Video Transcription

00:07
many organizations have been forced to make difficult compromising decisions when they move their application services into public and private cloud environments.
00:17
Cloud security trade offs often include choosing between simplicity or function if this into your visibility and agility or security.
00:25
For example, if an application hosted in the cloud isn't available or responsive. Network security controls, which all too often introduce delays and averages might be streamlined out of the cloud design
00:37
the challenges that need to be addressed not just all about performance, but also relative to data security and availability.
00:43
Here's some critical issues to consider. When identifying cloud and sad security, click each topic to learn more
00:55
data. Location.
00:57
Cloud and SAS Data Management Services present significant security challenges with sad as applications. Application data is designed to be highly available and is typically cash in multiple locations, including locations and not under the organization's direct control, such as a personal mobile device. Both day visibility and data protection can be compromised.
01:23
Data sharing
01:23
the integration of sharing services such as social media and unified communications applications. Such a SharePoint is a further challenge to data visibility and protection.
01:34
Data sharing models are constantly replicating application and personal data back and forth from local devices to cloud stores and data permissions are often changed
01:44
when data is shared. The sharing practices air making, maintenance of data security and integrity across all the different shared storage and service locations more difficult
02:00
third parties. SAS providers also often integrate their services with other providers.
02:06
Application providers air constantly developing, merging and integrating new services or features that offer additional and user convenience. When Sadd's providers utilize an open authentication or trust model,
02:16
third party applications and services can be automatically trusted, which may be convenient for the end user who can easily access additional South services.
02:25
However, extension of the trusted third party also increases the risk that data might be vulnerable or exposed on different networks and unexpected ways.
02:38
Dynamic fabric
02:40
by nature, the cloud architecture is fluid and dynamic.
02:45
Cloud service providers air constantly, expanding their data and applications structures to meet customer demand by being dynamic and scalable.
02:52
This flexibility is one of the reasons that cloud is such a viable solution.
02:55
But from a security perspective, the practice is definitely challenging, if not troublesome, all the data and service movement across different networks and storage architectures means that the accurate definition of where your clients and APS are actually connecting is not possible.
03:12
Data security could be reduced to a simple concept of trusting the service provider.

Up Next