Welcome!

Microsoft Cloud Authors: Pat Romanski, Elizabeth White, Liz McMillan, Mihai Corbuleac, David Bermingham

Blog Feed Post

Private vs Public Cloud Security: Top Security Issues

public vs private cloud public cloud security cloud security issues  private vs public cloud security Private vs Public Cloud Security: Top Security IssuesSo, you think your five year old private cloud security is stronger than a public Infrastructure as a Service cloud (like AWS, HP, and Microsoft Azure)? Think again.

The reality is that a public cloud provider is likely investing more in infrastructure security and P3 (People, Process, Products) than your organization.

Does that mean that you can safely move your data to a public IaaS cloud? Not necessarily.

Any public cloud vendor will tell you off the bat that public cloud security requires a “shared responsibility” model.

It is confusing: on one hand, we tell you that public cloud security is likely safer, while on the other, we tell you it’s not necessarily safe to migrate to a public cloud. So let’s get down to details and clear up the confusion.

Private Cloud Security vs Public Cloud Security Comparison

Most enterprises are strategically looking at public clouds, while nurturing (and sometimes extending) the corporate private cloud. There are many reasons for that approach, but when it comes to data security, hardening and securing each cloud type is a fundamentally different task.

Private clouds are more secure in the sense that your servers and data are guarded behind the walls of a location managed and hopefully guarded by the enterprise. But implementing and maintaining the IT security is a daunting and resource-intensive task. You’ll need to build and maintain perimeter security, application security, and operating systems security. You must educate your employees. You will require IT personnel to handle the workload.

In a public infrastructure cloud, the responsibility for physical access, virtualization level security, and standardization is shifted to the cloud provider (who actually does a great job most of the time). You, the customer, are still responsible for operating system security, application security, and complying with specific regulatory standards such as HIPAA and PCI.

The cloud key management dilemma

As a cloud encryption vendor, we’re often asked about the “value” of cloud encryption. Cloud encryption can be cheap (if your cloud provider manages the encryption keys). But cheap encryption is, most times, insecure. Also, cheap encryption raises compliance issues as you allow someone else to manage the encryption keys for you.

The alternative, traditional way of encrypting, takes you back to the “pre-cloud” days by managing encryption keys yourself using Hardware Security Modules (HSMs). An HSM is certainly a highly secure option for key management; but, in a cloud (private or public), HSMs are challenged with two major issues.

  1. HSMs limits many of the cloud benefits, specifically around auto provisioning, orchestration and geographic dispersion (after all – it is hardware)
  2. The encryption keys are insecure the moment they leave to the cloud (to encrypt a disk or any other cloud resource).
  3. Needless to say, HSMs are far more expensive.

Now, let’s leave the dilemma in the past and look to the future for a solution.

The future – cloud encryption stronger than hardware

There’s a need for a fresh, fundamentally new approach to cloud encryption.

To deal with the complexity of cloud encryption while not compromising the enterprise trust, companies like Porticor Cloud Security leverage innovative cloud encryption techniques like split-key encryption and homomorphic key management (read more about it in this white paper).

These technologies enable public cloud customers to consume encryption as a service, without compromising the security of the encryption keys. As illustrated in this short video, split-key encryption is based on the concept used by Swiss banks’ safety deposit boxes: two owners hold keys, and only the combination of both keys can open or lock a safe.

Porticor splits the encryption key in half, providing one half for the customer, and keeping the second half with the “banker” – a Porticor key management service. Using split-key encryption technologies, no “secrets” are stored in the cloud key management system, as the Porticor’s key management system holds only half of the secret (half of the encryption key), and the cloud customer holds the second half.

Better Security in the Cloud

To declare a winner in the private cloud vs public cloud security rivalry would be remiss. In fact, better security is not a question of which cloud type you pick. Your data and applications can be totally secure in a private cloud, with an HSM and IT personnel to properly build, update, and maintain your security protocol. But that security may come at a higher price.

In the pubic cloud, because the provider maintains part of the security responsibility, the financial burden of securing your apps and data is lessened. However, you still share the responsibility and must not take your part lightly. If you take the proper precautions with your data encryption keys, you can be totally secure (and, as an added bonus, compliant with regulations and restrictions) in a public cloud too.

The post Private vs Public Cloud Security: Top Security Issues appeared first on Porticor Cloud Security.

Read the original blog entry...

More Stories By Gilad Parann-Nissany

Gilad Parann-Nissany, Founder and CEO at Porticor is a pioneer of Cloud Computing. He has built SaaS Clouds for medium and small enterprises at SAP (CTO Small Business); contributing to several SAP products and reaching more than 8 million users. Recently he has created a consumer Cloud at G.ho.st - a cloud operating system that delighted hundreds of thousands of users while providing browser-based and mobile access to data, people and a variety of cloud-based applications. He is now CEO of Porticor, a leader in Virtual Privacy and Cloud Security.

@ThingsExpo Stories
SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2016 Silicon Valley. The 19th Cloud Expo and 6th @ThingsExpo will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. "The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Interne...
Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair of Internet of @ThingsExpo 2016 Silicon Valley. The 6thInternet of @ThingsExpo will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
The IoT is changing the way enterprises conduct business. In his session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, discussed how businesses can gain an edge over competitors by empowering consumers to take control through IoT. He cited examples such as a Washington, D.C.-based sports club that leveraged IoT and the cloud to develop a comprehensive booking system. He also highlighted how IoT can revitalize and restore outdated business models, making them profitable ...
Presidio has received the 2015 EMC Partner Services Quality Award from EMC Corporation for achieving outstanding service excellence and customer satisfaction as measured by the EMC Partner Services Quality (PSQ) program. Presidio was also honored as the 2015 EMC Americas Marketing Excellence Partner of the Year and 2015 Mid-Market East Partner of the Year. The EMC PSQ program is a project-specific survey program designed for partners with Service Partner designations to solicit customer feedbac...
Apixio Inc. has raised $19.3 million in Series D venture capital funding led by SSM Partners with participation from First Analysis, Bain Capital Ventures and Apixio’s largest angel investor. Apixio will dedicate the proceeds toward advancing and scaling products powered by its cognitive computing platform, further enabling insights for optimal patient care. The Series D funding comes as Apixio experiences strong momentum and increasing demand for its HCC Profiler solution, which mines unstruc...
IoT offers a value of almost $4 trillion to the manufacturing industry through platforms that can improve margins, optimize operations & drive high performance work teams. By using IoT technologies as a foundation, manufacturing customers are integrating worker safety with manufacturing systems, driving deep collaboration and utilizing analytics to exponentially increased per-unit margins. However, as Benoit Lheureux, the VP for Research at Gartner points out, “IoT project implementers often ...
"delaPlex is a software development company. We do team-based outsourcing development," explained Mark Rivers, COO and Co-founder of delaPlex Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
CenturyLink has announced that application server solutions from GENBAND are now available as part of CenturyLink’s Networx contracts. The General Services Administration (GSA)’s Networx program includes the largest telecommunications contract vehicles ever awarded by the federal government. CenturyLink recently secured an extension through spring 2020 of its offerings available to federal government agencies via GSA’s Networx Universal and Enterprise contracts. GENBAND’s EXPERiUS™ Application...
Connected devices and the industrial internet are growing exponentially every year with Cisco expecting 50 billion devices to be in operation by 2020. In this period of growth, location-based insights are becoming invaluable to many businesses as they adopt new connected technologies. Knowing when and where these devices connect from is critical for a number of scenarios in supply chain management, disaster management, emergency response, M2M, location marketing and more. In his session at @Th...
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to imp...
The idea of comparing data in motion (at the sensor level) to data at rest (in a Big Data server warehouse) with predictive analytics in the cloud is very appealing to the industrial IoT sector. The problem Big Data vendors have, however, is access to that data in motion at the sensor location. In his session at @ThingsExpo, Scott Allen, CMO of FreeWave, discussed how as IoT is increasingly adopted by industrial markets, there is going to be an increased demand for sensor data from the outermos...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
IoT is rapidly changing the way enterprises are using data to improve business decision-making. In order to derive business value, organizations must unlock insights from the data gathered and then act on these. In their session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, and Peter Shashkin, Head of Development Department at EastBanc Technologies, discussed how one organization leveraged IoT, cloud technology and data analysis to improve customer experiences and effi...
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
Basho Technologies has announced the latest release of Basho Riak TS, version 1.3. Riak TS is an enterprise-grade NoSQL database optimized for Internet of Things (IoT). The open source version enables developers to download the software for free and use it in production as well as make contributions to the code and develop applications around Riak TS. Enhancements to Riak TS make it quick, easy and cost-effective to spin up an instance to test new ideas and build IoT applications. In addition to...
When people aren’t talking about VMs and containers, they’re talking about serverless architecture. Serverless is about no maintenance. It means you are not worried about low-level infrastructural and operational details. An event-driven serverless platform is a great use case for IoT. In his session at @ThingsExpo, Animesh Singh, an STSM and Lead for IBM Cloud Platform and Infrastructure, will detail how to build a distributed serverless, polyglot, microservices framework using open source tec...