1
 

Andere mochten auch (20)

Bringing Communities Together
Bringing Communities TogetherBringing Communities Together
Bringing Communities Together
 
Emergency Medical Technician
Emergency Medical TechnicianEmergency Medical Technician
Emergency Medical Technician
 
Air Ambulance Patient Evacuation from Peru - AirCARE1 international
Air Ambulance Patient Evacuation from Peru - AirCARE1 internationalAir Ambulance Patient Evacuation from Peru - AirCARE1 international
Air Ambulance Patient Evacuation from Peru - AirCARE1 international
 
SOS Emergency Evacuation Tutorial
SOS Emergency Evacuation TutorialSOS Emergency Evacuation Tutorial
SOS Emergency Evacuation Tutorial
 
Medical emergency planning
Medical emergency planningMedical emergency planning
Medical emergency planning
 
Abdul Sattar Edhi – Pakistan's only true living hero
Abdul Sattar Edhi – Pakistan's only true living heroAbdul Sattar Edhi – Pakistan's only true living hero
Abdul Sattar Edhi – Pakistan's only true living hero
 
UCSF Life Sciences Week 2 devices
UCSF Life Sciences Week 2 devicesUCSF Life Sciences Week 2 devices
UCSF Life Sciences Week 2 devices
 
Emergency medical aid, promotion tools &planning
Emergency medical aid, promotion tools &planningEmergency medical aid, promotion tools &planning
Emergency medical aid, promotion tools &planning
 
Marketing for Medical Device Startups
Marketing for Medical Device StartupsMarketing for Medical Device Startups
Marketing for Medical Device Startups
 
Accident & emergency
Accident & emergencyAccident & emergency
Accident & emergency
 
Hospital emergency services
Hospital emergency servicesHospital emergency services
Hospital emergency services
 
Us2aware
Us2awareUs2aware
Us2aware
 
Trololo
TrololoTrololo
Trololo
 
Detailed case study leading insurance company - alfresco based invoice appr...
Detailed case study   leading insurance company - alfresco based invoice appr...Detailed case study   leading insurance company - alfresco based invoice appr...
Detailed case study leading insurance company - alfresco based invoice appr...
 
Kauppi: Mielikuvituksen ja fantasioiden merkitys nuorten mielenterveydessÀ ja...
Kauppi: Mielikuvituksen ja fantasioiden merkitys nuorten mielenterveydessÀ ja...Kauppi: Mielikuvituksen ja fantasioiden merkitys nuorten mielenterveydessÀ ja...
Kauppi: Mielikuvituksen ja fantasioiden merkitys nuorten mielenterveydessÀ ja...
 
SAS Curriculum Density #11- Day 3
SAS Curriculum   Density #11- Day 3SAS Curriculum   Density #11- Day 3
SAS Curriculum Density #11- Day 3
 
Group 8 OIM
Group 8 OIMGroup 8 OIM
Group 8 OIM
 
Science Eportfolio Powerpoint
Science Eportfolio PowerpointScience Eportfolio Powerpoint
Science Eportfolio Powerpoint
 
Mass, Volume and Density Labs --Day 1
Mass, Volume and Density Labs --Day 1Mass, Volume and Density Labs --Day 1
Mass, Volume and Density Labs --Day 1
 
Aarathanai aarathanai
Aarathanai aarathanaiAarathanai aarathanai
Aarathanai aarathanai
 

Ähnlich wie Cloud Security: Perception VS Reality

Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud security
Arun Gopinath
 
Ast 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_securityAst 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_security
Accenture
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
David Spinks
 
Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?
doan_slideshares
 

Ähnlich wie Cloud Security: Perception VS Reality (20)

Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud security
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud security
 
Ast 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_securityAst 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_security
 
Are you ready for the private cloud? [WHITEPAPER]
Are you ready for the  private cloud? [WHITEPAPER]Are you ready for the  private cloud? [WHITEPAPER]
Are you ready for the private cloud? [WHITEPAPER]
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
 
Security of the Cloud
Security of the CloudSecurity of the Cloud
Security of the Cloud
 
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Securitynull Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmg
 
Ccsw
CcswCcsw
Ccsw
 
Myths About Cloud Computing
Myths About Cloud ComputingMyths About Cloud Computing
Myths About Cloud Computing
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
Information Security Governance: Government Considerations for the Cloud Comp...
Information Security Governance: Government Considerations for the Cloud Comp...Information Security Governance: Government Considerations for the Cloud Comp...
Information Security Governance: Government Considerations for the Cloud Comp...
 
Information Security Governance
Information Security GovernanceInformation Security Governance
Information Security Governance
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
 
Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?
 
Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...
Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...
Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...
 
A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...
 
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTINGSECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTING
 
Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14
 

Mehr von KVH Co. Ltd.

KVH DCNet èł‡æ–™
KVH DCNet èł‡æ–™KVH DCNet èł‡æ–™
KVH DCNet èł‡æ–™
KVH Co. Ltd.
 
äŒæ„­ă«ăŠă‘ă‚‹æƒ…ć ±æŒăˆă„ăźćŠč果的ăȘé˜Čæ­ą æ–čæł•
äŒæ„­ă«ăŠă‘ă‚‹æƒ…ć ±æŒăˆă„ăźćŠč果的ăȘé˜Čæ­ą æ–čæł•äŒæ„­ă«ăŠă‘ă‚‹æƒ…ć ±æŒăˆă„ăźćŠč果的ăȘé˜Čæ­ą æ–čæł•
äŒæ„­ă«ăŠă‘ă‚‹æƒ…ć ±æŒăˆă„ăźćŠč果的ăȘé˜Čæ­ą æ–čæł•
KVH Co. Ltd.
 
スゞスにおけるćșƒćžŻćŸŸăƒăƒƒăƒˆăƒŻăƒŒă‚Żă‚”ăƒŒăƒ“ă‚čéœ€èŠăźæŽ»æł
スゞスにおけるćșƒćžŻćŸŸăƒăƒƒăƒˆăƒŻăƒŒă‚Żă‚”ăƒŒăƒ“ă‚čéœ€èŠăźæŽ»æłă‚ąă‚žă‚ąă«ăŠă‘ă‚‹ćșƒćžŻćŸŸăƒăƒƒăƒˆăƒŻăƒŒă‚Żă‚”ăƒŒăƒ“ă‚čéœ€èŠăźæŽ»æł
スゞスにおけるćșƒćžŻćŸŸăƒăƒƒăƒˆăƒŻăƒŒă‚Żă‚”ăƒŒăƒ“ă‚čéœ€èŠăźæŽ»æł
KVH Co. Ltd.
 
KVH éŠ™æžŻăƒ‡ăƒŒă‚żă‚»ăƒłă‚żăƒŒ1HKDC1
KVH éŠ™æžŻăƒ‡ăƒŒă‚żă‚»ăƒłă‚żăƒŒ1HKDC1KVH éŠ™æžŻăƒ‡ăƒŒă‚żă‚»ăƒłă‚żăƒŒ1HKDC1
KVH éŠ™æžŻăƒ‡ăƒŒă‚żă‚»ăƒłă‚żăƒŒ1HKDC1
KVH Co. Ltd.
 
ăŠćźąæ§˜äș‹äŸ‹çŽč介 æ ȘćŒäŒšç€Ÿă‚ąăƒ—ăƒȘクă‚č様
ăŠćźąæ§˜äș‹äŸ‹çŽč介 æ ȘćŒäŒšç€Ÿă‚ąăƒ—ăƒȘクă‚čæ§˜ăŠćźąæ§˜äș‹äŸ‹çŽč介 æ ȘćŒäŒšç€Ÿă‚ąăƒ—ăƒȘクă‚č様
ăŠćźąæ§˜äș‹äŸ‹çŽč介 æ ȘćŒäŒšç€Ÿă‚ąăƒ—ăƒȘクă‚č様
KVH Co. Ltd.
 

Mehr von KVH Co. Ltd. (20)

KVH DCNet èł‡æ–™
KVH DCNet èł‡æ–™KVH DCNet èł‡æ–™
KVH DCNet èł‡æ–™
 
äŒæ„­ă«ăŠă‘ă‚‹æƒ…ć ±æŒăˆă„ăźćŠč果的ăȘé˜Čæ­ą æ–čæł•
äŒæ„­ă«ăŠă‘ă‚‹æƒ…ć ±æŒăˆă„ăźćŠč果的ăȘé˜Čæ­ą æ–čæł•äŒæ„­ă«ăŠă‘ă‚‹æƒ…ć ±æŒăˆă„ăźćŠč果的ăȘé˜Čæ­ą æ–čæł•
äŒæ„­ă«ăŠă‘ă‚‹æƒ…ć ±æŒăˆă„ăźćŠč果的ăȘé˜Čæ­ą æ–čæł•
 
ăŠćźąæ§˜äș‹äŸ‹çŽč介 systemsGoæ ȘćŒäŒšç€Ÿæ§˜
ăŠćźąæ§˜äș‹äŸ‹çŽč介 systemsGoæ ȘćŒäŒšç€Ÿæ§˜ăŠćźąæ§˜äș‹äŸ‹çŽč介 systemsGoæ ȘćŒäŒšç€Ÿæ§˜
ăŠćźąæ§˜äș‹äŸ‹çŽč介 systemsGoæ ȘćŒäŒšç€Ÿæ§˜
 
KVH - systemsGo Customer Case Study
KVH - systemsGo Customer Case StudyKVH - systemsGo Customer Case Study
KVH - systemsGo Customer Case Study
 
KVH NetXpress (æ—„æœŹèȘžç‰ˆ)
KVH NetXpress (æ—„æœŹèȘžç‰ˆ)KVH NetXpress (æ—„æœŹèȘžç‰ˆ)
KVH NetXpress (æ—„æœŹèȘžç‰ˆ)
 
KVH NetXpress
KVH NetXpressKVH NetXpress
KVH NetXpress
 
KVH IP VPN
KVH IP VPNKVH IP VPN
KVH IP VPN
 
KVH IP VPN (æ—„æœŹèȘžç‰ˆ)
KVH IP VPN (æ—„æœŹèȘžç‰ˆ)KVH IP VPN (æ—„æœŹèȘžç‰ˆ)
KVH IP VPN (æ—„æœŹèȘžç‰ˆ)
 
KVH 東äșŹć€§æ‰‹ç”șăƒ‡ăƒŒă‚żă‚»ăƒłă‚żăƒŒ (TODC)
KVH 東äșŹć€§æ‰‹ç”șăƒ‡ăƒŒă‚żă‚»ăƒłă‚żăƒŒ (TODC)KVH 東äșŹć€§æ‰‹ç”șăƒ‡ăƒŒă‚żă‚»ăƒłă‚żăƒŒ (TODC)
KVH 東äșŹć€§æ‰‹ç”șăƒ‡ăƒŒă‚żă‚»ăƒłă‚żăƒŒ (TODC)
 
KVH Tokyo Otemachi Data Center (TODC)
KVH Tokyo Otemachi Data Center (TODC)KVH Tokyo Otemachi Data Center (TODC)
KVH Tokyo Otemachi Data Center (TODC)
 
ăŠćźąæ§˜äș‹äŸ‹çŽč介 ăƒ©ă‚€ăƒ‰æ ȘćŒäŒšç€Ÿæ§˜
ăŠćźąæ§˜äș‹äŸ‹çŽč介 ăƒ©ă‚€ăƒ‰æ ȘćŒäŒšç€Ÿæ§˜ăŠćźąæ§˜äș‹äŸ‹çŽč介 ăƒ©ă‚€ăƒ‰æ ȘćŒäŒšç€Ÿæ§˜
ăŠćźąæ§˜äș‹äŸ‹çŽč介 ăƒ©ă‚€ăƒ‰æ ȘćŒäŒšç€Ÿæ§˜
 
KVH Customer Case Study - Ride Co. Ltd.
KVH Customer Case Study - Ride Co. Ltd.KVH Customer Case Study - Ride Co. Ltd.
KVH Customer Case Study - Ride Co. Ltd.
 
KVH Data Center Solutions
KVH Data Center SolutionsKVH Data Center Solutions
KVH Data Center Solutions
 
TSE – OSEç”Œć–¶ç”±ćˆăžăźèŠ‹è§Ł
TSE – OSEç”Œć–¶ç”±ćˆăžăźèŠ‹è§ŁTSE – OSEç”Œć–¶ç”±ćˆăžăźèŠ‹è§Ł
TSE – OSEç”Œć–¶ç”±ćˆăžăźèŠ‹è§Ł
 
スゞスにおけるćșƒćžŻćŸŸăƒăƒƒăƒˆăƒŻăƒŒă‚Żă‚”ăƒŒăƒ“ă‚čéœ€èŠăźæŽ»æł
スゞスにおけるćșƒćžŻćŸŸăƒăƒƒăƒˆăƒŻăƒŒă‚Żă‚”ăƒŒăƒ“ă‚čéœ€èŠăźæŽ»æłă‚ąă‚žă‚ąă«ăŠă‘ă‚‹ćșƒćžŻćŸŸăƒăƒƒăƒˆăƒŻăƒŒă‚Żă‚”ăƒŒăƒ“ă‚čéœ€èŠăźæŽ»æł
スゞスにおけるćșƒćžŻćŸŸăƒăƒƒăƒˆăƒŻăƒŒă‚Żă‚”ăƒŒăƒ“ă‚čéœ€èŠăźæŽ»æł
 
KVH Singapore Data Center 1
KVH Singapore Data Center 1KVH Singapore Data Center 1
KVH Singapore Data Center 1
 
KVH ă‚·ăƒłă‚ŹăƒăƒŒăƒ«ăƒ‡ăƒŒă‚żă‚»ăƒłă‚żăƒŒ1SGDC1
KVH ă‚·ăƒłă‚ŹăƒăƒŒăƒ«ăƒ‡ăƒŒă‚żă‚»ăƒłă‚żăƒŒ1SGDC1KVH ă‚·ăƒłă‚ŹăƒăƒŒăƒ«ăƒ‡ăƒŒă‚żă‚»ăƒłă‚żăƒŒ1SGDC1
KVH ă‚·ăƒłă‚ŹăƒăƒŒăƒ«ăƒ‡ăƒŒă‚żă‚»ăƒłă‚żăƒŒ1SGDC1
 
KVH éŠ™æžŻăƒ‡ăƒŒă‚żă‚»ăƒłă‚żăƒŒ1HKDC1
KVH éŠ™æžŻăƒ‡ăƒŒă‚żă‚»ăƒłă‚żăƒŒ1HKDC1KVH éŠ™æžŻăƒ‡ăƒŒă‚żă‚»ăƒłă‚żăƒŒ1HKDC1
KVH éŠ™æžŻăƒ‡ăƒŒă‚żă‚»ăƒłă‚żăƒŒ1HKDC1
 
KVH Hong Kong Data Center 1
KVH Hong Kong Data Center 1KVH Hong Kong Data Center 1
KVH Hong Kong Data Center 1
 
ăŠćźąæ§˜äș‹äŸ‹çŽč介 æ ȘćŒäŒšç€Ÿă‚ąăƒ—ăƒȘクă‚č様
ăŠćźąæ§˜äș‹äŸ‹çŽč介 æ ȘćŒäŒšç€Ÿă‚ąăƒ—ăƒȘクă‚čæ§˜ăŠćźąæ§˜äș‹äŸ‹çŽč介 æ ȘćŒäŒšç€Ÿă‚ąăƒ—ăƒȘクă‚č様
ăŠćźąæ§˜äș‹äŸ‹çŽč介 æ ȘćŒäŒšç€Ÿă‚ąăƒ—ăƒȘクă‚č様
 

KĂŒrzlich hochgeladen

Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
Christopher Logan Kennedy
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

KĂŒrzlich hochgeladen (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 

Cloud Security: Perception VS Reality

  • 1. WHITE PAPER: KVH Cloud Solutions Cloud Security: Perception VS Reality A breakdown of the top misconceptions enterprises are facing when assessing the security levels of cloud computing environments, and the realities behind them Table of Contents 2 Introduction 2 Perception 1: The cloud cannot be secure 2 Perception 2: Cloud computing is less secure than on-premise alternatives 3 Perception 3: Private Clouds are secure, Public Clouds are not 4 Perception 4: Compliance guarantees ssecurity 4 Conclusion 5 Appendix: Cloud Security Must-Haves 6 About KVH Copyright© 2012 by KVH Co. LTD All Rights Reserved. Not to be copied or reproduced without express permission of KVH Co LTD Page 1 of 6
  • 2. Cloud Security: Perception VS Reality Introduction to the kind of server being used and the network connecting their systems. Ranked as the top technology priority among CIOs in Asia in the 2011 Gartner Executive For industries that need to align with specific Programs (EXP) CIO Agenda Survey, cloud regulations, such as the financial services computing has attracted significant attention sector, ensure your service provider not only as businesses are becoming keen to offers security services that meet these understand how they can effectively standards by holding certifications in ITIL, ISO leverage these services at minimal risk and for 27001, and SSAE16, but is also experienced maximum benefit. With the continued growth enough through servicing other businesses in of online security threats and ways that these your industry to understand the role security can spread, security is repeatedly being solutions play in how your business functions reported as a key concern among businesses and transfers data. when determining whether they should move to the cloud and, if so, what kind of cloud Depending on the service and provider, solution they should be adopting. cloud computing solutions should be able to meet the security requirements of any This whitepaper aims to outline and verify the business from a technology perspective, as truth behind some of the common well as throughout their internal processes, misconceptions about security and cloud operations, and personnel. computing that can often deter businesses from adopting this evolving and potentially Perception 2: Cloud computing highly beneficial technology. is less secure than on-premise Perception 1: The cloud cannot alternatives be secure Reality: As cloud computing is strongly based on automated systems, it actually avoids the Reality: Cloud environments can be highly common security breaches that occur with secure and levels of security can be scaled to on-premise systems due to human errors. suit a business’ specific needs and existing IT systems. Before implementing a cloud service, Also, outsourcing ensures that physical access ask the service provider what level of security to your servers is strictly monitored 24 x 7 by they offer through public, private, or hybrid highly experienced professionals. Vendors cloud solutions, and how this differs according place high importance on these technologies, Copyright© 2011 by KVH Co., Ltd. All Rights Reserved Page 2 of 6
  • 3. Cloud Security: Perception VS Reality staff, and processes to ensure that their Reality: This perception is fundamentally built customers’ data is kept secure at all times. A on the understanding that there are two kinds security breach can be just as detrimental to of cloud services. However, depending on customers as it is to their service providers, not the use of hybrid configurations, on-premise only due to the expenses of solving the issue hosting and colocation, dedicated servers and implementing new technology and and networks, VPS, and various other processes where necessary to ensure the technologies, the security of a cloud service problem cannot arise in the future, but also can significantly change. Just as a network or because of the significant blow to their server configuration can be tailored to meet reputation that can take months, if not years, certain business requirements, a cloud to earn back. environment’s security can also be customized to meet compliance issues and For cloud computing service providers, this is other needs. a core part of their business, allowing them to make expensive, long-term investments in For example, the use of dedicated VLANs their security offerings to ensure they can would logically separate customer succeed in this increasingly competitive environments and provide security control at market by providing customers with the best layer 2. Intrusion prevention systems, Firewalls, services available. Furthermore, as more Encryption, Authentication, Authorization, businesses in the financial services sector are and Audit Trails provide the required security adopting cloud computing solutions, service controls to protect your assets and data. providers are being forced to improve their Leverage your provider’s Professional Services standards to meet the regulatory compliance to determine these details since, depending and operational security needs of these on the equipment used and configuration, a organizations, inevitably leading to an overall public cloud could be just as secure as a rise in security standards across the industry. private cloud and, despite the perception, private clouds can have security weaknesses Perception 3: Private Clouds in their infrastructure or how they are managed. are secure, Public Clouds are not Copyright© 2011 by KVH Co., Ltd. All Rights Reserved Page 3 of 6
  • 4. Cloud Security: Perception VS Reality Example Use Case of a Closed L2 Network Perception 4: Compliance has been supplied. As well as assessing the actual solution being provided, ensure your guarantees security provider’s certifications are up to date and that they regularly conduct internal and Reality: A service provider’s certifications in external audits to maintain a high level of ITIL, ISO 27001, and SSAE16 should be security across their infrastructure, processes, thoroughly assessed to ensure the provider is and daily activities. adhering to their own industry standards as well as your industry’s regulations and Conclusion: compliance requirements. However, it should also be recognized that a service provider Despite the security concerns mentioned should not be considered ‘secure’ merely above, more and more companies are because of their certifications. adopting cloud computing solutions to remain competitive and meet the evolving These certifications determine the standards a needs of their business and customers. The provider has met at a certain time, and do CIO Global Cloud Computing Adoption not necessarily ensure that these standards Survey of 2011 showed that two-thirds of are being maintained after the certification organizations are planning or currently Copyright© 2011 by KVH Co., Ltd. All Rights Reserved Page 4 of 6
  • 5. Cloud Security: Perception VS Reality adopting cloud computing, with 22% already measures deter you from leveraging this in department and enterprise-wide highly valuable technology. Instead, assess deployments. your business needs, the IT challenges you are trying to overcome, and your current IT When assessing the security of your cloud systems to ensure the right security solution is solution, do not let necessary security provided for you. Appendix: Cloud Security Must-Haves Certifications ITIL, ISO27001, and SSAE16 certifications for industry-standard processes, data center design, SDLC, operations, and maintenance Encryption Protects data from interception Firewall Provides access control filtering Authentication Ensures access to the system and data is only allowed to users who have been granted permission Authorization Ensures users can only perform actions that are permitted Auditing and Provides management teams with a clear window into what Reporting resources are being used by who and how Replication & Reliable backup and redundant systems support BCP and enable Redundancy fast data recovery when required Data Center Manages the physical access control of who has access to the Access Controls systems housing your data Copyright© 2011 by KVH Co., Ltd. All Rights Reserved Page 5 of 6
  • 6. Cloud Security: Perception VS Reality About KVH KVH was established in Tokyo in 1999 by Fidelity Investments as a Japan focused IT / communications service provider. As an information delivery platform that allows enterprise customers to store, process, protect and deliver their vital business information, KVH offers integrated cloud and network solutions that include infrastructure-as-a-service, managed services, data center services, professional services, data networking, internet access, and voice services. KVH operates the lowest latency network in Japan, and with over 450 financial services customers, is the leading provider of ultra low-latency network and proximity hosting solutions to the high-frequency trading community in Tokyo and Osaka. KVH also offers low-latency connectivity services between major financial markets in the Asia/Pacific region and the US including Tokyo, Chicago, New York, Singapore, Hong Kong, Shanghai, and Sydney. More information on KVH can be found at www.kvh.co.jp/en/ Copyright© 2011 by KVH Co., Ltd. All Rights Reserved Page 6 of 6