ChannelLife NZ - Securing data in the cloud

Warning: This story was published more than a year ago.
SMB_Secure_Cloud_Backup.jpg

Securing data in the cloud

Software-as-a-service (SaaS), managed services and cloud computing offer enormous benefits to organisations. But cloud and other virtualised or shared computing infrastructures also introduce an array of security concerns that must be addressed if businesses, governments and consumers are going to trust and use them.
Recent high-profile data security and privacy breaches underscore how individuals and organisations should never assume their data is safe when they expose it to a public service.
In this environment, there is growing attention to the importance of securing user access and validating identities. With it, demand is rising for strong authentication solutions to replace simple passwords. Right now, it is being driven by managed services and SaaS applications and it will accelerate further with the adoption of cloud computing.
Expansion
As a result, the market for authentication solutions has expanded from large enterprise and government organisations – which traditionally need to manage large numbers of complex passwords – to include small to medium sized businesses (SMBs).
For all these organisations, authentication solutions can improve business control, visibility and productivity through centralised and simplified administration, deployment and manageability. Multiple passwords can all be replaced by a single token, for example, to provide a simpler and more secure method of authentication for users.
When first introduced in the early 1960s passwords were regarded as
cheap, easy to use,and secure. Fifty years and many technological developments later, this is no longer the case. Passwords are difficult to use – studies reveal that users today have on average approximately 15 password-protected accounts. One password may be easy to remember, but handling many passwords is a time consuming task and a security hazard.
Passwords are also expensive – every forgotten or lost password results in significant costs.
And passwords are not secure. To handle their multiple credentials, many users choose easy-to-guess passwords, use the same passwords for several accounts, or even write downpasswords where they can be easily found. Add to these security risks the abundance of available password cracking tools and it is easy to see that passwords are no longer sufficient.
To overcome the inherent weakness of passwords, organisations are turning to stronger multi-factor authentication solutions, including one-time passwords (OTP) and certificate-based authentication (CBA). These solutions can be deployed using a choice of hardware and/or software tokens, or conveniently on existing mobile devices.
Strong channel interest
Authentication to applications and the management of passwords will become even more onerous and potentially less secure as these points of authentication increase and move beyond the organisation’s own traditional perimeters. To meet this demand, we are currently seeing strong interest from channel organisations such as managed service providers, SaaS resellers and information security resellers.
When applications move to the cloud, employee access to core applications and the company’s most sensitive information by default becomes remote access. Organisations need to ensure that these critical assets are available only to authorised employees – even when they are no longer stored in the company’s data centre. Addressing this are out-of-the-box authentication solutions which take minutes to implement and are thus very suitable for SMB deployment. The latest solutions will also work with popular SaaS applications such as Google Mail and Salesforce out of the box. These can be supported by resellers with minimal investment in training or with back-up from a value-added distributor.
Whether you have previous experience selling them or not, now could be a good time to start examining whether your clients’ authentication solutions are up to scratch before they go looking themselves.

Interested in this topic?
We can put you in touch with an expert.

Follow Us

Featured

next-story-thumb Scroll down to read: