SlideShare a Scribd company logo
Keys To Better Data Security 
In The Cloud 
Intelligent Encryption 
Speakers: 
C.J. Radford 
Vice President 
of Cloud 
Vormetric 
Kurt Hagerman 
Chief Information 
Security Officer 
FireHost
Keys To Better Data Security In The Cloud 
INTELLIGENT ENCRYPTION 
Today’s Agenda 
• Cloud Industry Trends 
• Data Security Myths & Realities 
• Compliance & Legal Considerations 
• Encryption as Part of a Broader Security Approach 
• An Intelligent Security Model: Multilayered Security 
• Incorporating Data Security Sensibly 
• Recent Breaches and Encryption’s Role 
• Questions & Answers 
Submit your questions throughout the webinar via chat. We’ll 
address them live at the end or follow up offline
Diversification 
Impact of that on 
provider decision 
Keys To Better Data Security In The Cloud 
INTELLIGENT ENCRYPTION 
Specialists vs. Generalists 
Diversification of providers
Keys To Better Data Security In The Cloud 
INTELLIGENT ENCRYPTION 
Cloud Security Pain Points 
Top Security Concerns with Cloud Computing 
Data Privacy & Security 
Access & Control 
Auditing & Compliance 
Control of Data 
Security Models/Toolsets 
Contractual/Legal Issues 
Internal Issues 
Network Connection Security 
Geographical Coverage 
37% Believe security is the biggest pain point 
73% Considered Security to be extremely important 
41% 
35% 
32% 
26% 
18% 
15% 
11% 
10% 
4%
Keys To Better Data Security In The Cloud 
INTELLIGENT ENCRYPTION 
SECURE DATA
Types of Encryption 
Data in Motion 
Keys To Better Data Security In The Cloud 
INTELLIGENT ENCRYPTION 
Data at Rest
Keys To Better Data Security In The Cloud 
You’re not secure 
with Full Disk 
Encryption 
I’m secure with Full Disk 
Encryption 
INTELLIGENT ENCRYPTION 
VS 
Myth Reality
Myth 
Keys To Better Data Security In The Cloud 
Encryption 
is vital and 
required for most 
organizations 
Encryption 
is optional for my 
organization 
Reality 
VS 
INTELLIGENT ENCRYPTION
Keys To Better Data Security In The Cloud 
A well-designed solution 
can avoid performance 
degradation 
Encryption 
slows down my 
performance 
INTELLIGENT ENCRYPTION 
VS 
Myth Reality
Keys To Better Data Security In The Cloud 
A best practice is having 
an encryption strategy 
from 
the beginning 
Encryption is a 
final touch on a security 
program 
INTELLIGENT ENCRYPTION 
VS 
Myth Reality
Keys To Better Data Security In The Cloud 
Encryption & key 
management 
can be simple with 
the right solution 
Encryption & key 
management 
is hard 
INTELLIGENT ENCRYPTION 
VS 
Myth Reality
Keys To Better Data Security In The Cloud 
Encryption protects It depends! 
my data from 
privileged user 
access 
INTELLIGENT ENCRYPTION 
VS 
Myth Reality
Keys To Better Data Security In The Cloud 
INTELLIGENT ENCRYPTION 
The Legal Side of Encryption
Keys To Better Data Security In The Cloud 
INTELLIGENT ENCRYPTION 
How FireHost approaches encryption 
• Enforce separation of DSM from 
other VMs 
• Customer is always the custodian 
of policies and keys
Keys To Better Data Security In The Cloud 
INTELLIGENT ENCRYPTION 
The FireHost Difference
Keys To Better Data Security In The Cloud 
INTELLIGENT ENCRYPTION 
In the News 
December 2013 January 2014 
110 million customers’ credit card and 
personal data stolen 
1.1 million customers’ credit 
and debit card data stolen 
April 2014 
3 million customers’ credit 
and debit card data stolen 
May 2014 June 2014 
145 million users’ 
passwords affected 
(Forensics under way) 
Credit and debit cards 
Who’s Next? 
? 
It happened this week…
Keys To Better Data Security In The Cloud 
INTELLIGENT ENCRYPTION 
The Last Week 
Monday, August 18 
4.5 million patient records stolen Names, 
addresses, birth dates, phone numbers, and Social Security 
numbers 
Publicity could have been 
avoided with Encryption. 
Don’t Be Next 
206 Hospitals in 29 States 
HIPAA, and most state breach 
notification laws, don't 
consider the loss of encrypted 
data without the keys as a 
reportable event. 
August 15 August 20
Thank You 
Questions? 
@kurthagerman @cjrad 
C.J. Radford 
Vice President 
of Cloud 
Vormetric 
Kurt Hagerman 
Chief Information 
Security Officer 
FireHost

More Related Content

PDF
NTXISSACSC3 - Security at the Point of Storage by Todd Barton
PPTX
NIAP Compliance & Data-Centric Security
PPTX
Seclore for Forcepoint DLP
PPTX
Security Myths Surrounding Microsoft Information Protection
PPTX
Customer Data Privacy & Protection | Seclore
PPTX
Cybersecurity services
PPTX
One click protection in microsoft office
PDF
Top reasons why Endpoint Security should move to Cloud | Sysfore
NTXISSACSC3 - Security at the Point of Storage by Todd Barton
NIAP Compliance & Data-Centric Security
Seclore for Forcepoint DLP
Security Myths Surrounding Microsoft Information Protection
Customer Data Privacy & Protection | Seclore
Cybersecurity services
One click protection in microsoft office
Top reasons why Endpoint Security should move to Cloud | Sysfore

What's hot (20)

PDF
"Meet Me in the Middle: Threat Indications & Warning to enable Operational Th...
PPTX
Webinar: True Stories From the Threat Hunting Files
PDF
Big Data Security Intelligence and Analytics for Advanced Threat Protection
PPTX
NIST Compliance & Data Centric Security
PPTX
Data Security For Insurance Solutions
PDF
What is cloud encryption
PPTX
Data-Centric Security | Seclore
PPTX
Seclore for Titus
PPTX
Five Key Trends for Data-Centric Security
PPTX
DLP Solutions Protection | Seclore
PDF
Protect your sensitive data against data leaks with Safetica DLP
PPTX
Cloud Managed Services: Cloud Infrastructure
PPTX
Cloud Security is not equal to Cloud Data Security
PPTX
Webinar: Scale up you Cyber Security Strategy Webinar
PPTX
Seclore Advantage Channel Program
PPTX
The Ins and Outs of Data Security: Kareo Success Summit
PPT
Achieving Data Privacy in the Enterprise
PPTX
Bring Your Own Encryption | Seclore
PDF
Forecast 2012 Panel: Cloud Security Christofer Hoff
PPTX
Securing IBM ECM with Rights Management
"Meet Me in the Middle: Threat Indications & Warning to enable Operational Th...
Webinar: True Stories From the Threat Hunting Files
Big Data Security Intelligence and Analytics for Advanced Threat Protection
NIST Compliance & Data Centric Security
Data Security For Insurance Solutions
What is cloud encryption
Data-Centric Security | Seclore
Seclore for Titus
Five Key Trends for Data-Centric Security
DLP Solutions Protection | Seclore
Protect your sensitive data against data leaks with Safetica DLP
Cloud Managed Services: Cloud Infrastructure
Cloud Security is not equal to Cloud Data Security
Webinar: Scale up you Cyber Security Strategy Webinar
Seclore Advantage Channel Program
The Ins and Outs of Data Security: Kareo Success Summit
Achieving Data Privacy in the Enterprise
Bring Your Own Encryption | Seclore
Forecast 2012 Panel: Cloud Security Christofer Hoff
Securing IBM ECM with Rights Management
Ad

Viewers also liked (7)

PDF
Case Study - Currency from the Cloud: Security & Compliance for Payment Provider
PDF
Cybersecurity - Whose responsibility is it?
PPTX
With FireHost You Can Have it All: Performance & Security
PPTX
Firehost Webinar: Hipaa Compliance 101 Part 2- Your Organizational Impact
PPTX
Firehost Webinar: Getting Hipaa Compliant
PPTX
Getting Ready for PCI DSS 3.0
PDF
The Cloud Crossover
Case Study - Currency from the Cloud: Security & Compliance for Payment Provider
Cybersecurity - Whose responsibility is it?
With FireHost You Can Have it All: Performance & Security
Firehost Webinar: Hipaa Compliance 101 Part 2- Your Organizational Impact
Firehost Webinar: Getting Hipaa Compliant
Getting Ready for PCI DSS 3.0
The Cloud Crossover
Ad

Similar to Keys To Better Data Security In the Cloud (20)

PDF
iaetsd Using encryption to increase the security of network storage
PDF
The Growing Importance of Data Encryption in IT Security.pdf
PDF
Research Report on Preserving Data Confidentiality & Data Integrity in ...
PPTX
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
PPTX
Addressing the Data Security Risks of Cloud-Based Software
PPTX
2016 FS-ISAC Annual Summit (Miami) - Developing Effective Encryption Strategies
PDF
Exploring Cloud Encryption
PDF
Secure Storage Encryption Implications_Fornetix
PDF
Cyber Threats Are Rising—Is Your Data Safe Without Encryption.pdf
PPTX
Addressing the Data Security Risks of Cloud-Based Software - HBMA Presentation
PDF
Data protection on demand in hybrid it
PDF
Where data security and value of data meet in the cloud ulf mattsson
PPTX
Where to Store the Cloud Encryption Keys - InterOp 2012
PDF
Data Encryption and Protection in Cloud Computing
PDF
Importance of Data Encryptions for Organizations | USCSI®
PPTX
How To Plan Successful Encryption Strategy
PPTX
Top 10 Encryption Myths
PDF
Securing Cloud Data The Role of Cryptography.pdf
PDF
The State of Data Security
PDF
Data Privacy And Security Issues In Cloud Computing.pdf
iaetsd Using encryption to increase the security of network storage
The Growing Importance of Data Encryption in IT Security.pdf
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Addressing the Data Security Risks of Cloud-Based Software
2016 FS-ISAC Annual Summit (Miami) - Developing Effective Encryption Strategies
Exploring Cloud Encryption
Secure Storage Encryption Implications_Fornetix
Cyber Threats Are Rising—Is Your Data Safe Without Encryption.pdf
Addressing the Data Security Risks of Cloud-Based Software - HBMA Presentation
Data protection on demand in hybrid it
Where data security and value of data meet in the cloud ulf mattsson
Where to Store the Cloud Encryption Keys - InterOp 2012
Data Encryption and Protection in Cloud Computing
Importance of Data Encryptions for Organizations | USCSI®
How To Plan Successful Encryption Strategy
Top 10 Encryption Myths
Securing Cloud Data The Role of Cryptography.pdf
The State of Data Security
Data Privacy And Security Issues In Cloud Computing.pdf

More from Armor (15)

PPTX
Security Operations in the Cloud
PPTX
Ransomware
PPTX
FireHost Webinar: HealthData Repository Deconstructed
PPTX
FireHost Webinar: The Service You Should Expect in the Cloud
PPTX
Making Sense of Security and Compliance
PPTX
Firehost Webinar: How a Secure High Performance Cloud Powers Applications
PPTX
Firehost Webinar: Validating your Cardholder Data Envirnment
PPTX
Firehost Webinar: Do you know where your Cardholder Data Environment is?
PPTX
Firehost Webinar: Getting Ready for PCI 3.0
PPTX
Firehost Webinar: Hipaa Compliance 101 Part 1
PPTX
FireHost Webinar: How a Secure High Performance Cloud Powers Critical Applica...
PPTX
FireHost Webinar: Protect Your Application With Intelligent Security
PPTX
FireHost Webinar: 6 Must Have Tools For Disaster Prevention
PPTX
Cloud Computing Best Practices
PPTX
Secure Cloud Hosting: Real Requirements to Protect your Data
Security Operations in the Cloud
Ransomware
FireHost Webinar: HealthData Repository Deconstructed
FireHost Webinar: The Service You Should Expect in the Cloud
Making Sense of Security and Compliance
Firehost Webinar: How a Secure High Performance Cloud Powers Applications
Firehost Webinar: Validating your Cardholder Data Envirnment
Firehost Webinar: Do you know where your Cardholder Data Environment is?
Firehost Webinar: Getting Ready for PCI 3.0
Firehost Webinar: Hipaa Compliance 101 Part 1
FireHost Webinar: How a Secure High Performance Cloud Powers Critical Applica...
FireHost Webinar: Protect Your Application With Intelligent Security
FireHost Webinar: 6 Must Have Tools For Disaster Prevention
Cloud Computing Best Practices
Secure Cloud Hosting: Real Requirements to Protect your Data

Recently uploaded (20)

PDF
A novel scalable deep ensemble learning framework for big data classification...
PPTX
The various Industrial Revolutions .pptx
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
project resource management chapter-09.pdf
PDF
Web App vs Mobile App What Should You Build First.pdf
PPTX
observCloud-Native Containerability and monitoring.pptx
PPT
What is a Computer? Input Devices /output devices
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
Modernising the Digital Integration Hub
PDF
STKI Israel Market Study 2025 version august
PDF
Getting Started with Data Integration: FME Form 101
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
August Patch Tuesday
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
A comparative study of natural language inference in Swahili using monolingua...
A novel scalable deep ensemble learning framework for big data classification...
The various Industrial Revolutions .pptx
O2C Customer Invoices to Receipt V15A.pptx
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
project resource management chapter-09.pdf
Web App vs Mobile App What Should You Build First.pdf
observCloud-Native Containerability and monitoring.pptx
What is a Computer? Input Devices /output devices
1 - Historical Antecedents, Social Consideration.pdf
WOOl fibre morphology and structure.pdf for textiles
Univ-Connecticut-ChatGPT-Presentaion.pdf
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Modernising the Digital Integration Hub
STKI Israel Market Study 2025 version august
Getting Started with Data Integration: FME Form 101
Programs and apps: productivity, graphics, security and other tools
August Patch Tuesday
OMC Textile Division Presentation 2021.pptx
A comparative study of natural language inference in Swahili using monolingua...

Keys To Better Data Security In the Cloud

  • 1. Keys To Better Data Security In The Cloud Intelligent Encryption Speakers: C.J. Radford Vice President of Cloud Vormetric Kurt Hagerman Chief Information Security Officer FireHost
  • 2. Keys To Better Data Security In The Cloud INTELLIGENT ENCRYPTION Today’s Agenda • Cloud Industry Trends • Data Security Myths & Realities • Compliance & Legal Considerations • Encryption as Part of a Broader Security Approach • An Intelligent Security Model: Multilayered Security • Incorporating Data Security Sensibly • Recent Breaches and Encryption’s Role • Questions & Answers Submit your questions throughout the webinar via chat. We’ll address them live at the end or follow up offline
  • 3. Diversification Impact of that on provider decision Keys To Better Data Security In The Cloud INTELLIGENT ENCRYPTION Specialists vs. Generalists Diversification of providers
  • 4. Keys To Better Data Security In The Cloud INTELLIGENT ENCRYPTION Cloud Security Pain Points Top Security Concerns with Cloud Computing Data Privacy & Security Access & Control Auditing & Compliance Control of Data Security Models/Toolsets Contractual/Legal Issues Internal Issues Network Connection Security Geographical Coverage 37% Believe security is the biggest pain point 73% Considered Security to be extremely important 41% 35% 32% 26% 18% 15% 11% 10% 4%
  • 5. Keys To Better Data Security In The Cloud INTELLIGENT ENCRYPTION SECURE DATA
  • 6. Types of Encryption Data in Motion Keys To Better Data Security In The Cloud INTELLIGENT ENCRYPTION Data at Rest
  • 7. Keys To Better Data Security In The Cloud You’re not secure with Full Disk Encryption I’m secure with Full Disk Encryption INTELLIGENT ENCRYPTION VS Myth Reality
  • 8. Myth Keys To Better Data Security In The Cloud Encryption is vital and required for most organizations Encryption is optional for my organization Reality VS INTELLIGENT ENCRYPTION
  • 9. Keys To Better Data Security In The Cloud A well-designed solution can avoid performance degradation Encryption slows down my performance INTELLIGENT ENCRYPTION VS Myth Reality
  • 10. Keys To Better Data Security In The Cloud A best practice is having an encryption strategy from the beginning Encryption is a final touch on a security program INTELLIGENT ENCRYPTION VS Myth Reality
  • 11. Keys To Better Data Security In The Cloud Encryption & key management can be simple with the right solution Encryption & key management is hard INTELLIGENT ENCRYPTION VS Myth Reality
  • 12. Keys To Better Data Security In The Cloud Encryption protects It depends! my data from privileged user access INTELLIGENT ENCRYPTION VS Myth Reality
  • 13. Keys To Better Data Security In The Cloud INTELLIGENT ENCRYPTION The Legal Side of Encryption
  • 14. Keys To Better Data Security In The Cloud INTELLIGENT ENCRYPTION How FireHost approaches encryption • Enforce separation of DSM from other VMs • Customer is always the custodian of policies and keys
  • 15. Keys To Better Data Security In The Cloud INTELLIGENT ENCRYPTION The FireHost Difference
  • 16. Keys To Better Data Security In The Cloud INTELLIGENT ENCRYPTION In the News December 2013 January 2014 110 million customers’ credit card and personal data stolen 1.1 million customers’ credit and debit card data stolen April 2014 3 million customers’ credit and debit card data stolen May 2014 June 2014 145 million users’ passwords affected (Forensics under way) Credit and debit cards Who’s Next? ? It happened this week…
  • 17. Keys To Better Data Security In The Cloud INTELLIGENT ENCRYPTION The Last Week Monday, August 18 4.5 million patient records stolen Names, addresses, birth dates, phone numbers, and Social Security numbers Publicity could have been avoided with Encryption. Don’t Be Next 206 Hospitals in 29 States HIPAA, and most state breach notification laws, don't consider the loss of encrypted data without the keys as a reportable event. August 15 August 20
  • 18. Thank You Questions? @kurthagerman @cjrad C.J. Radford Vice President of Cloud Vormetric Kurt Hagerman Chief Information Security Officer FireHost

Editor's Notes

  • #3: -- Canned Q/Tie in with PPT flow as well: Hybrid cloud trends, sharing across lines; Vormetric well-suited for hybrid cloud environments
  • #4: Cloud Industry’s Diversification & Its Impact on Customer Decisions – -- Cloud industry convergence (SPs, product vendors, SaaS/PaaS, startups, SI, cloud providers) -- Generalist vs. specialist and rise of specialization, security as an example.
  • #5: Industry Trends: Cloud, Data, Internet Just think what these projections could be if security was not a barrier and contingencies were addressed.
  • #6: Role Data security’s role in IofT, mobility, app-centricity, etc. as it all manifests in cloud – last line of defense? All grabbing data from a server – ultimately data is the atomic unit; It’s about the data… Following it and securing where it lives and goes is critical
  • #7: In motion is IPsec/SSL VPN/P2P encryption Data-at-Rest, e.g. Application-Layer Encryption / Table-level encryption/TDE, Vormetric is the #1 File System Encryption solution, Disk is Self Encryption Drives like NetApp NSE drives. Today’s presentation is about Data-at-Rest. Note, Application-layer and sometimes File System (like with backup) also handle data in motion.
  • #8: It only protects your data if the hardware is physically stolen. Once powered up and unlocked all drive data is in the clear to privileged users and miscreants Encryption is the lock, keys activate that encryption/lock. Hide keys in the house, under a rock, under the mat? Bad guys hunt for keys. Too laborious to crack encryption/lock itself. Storing the keys and protecting them is key…
  • #9: Vital for compliance with many regulations, like PCI, HIPAA, Breach Notification laws, etc. Vormetric has a paper….
  • #10: Look for solutions optimized for performance. Things to look for include: Deep file system integration, strong multi-threading and queuing capabilities and ability to leverage AES acceleration hardware like Intel AES-NI capabilities.
  • #11: It is always easier to start with encryption so that you don’t have to identify and encrypt large amounts of information further down a data life cycle. Think of all the back ups, snap shots, and other copies that may have been made before the encryption was put in place! In addition, all too often single purpose solutions are deployed b/c an encryption strategy isn’t in place… this has high capex and opex costs…. Better to have a strategy in place that is consistent, repeatable and centrally managed for many environments and data types….
  • #12: Encryption key management is very hard Encryption is the lock, keys activate that encryption/lock. Hide keys in the house, under a rock, under the mat? Bad guys hunt for keys. Too laborious to crack encryption/lock itself. Storing the keys and protecting them is key…
  • #13: Some File System-level solutions and Application-layer solutions can foil privileged users. Once booted, FDE and Volume-level solutions can’t stop the privileged user. Encryption is the lock, keys activate that encryption/lock. Hide keys in the house, under a rock, under the mat? Bad guys hunt for keys. Too laborious to crack encryption/lock itself. Storing the keys and protecting them is key…
  • #14: Compliance and regulatory requirements Protection against fine and penalties. Even if you lose the data, it’s remains encrypted and consequences are reduced.
  • #15: Vormetric Data Security solution can be implemented in two different configurations in CSP. Customer can host Data Security Manager(s) on-site and protect data both on server in their data center as well as servers in CSP cloud. The customer will manage and have ownership of encryption keys and data access policies. They can dictate who can access protected data. CSP Team can manage customer data (e.g. backup/restore, DR capability) but will not be able to see the contents of data as it will remain encrypted. HOW IT WORKS Encryption, enterprise key management & access control Encryption is only as strong as the keys are protected You own your keys to keep your data private Provider has no data access Other solutions don’t offer this option
  • #16: The FireHost Difference Our clouds are born secure Encryption is an ingredient – not the entire program It is built in, not bolted on Our security enables compliance - not a checkbox mentality
  • #17: Industry Trends: Cloud, Data, Internet Just think what these projections could be if security was not a barrier and contingencies were addressed.
  • #18: Industry Trends: Cloud, Data, Internet Just think what these projections could be if security was not a barrier and contingencies were addressed.