Welcome!

Microsoft Cloud Authors: Pat Romanski, Srinivasan Sundara Rajan, Glenn Rossman, Janakiram MSV, Steven Mandel

Blog Feed Post

Private vs Public Cloud Security: Top Security Issues

public vs private cloud public cloud security cloud security issues  private vs public cloud security Private vs Public Cloud Security: Top Security IssuesSo, you think your five year old private cloud security is stronger than a public Infrastructure as a Service cloud (like AWS, HP, and Microsoft Azure)? Think again.

The reality is that a public cloud provider is likely investing more in infrastructure security and P3 (People, Process, Products) than your organization.

Does that mean that you can safely move your data to a public IaaS cloud? Not necessarily.

Any public cloud vendor will tell you off the bat that public cloud security requires a “shared responsibility” model.

It is confusing: on one hand, we tell you that public cloud security is likely safer, while on the other, we tell you it’s not necessarily safe to migrate to a public cloud. So let’s get down to details and clear up the confusion.

Private Cloud Security vs Public Cloud Security Comparison

Most enterprises are strategically looking at public clouds, while nurturing (and sometimes extending) the corporate private cloud. There are many reasons for that approach, but when it comes to data security, hardening and securing each cloud type is a fundamentally different task.

Private clouds are more secure in the sense that your servers and data are guarded behind the walls of a location managed and hopefully guarded by the enterprise. But implementing and maintaining the IT security is a daunting and resource-intensive task. You’ll need to build and maintain perimeter security, application security, and operating systems security. You must educate your employees. You will require IT personnel to handle the workload.

In a public infrastructure cloud, the responsibility for physical access, virtualization level security, and standardization is shifted to the cloud provider (who actually does a great job most of the time). You, the customer, are still responsible for operating system security, application security, and complying with specific regulatory standards such as HIPAA and PCI.

The cloud key management dilemma

As a cloud encryption vendor, we’re often asked about the “value” of cloud encryption. Cloud encryption can be cheap (if your cloud provider manages the encryption keys). But cheap encryption is, most times, insecure. Also, cheap encryption raises compliance issues as you allow someone else to manage the encryption keys for you.

The alternative, traditional way of encrypting, takes you back to the “pre-cloud” days by managing encryption keys yourself using Hardware Security Modules (HSMs). An HSM is certainly a highly secure option for key management; but, in a cloud (private or public), HSMs are challenged with two major issues.

  1. HSMs limits many of the cloud benefits, specifically around auto provisioning, orchestration and geographic dispersion (after all – it is hardware)
  2. The encryption keys are insecure the moment they leave to the cloud (to encrypt a disk or any other cloud resource).
  3. Needless to say, HSMs are far more expensive.

Now, let’s leave the dilemma in the past and look to the future for a solution.

The future – cloud encryption stronger than hardware

There’s a need for a fresh, fundamentally new approach to cloud encryption.

To deal with the complexity of cloud encryption while not compromising the enterprise trust, companies like Porticor Cloud Security leverage innovative cloud encryption techniques like split-key encryption and homomorphic key management (read more about it in this white paper).

These technologies enable public cloud customers to consume encryption as a service, without compromising the security of the encryption keys. As illustrated in this short video, split-key encryption is based on the concept used by Swiss banks’ safety deposit boxes: two owners hold keys, and only the combination of both keys can open or lock a safe.

Porticor splits the encryption key in half, providing one half for the customer, and keeping the second half with the “banker” – a Porticor key management service. Using split-key encryption technologies, no “secrets” are stored in the cloud key management system, as the Porticor’s key management system holds only half of the secret (half of the encryption key), and the cloud customer holds the second half.

Better Security in the Cloud

To declare a winner in the private cloud vs public cloud security rivalry would be remiss. In fact, better security is not a question of which cloud type you pick. Your data and applications can be totally secure in a private cloud, with an HSM and IT personnel to properly build, update, and maintain your security protocol. But that security may come at a higher price.

In the pubic cloud, because the provider maintains part of the security responsibility, the financial burden of securing your apps and data is lessened. However, you still share the responsibility and must not take your part lightly. If you take the proper precautions with your data encryption keys, you can be totally secure (and, as an added bonus, compliant with regulations and restrictions) in a public cloud too.

The post Private vs Public Cloud Security: Top Security Issues appeared first on Porticor Cloud Security.

Read the original blog entry...

More Stories By Gilad Parann-Nissany

Gilad Parann-Nissany, Founder and CEO at Porticor is a pioneer of Cloud Computing. He has built SaaS Clouds for medium and small enterprises at SAP (CTO Small Business); contributing to several SAP products and reaching more than 8 million users. Recently he has created a consumer Cloud at G.ho.st - a cloud operating system that delighted hundreds of thousands of users while providing browser-based and mobile access to data, people and a variety of cloud-based applications. He is now CEO of Porticor, a leader in Virtual Privacy and Cloud Security.

@ThingsExpo Stories
SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2016 Silicon Valley. The 19th Cloud Expo and 6th @ThingsExpo will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. "The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Interne...
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
19th Cloud Expo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterpri...
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lea...
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
Businesses are struggling to manage the information flow and interactions between all of these new devices and things jumping on their network, and the apps and IT systems they control. The data businesses gather is only helpful if they can do something with it. In his session at @ThingsExpo, Chris Witeck, Principal Technology Strategist at Citrix, will discuss how different the impact of IoT will be for large businesses, expanding how IoT will allow large organizations to make their legacy ap...
Video experiences should be unique and exciting! But that doesn’t mean you need to patch all the pieces yourself. Users demand rich and engaging experiences and new ways to connect with you. But creating robust video applications at scale can be complicated, time-consuming and expensive. In his session at @ThingsExpo, Zohar Babin, Vice President of Platform, Ecosystem and Community at Kaltura, will discuss how VPaaS enables you to move fast, creating scalable video experiences that reach your...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - comp...
Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is expected in the amount of information being processed, managed, analyzed, and acted upon by enterprise IT. This amazing is not part of some distant future - it is happening today. One report shows a 650% increase in enterprise data by 2020. Other estimates are even higher....
SYS-CON Events announced today that SoftLayer, an IBM Company, has been named “Gold Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. SoftLayer, an IBM Company, provides cloud infrastructure as a service from a growing number of data centers and network points of presence around the world. SoftLayer’s customers range from Web startups to global enterprises.
One of biggest questions about Big Data is “How do we harness all that information for business use quickly and effectively?” Geographic Information Systems (GIS) or spatial technology is about more than making maps, but adding critical context and meaning to data of all types, coming from all different channels – even sensors. In his session at @ThingsExpo, William (Bill) Meehan, director of utility solutions for Esri, will take a closer look at the current state of spatial technology and ar...
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
The vision of a connected smart home is becoming reality with the application of integrated wireless technologies in devices and appliances. The use of standardized and TCP/IP networked wireless technologies in line-powered and battery operated sensors and controls has led to the adoption of radios in the 2.4GHz band, including Wi-Fi, BT/BLE and 802.15.4 applied ZigBee and Thread. This is driving the need for robust wireless coexistence for multiple radios to ensure throughput performance and th...
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
Is your aging software platform suffering from technical debt while the market changes and demands new solutions at a faster clip? It’s a bold move, but you might consider walking away from your core platform and starting fresh. ReadyTalk did exactly that. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, will discuss why and how ReadyTalk diverted from healthy revenue and over a decade of audio conferencing product development to start an innovati...
“We're a global managed hosting provider. Our core customer set is a U.S.-based customer that is looking to go global,” explained Adam Rogers, Managing Director at ANEXIA, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
If you had a chance to enter on the ground level of the largest e-commerce market in the world – would you? China is the world’s most populated country with the second largest economy and the world’s fastest growing market. It is estimated that by 2018 the Chinese market will be reaching over $30 billion in gaming revenue alone. Admittedly for a foreign company, doing business in China can be challenging. Often changing laws, administrative regulations and the often inscrutable Chinese Interne...