Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News
SYS-CON.TV
Cloud Expo & Virtualization 2009 East
PLATINUM SPONSORS:
IBM
Smarter Business Solutions Through Dynamic Infrastructure
IBM
Smarter Insights: How the CIO Becomes a Hero Again
Microsoft
Windows Azure
GOLD SPONSORS:
Appsense
Why VDI?
CA
Maximizing the Business Value of Virtualization in Enterprise and Cloud Computing Environments
ExactTarget
Messaging in the Cloud - Email, SMS and Voice
Freedom OSS
Stairway to the Cloud
Sun
Sun's Incubation Platform: Helping Startups Serve the Enterprise
POWER PANELS:
Cloud Computing & Enterprise IT: Cost & Operational Benefits
How and Why is a Flexible IT Infrastructure the Key To the Future?
Click For 2008 West
Event Webcasts
Cloud Computing Security Issues and Challenges By @GiladPN | @CloudExpo [#Cloud]
Digital data theft is more prevalent than physical theft

The US Federal Communications Commission has recently reported that "theft of digital information has become the most commonly reported fraud, surpassing physical theft." Businesses can do a lot to protect themselves. The FCC issued a Tip Sheet for small businesses to promote employee security training, firewalls, securing of WiFis, and more. But for business operating in (or migrating to) cloud environments; data security, cloud computing security issues, and challenges take on  new meanings and require new strategies.

Security in the Cloud: Unique Challenges
In the cloud, data security poses new risks and challenges. We are no longer concerned just with burglars breaking into our offices to steal computers, but rather with the data belonging to complete systems deployed to the cloud.

Security in the cloud cloud security issues Cloud Security Cloud Encryption cloud computing security issues and challenges  cloud computing security issues and challenges Cloud Computing Security Issues and Challenges:  Digital data theft is more prevalent than physical theft

When using public cloud infrastructure like that of AWS, VMware, Microsoft Azure, or HP Helion, we also have little fear of "bad guys" breaking into their datacenters. These large providers take access controls and infrastructure security very seriously.

Instead, security in the cloud becomes not about protecting our hardware, but rather protecting the sensitive information regardless of its physical location. For this, burglar alarms are irrelevant and firewalls are only one part of the approach for security in the cloud.

A way to visualize the unique challenges of data security in the cloud is that where before we had brick walls and steel locks to keep us safe; we now must construct mathematical walls as barriers to our data.

An important aspect in cloud security is cloud encryption. By properly encrypting the data we store in the cloud, we ensure that even if our security perimeter is breached, our data is rendered unreadable, unusable, and unsellable.

But, as it turns out, cloud encryption in and of itself is also not enough. Companies have encrypted well, using best-in-class algorithms to protect their business data, and still been compromised. The important piece is the encryption key. When businesses store the key to decrypt their data in the cloud, alongside the encrypted data itself, they make it easy for a hacker to use the same access point used to get the data to then get the key to decrypt it. In other examples, companies have entrusted their encryption keys to their cloud provider: the cloud provider essentially owns the sensitive data in this situation. The best practice must be different.

Security in the Cloud: Unique Solutions
The cloud has posed interesting obstacles to data security. And, as it turns out, the cloud has also brought forth even more interesting solutions.

In our new software-defined existence, the solution to cloud challenges resides in software built for the cloud.

For example, a pair of new technologies known as split key encryption and homomorphic key management have reinvented the way cloud encryption keys are handled; thus solving the issue of cloud key management.

By splitting encryption keys into two (or more) parts, this software-defined approach mimics the successful security of Swiss banks, where the account owner holds one key, the banker holds one key, and both keys are required to access the contents. Split key encryption is the first of two important cloud advancements toward total security in the cloud.

The next advancement is homomorphic key management, which is also a software-defined, cloud approach. With it, the encryption keys themselves are encrypted. This way, even while the key is being used in the cloud, it is never in unencrypted form, never to be seen "bare" by hackers, and renders the data it protects totally inaccessible to anyone but the data owner.

Security in the Cloud to Protect Privacy and Achieve Compliance
It is not just businesses themselves that have been concerned with data security in the cloud. Regulatory bodies in many industries view cloud security has a major concern and have amended their regulations to match. The approaches of split key encryption and homomorphic key management help businesses protect the privacy of their customers while also enable them to achieve compliance with HIPAA, PCI, and other regulations.

The post Cloud Computing Security Issues and Challenges: Digital data theft is more prevalent than physical theft appeared first on Porticor Cloud Security.

Read the original blog entry...

About Gilad Parann-Nissany
Gilad Parann-Nissany, Founder and CEO at Porticor is a pioneer of Cloud Computing. He has built SaaS Clouds for medium and small enterprises at SAP (CTO Small Business); contributing to several SAP products and reaching more than 8 million users. Recently he has created a consumer Cloud at G.ho.st - a cloud operating system that delighted hundreds of thousands of users while providing browser-based and mobile access to data, people and a variety of cloud-based applications. He is now CEO of Porticor, a leader in Virtual Privacy and Cloud Security.

Latest Cloud Developer Stories
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT or...
"We're here to tell the world about our cloud-scale infrastructure that we have at Juniper combined with the world-class security that we put into the cloud," explained Lisa Guess, VP of Systems Engineering at Juniper Networks, in this SYS-CON.tv interview at 20th Cloud Expo, hel...
Hardware virtualization and cloud computing allowed us to increase resource utilization and increase our flexibility to respond to business demand. Docker Containers are the next quantum leap - Are they?! Databases always represented an additional set of challenges unique to runn...
The current age of digital transformation means that IT organizations must adapt their toolset to cover all digital experiences, beyond just the end users’. Today’s businesses can no longer focus solely on the digital interactions they manage with employees or customers; they mus...
In his session at 20th Cloud Expo, Brad Winett, Senior Technologist for DDN Storage, will present several current, end-user environments that are using object storage at scale for cloud deployments including private cloud and cloud providers. Details on the top considerations of ...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021



SYS-CON Featured Whitepapers
ADS BY GOOGLE