Posted 10.22.13
by wpadmin
Blog

Video: Is Data Less Secure in a Cloud Environment?

Online Tech’s Senior Product Architect Steve Aiello continues his data security series of videos on data encryption by dispelling the myth that data is less secure in a well-run data center or in a cloud environment.

Actually – data is more secure with a cloud hosting provider.

Does your office have the appropriate level of physical security in place, including:

  • Biometric authentication – key fobs, pins and fingerprint readers for access to your servers
  • Solid, reinforced concrete walls
  • Heat and fire suppression sensors
  • Additional locks on cabinets
  • Visitor logs

Does your limited technical staff have the ability to:

  • Ensure your patches are up-to-date
  • Expertise to run enterprise antivirus, anti-malware, file integrity monitoring solution with IDS/IPS solution
  • Fully redundant, high availability firewall maintenance
  • Expertise to implement encryption in storage arrays
  • Know-how to harden operating systems
  • Ability to alert in case of anomalies
  • Set up web application firewalls
  • Set up and configure highly mobile VPNs in a cost-effective manner

Comparing the services of cloud service providers to the man-hours and hardware required for a in-house solution, a cloud hosting provider offers more value and expertise at lower costs.

Watch the full video on our site.

Is Data Less Secure in a Cloud Environment?

Is Data Less Secure in a Cloud Environment? View video on our site.


Learn more about encryption of data at rest and in transit on our Defense in Depth page.

The increased cyber threats of hackers and data theft presents a strong case for employing encryption and infrastructure that both secures data while delivering strong computing performance for optimal data availability and reliability. In this white paper, different types of encryption will be discussed, including using encryption in the cloud.

Encrypted Cloud Data

Although encryption is not a silver bullet of data or system security, it is one key tool that can be accompanied by a full arsenal of security services for a layered-defense approach to ensuring data is protected, even if accessed by unauthorized individuals. Additional security options to add to your IT solution will be covered.

Download our latest white paper, Encryption of Cloud Data.

Get started with Otava now!

  • This field is for validation purposes and should be left unchanged.