Addressing Cloud Security Through Encrypted Gateways

Addressing Cloud Security Through Encrypted Gateways

Addressing Cloud Security through Encrypted Gateways

There is absolutely no doubt left in Cloud’s increasing penetration into the enterprise. CIO’s often see the move to the cloud as control being taken away from their hands. A silent tussle between COO and CIO pursues and this naturally leads to resistance over what to choose and what to migrate vis-à-vis Cloud. Perhaps the primary concern is security. COO sees Cloud as a means to boost productivity and reduce infrastructure and maintenance costs while CIO sees it as inflated threat to enterprise information. Encryption gateway is one way to address information security concerns when moving to the Cloud. I will briefly discuss how and why.

First, gateways are nothing new. There are numerous vendors, big and small, out there selling gateway appliances. However, what’s new and innovative in encryption gateway is the robustness and seamless flow of data in and out of the enterprise.

google-imageData encryption is a compute intensive procedure which may lead to increased query time and reduced application performance. This is one of the primary factors why encryption is not as much prevalent as it should have been. However, recent advances in hardware based encryption for example, Intel’s new instructions which speed up AES (Advanced Encryption Standard) encryption on the hardware and gKrypt SDK which offers hardware accelerated encryption on commodity processors including latest manycore GPUs, have removed the “performance-tax” barrier in data encryption. With gKrypt for example, you can achieve throughput of up to 80Gbps for AES-256 encryption on a single GPU. Such advances have enabled encryption appliances to offer seamless data security without impacting application (or Cloud application in our case) performance.

One key factor to look out for while deciding on implementing data security in the Cloud is where to put your keys, because, as the saying goes, ‘your data is only as safe as the strength of your key’. What it implies is that it does not really matter how strong your encryption scheme is unless you take good care of the key lifecycle. This ‘key lifecycle’ includes key generation, usage (for encryption/decryption) and disposal. The key should never leave your premises, the reason being that once it leaves your premises, you cannot guarantee the safety of your data no matter how awesome your SLA with your cloud provider is. Do not confuse key-management with data-encryption or encryption-gateways, something which first timers often tend to commit. There are vendors who just sell key management appliances which can be plugged with any encryption gateway appliance. Some appliance makers also sell both as a turn-key solution, however, when making a decision, always gauge the strength of your key manager separately from the encryption appliance.

This small concept image describes the data security layout from a bird’s eye-view. The encryption appliance sits in between the corporate network and the Cloud. The Cloud could be private or public. Your organization may be utilizing SaaS apps on the cloud without worrying about the security of the data which leaves your premises. Anything which goes out to the Cloud is encrypted behind-the-scenes and anything which comes in is first decrypted before being consumed by your enterprise workers.

By Salman UI Haq

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Through the Looking Glass: 2017 Tech and Security Industry Predictions

Through the Looking Glass: 2017 Tech and Security Industry Predictions

2017 Tech and Security Industry Predictions As we close out 2016, which didn’t start off very well for tech IPOs, momentum and performance has increased in the second half, and I believe that will continue well into 2017. M&A activity will also increase as many of the incumbents will realize that they need to inject…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…