Cloud Security1. Verizon Enterprise Solutions
U N L O C K I N G T H E S E C R E T TO A
SECURE CLOUD
CLOUD COMPUTING IS HERE TO STAY, AND IS ONLY GAINING MOMENTUM. WHILE ITS
BENEFITS ARE CLEAR, THERE’S ONE MAJOR CONCERN: KEEPING INFORMATION
SAFE. HOW CAN YOU EFFECTIVELY SECURE DATA IN ORDER TO TAKE FULL
ADVANTAGE OF THE CLOUD’S BENEFITS?
A SHIFT IN THINKING.
SECURE YOUR DATA BY CHANGING THE GAME.
Confidence is vital when dealing with data
security, and the secret to a secure cloud is
NEW MODEL taking a top-down approach. First, assess
OLD MODEL Business your core business priorities to determine
IT Drives
Data Security
Priorities Drive cloud security standards. Then, move on to
Data Security technology and procedures. And finally,
choose the right cloud provider—it does
matter who you choose. By thinking of your
business as a whole, you’ve created a
data-centric model you can trust.
E, BUS I N E S SES
C T IV CA
PE N
S A
R
NO BREACHES EASIER ACCESS
CH
INFRASTRUCTURE
PE
IE
IC
VE
INCREASE INCREASE
TR
G RE
REPUTATION AGILITY
DATA-CEN
ES ATER R
A
APPS USERS
I TH
MAINTAIN REDUCE
ULT
COMPLIANCE COSTS
W
. S
HIPAA, GLBA, MORE EFFICIENT
PCI DSS MAINTENANCE
TO PROTECT THE DATA,
PROTECT WHAT’S AROUND IT.
SIX STEPS TO A SECURE CLOUD STRATEGY
USING DATA-CENTRIC SECURITY MANAGEMENT
1 START WITH THE DATA.
DEFINE THE BUSINESS VALUE OF THE DATA SETS. CREATE A HIERARCHY.
How will data affect Classify data based on risk Archive or delete
reputation, compliance, and sensitivity levels according unnecessary data.
costs, and agility? to your business values.
MORE THAN 50% OF SENSITIVE DATA
SERVES NO BUSINESS PURPOSE.
2 ADDRESS THE USERS.
INVENTORY YOUR USERS (employees, contractors, partners) AND ASSIGN THEM ROLES.
DESIGNATE USER ACCESS BASED ON ROLES AND A NEED-TO-KNOW BASIS.
3 CHOOSE THE RIGHT CLOUD.
FIND THE CLOUD ENVIRONMENT THAT FITS YOUR ENTERPRISE BASED ON YOUR DATA.
Determine standards using your business-based data hierarchy.
Choose the cloud provider with the expertise and inherent security
that will help you meet those standards.
VERIZON HAS ANALYZED 2,000 DATA BREACHES
INVOLVING OVER 1 BILLION COMPROMISED RECORDS.
4 DETERMINE YOUR CONTROLS.
IDENTIFY AND IMPLEMENT CONTROLS (technical, administrative, physical)
BASED ON YOUR DATA STANDARDS AND CLOUD FEASIBILITIES.
TAKE A DATA-CENTRIC
APPROACH TO ENSURE THE
RIGHT LEVEL OF
CONTROL STRENGTH
GREATER AGILITY AND ASSET OPTIMIZATION.
5 BRING IT ALL TOGETHER.
MIGRATE DATA ENSURE USERS
TO THE CLOUD. HAVE LEAST-PRIVILEGE
ACCESS.
FOR BEST RESULTS,
ENGAGE A CLOUD PROVIDER WHO OFFERS
SECURE AND FLEXIBLE
MIGRATION SOLUTIONS.
6 VALIDATE AND MONITOR.
CONTINUOUS MONITORING WILL VERIFY
CONTROLS ARE PROTECTING ASSETS AS INTENDED.
SO, WHAT’S NEXT?
THINK BROADER. Look beyond IT and think about your business as a
whole to define data classifications. Data-centric security will free
your company to confidently take advantage of all that cloud
computing can offer you. And more.
SECURITY IS OUR BUSINESS.
SO IS THE CLOUD.
WHEN IT COMES TO SECURITY AND CLOUD, VERIZON LEADS THE WAY. IN FACT, LEADING
ANALYST FIRM GARTNER, INC., HAS POSITIONED VERIZON IN THE LEADER QUADRANT IN:
MAGIC QUADRANT MAGIC QUADRANT MAGIC QUADRANT
FOR MANAGED HOSTING, 2012 FOR PUBLIC CLOUD FOR MANAGED SECURITY
INFRASTRUCTURE AS A SERVICES PROVIDER (MSSPS),
SERVICE, 2011 NORTH AMERICA, 2011
VERIZON HAS THE EXPERTISE TO OFFER A TRULY SECURE CLOUD—FROM
MIGRATING DATA TO PREVENTING, DETECTING AND RESPONDING TO THREATS.
verizon.com/enterprise/security
verizon.com/enterprise/cloud
The Magic Quadrant is copyrighted by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a
specific time period. It depicts Gartner’s analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not
endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the “Leaders”
quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or
implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
Gartner: Magic Quadrant for Hosting, by Lydia Leong and Ted Chamberlin, March 5, 2012
Gartner: Magic Quadrant for Public Cloud Infrastructure as a Service, by Lydia Leong and Ted Chamberlin, December 8, 2011
Gartner: Magic Quadrant for MSSPs, North America, by Kelly Kavanagh and John Pescatore, November 28, 2011
© 2012 Verizon. All Rights Reserved.