ENTERPRISE

Control Your Cloud (Part 2)

6/14/2013 9:01:37 AM

Be careful with cloud-based file sharing

Cloud-based file sharing services are very popular in the consumer space, which is fine, but if your employees decide to bring these services into the workplace without your knowledge, “who knows what you’ve done to your security environment?” cautions Bartoletti. That’s why you need to establish controls that will limit the types of data that can be placed on file sharing sites and prevent sensitive information from exiting the company.

Be careful with cloud-based file sharing

Be careful with cloud-based file sharing

Sloan says that some file sharing services are better than others when it comes to integration and control. One such service features an enterprise version that can be integrated into “Active Directory management for access” as well as SharePoint, he says. This not only unlocks file sharing functionality in other applications, but also gives the company much more control over the data that can be moved into the cloud or downloaded from the cloud.

However, if you integrate a file sharing service into your business and put the appropriate controls in place, you may still encounter instances where those controls aren’t working and “you’re finding that people are copying sensitive data up into the cloud instances. If this is the case, you may need to reevaluate those workloads and determine whether or not they are a good it for a cloud environment.

Know what data belongs & implement usage policies

Some data and applications are a perfect it for the cloud, while others simply don’t belong. For instance, Bartoletti says that “systems of engagement,” such as Web presence systems that allow companies to interact with customers, are great for the cloud because you can “launch them quickly, you don’t have to buy a bunch of new infrastructure to build out a new offering, and the kind of data you put on their generally isn’t that sensitive.”

Sensitive data and applications are always in danger of being moved to the cloud simply because of human error or lack of employee education

Sensitive data and applications are always in danger of being moved to the cloud simply because of human error or lack of employee education

However, “systems of record,” like transaction, accounting, and ERP systems, “are probably not the best first it for the cloud because they contain sensitive data,” says Bartoletti. Plus, these solutions are often “high-performance database applications that require a lot of processing power,” he says. Bartoletti admits that it may seem attractive to move these to the cloud to save money on internal resources, but that it’s “probably not worth the loss of control to put it up there, since your business is really based on those systems being secure.”

Sensitive data and applications are always in danger of being moved to the cloud simply because of human error or lack of employee education. To help counteract this, Bartoletti recommends that companies put cloud usage policies in place to limit access to certain types of data as well as help you segment your workforce into much more manageable groups.

“It makes sense to think about developing cloud usage policies and doing it for different business groups,” says Bartoletti. “This business group may have one set of policies and this other business group might have another because they’re not customer-facing and they don’t touch sensitive data. A great way to get control over cloud in the organization is to start thinking about what your cloud usage policies should be.”

Communicate with service providers & vendors

Speaking to your service provider about identity and access management is crucial, but you also need to discuss SLAs (service level agreements) as well as what you can expect from the cloud provider in terms of security and transparency. “How much will the service provider tell them about how things are run, what geography data will be kept in, and what certifications the service provider has to date?” Bartoletti asks. “Big service providers are always actively getting more and more certifications so that they can handle more and more sensitive data, so you may want to talk to them first to see what kinds of certifications they have in place.”

Private clouds can come with their own control and management issues

Private clouds can come with their own control and management issues

When it comes to SLAs, it’s common for cloud providers to “do their best to give you a certain number of nines of availability” (referring to the number of nines in an availability percentage), but if for any reason they don’t hit the goal detailed in your SLA, you need to know what the compensation will amount to, says Bartoletti. You will feel much more in control of the cloud if you know where you stand with your service provider. You need to know if they’ll give you your money back in the event they don’t hit a certain availability figure or if they’ll “own the problem and try to fix it,” says Bartoletti.

If you are working with a private cloud or want to build one, then service providers won’t be involved, but vendors will be. Private clouds can come with their own control and management issues, so that’s why Bartoletti says that many “virtualization vendors offer suites of management tools that can help you turn a set of virtual resources into a cloud environment.” But they can also help you “manage things like security and multi-tenancy.” You may want to invest in licensed or open source cloud tools that not only let you build clouds on top of your existing virtualized infrastructure, but also help you “isolate groups from one another and automatically allocate resources as people request them,” says Bartoletti.  It all comes down to discussing available options with your vendor and finding the solution that fits your best.

Other  
 
Most View
Best Apps For Your SmartPhones – December 2012 (Part 1)
Aftershock Halo - More Than An Ultrabook
Charging Ahead With AMD’s Kaveri (Part 2)
Thunderbolt - Chain Reaction
Helping Clients Buy What They Want And Love It
Away With The Cloud? (Part 2)
Sharepoint 2013 : Farm Management - Review Farm Configuration Values,Set the Farm Configuration Values
One More Thing: Two New Ipods
Samyang 85mm f1.4 Telephoto Lens Review (Part 3)
Chromebook Pixel - Google’s Unreal Wonder (Part 2)
REVIEW
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
VIDEO TUTORIAL
- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 1)

- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 2)

- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 3)
Popular Tags
Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 Adobe Indesign Adobe Flash Professional Dreamweaver Adobe Illustrator Adobe After Effects Adobe Photoshop Adobe Fireworks Adobe Flash Catalyst Corel Painter X CorelDRAW X5 CorelDraw 10 QuarkXPress 8 windows Phone 7 windows Phone 8 BlackBerry Android Ipad Iphone iOS
Top 10
3 Tips for Maintaining Your Cell Phone Battery (part 2) - Discharge Smart, Use Smart
3 Tips for Maintaining Your Cell Phone Battery (part 1) - Charge Smart
OPEL MERIVA : Making a grand entrance
FORD MONDEO 2.0 ECOBOOST : Modern Mondeo
BMW 650i COUPE : Sexy retooling of BMW's 6-series
BMW 120d; M135i - Finely tuned
PHP Tutorials : Storing Images in MySQL with PHP (part 2) - Creating the HTML, Inserting the Image into MySQL
PHP Tutorials : Storing Images in MySQL with PHP (part 1) - Why store binary files in MySQL using PHP?
Java Tutorials : Nested For Loop (part 2) - Program to create a Two-Dimensional Array
Java Tutorials : Nested For Loop (part 1)