25.01.2018 Views

CIO & LEADER-Issue-10-January 2018 (1)

The cover story on CIO&Leader's January issue is a dive into the skills that CIOs are going to develop and hire in 2018

The cover story on CIO&Leader's January issue is a dive into the skills that CIOs are going to develop and hire in 2018

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Column<br />

businesses include:<br />

Network configuration and security<br />

(such as firewalls)<br />

Data Security (including encryption)<br />

The use of third-party security tools<br />

such as encryption key management<br />

software<br />

Determining the type of content and<br />

data to store in the cloud<br />

Access control and management<br />

Making life simple with encryption<br />

There is abundant evidence to show<br />

the difference that encryption makes<br />

in containing the volume of loss and<br />

associated costs when a breach occurs.<br />

In fact, according to a study, extensive<br />

use of encryption is the second most<br />

impactful factor that can limit the costs<br />

of a data breach. Despite all pointers<br />

that emphasize its advantages, usage<br />

of encryption is limited in many businesses<br />

across industries. Although the<br />

adoption of encryption has increased<br />

over the last decade, only a mere 37 percent<br />

of businesses employ it as a cloud<br />

security strategy.<br />

Remember, encryption is the important<br />

first step for businesses that wish<br />

to take control of the ownership of<br />

data; better encryption key management<br />

follows next.<br />

While encryption renders data<br />

into a format that can only be read by<br />

authorized users, it does not make a<br />

powerful strategic tool if not combined<br />

with effective key management. Far<br />

too often, companies follow a laissezfaire<br />

approach to key management,<br />

which makes its utilization needlessly<br />

complex and cumbersome. Problems<br />

do get out of hand when there is no<br />

clear ownership of keys within the<br />

organization, when no skilled personnel<br />

is in charge of the keys, or when<br />

a siloed approach is followed for key<br />

management.<br />

Having an effective encryption and<br />

key management solution is vital to<br />

the success of any security strategy.<br />

Data encryption, when executed<br />

properly, ensures the protection of<br />

sensitive information. Although there<br />

are many myths surrounding data<br />

Encryption is the important first step for businesses<br />

that wish to take control of the ownership of data;<br />

better encryption key management follows next<br />

encryption (too expensive, too difficult<br />

to manage, etc), the surprising truth is<br />

that it is indispensable. In fact, encryption<br />

provides the foundational framework<br />

to any data security protection<br />

strategy.<br />

There are security options out there<br />

to help organizations in:<br />

Encrypting and managing data<br />

stored on virtual machines and<br />

Infrastructure-as-a-Service (IaaS)<br />

platforms.<br />

Encrypting files at the endpoint<br />

before they are synchronized to<br />

enterprise file sync and share (EFSS)<br />

services across a range of enterprise<br />

platforms.<br />

Managing encryption keys across<br />

the enterprise<br />

Whether data is stored in public,<br />

private, or hybrid cloud environments,<br />

organizations need a robust<br />

solution to ensure full control of<br />

encryption and its keys. Much of the<br />

encryption related problems can be<br />

alleviated with the adoption of file<br />

encryption software, and ideally with<br />

an intelligent key management system<br />

that encrypts virtual machines and<br />

removes encryption keys at the conclusion<br />

of each virtual instance.<br />

Using a single platform often is<br />

more effective as an organization can<br />

ensure the implementation of a unified<br />

encryption strategy across any<br />

endpoint, provide a virtualized or<br />

cloud environment with increased<br />

enterprise security, ensure encryption<br />

compliance, and reduce complexities<br />

of risk management and audits<br />

14 <strong>CIO</strong>&<strong>LEADER</strong> | <strong>January</strong> <strong>2018</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!