Welcome!

@CloudExpo Authors: Pat Romanski, Elizabeth White, Yeshim Deniz, Liz McMillan, Zakia Bouachraoui

Related Topics: @CloudExpo, Microservices Expo, Containers Expo Blog, Cognitive Computing , Agile Computing, Cloud Security

@CloudExpo: Blog Feed Post

Cloud Security – Implementing a Secure Cloud Backup Case Study

Cloud Security and Cloud Encryption options considered

Secure cloud backup is a scenario which increasingly gains traction. It allows organizations to implement an off-site backup while maintaining costs at a minimum. In this blog post I would like to focus on a specific use case of secure cloud backup. The system we describe is comprised of an on-premise replication server, Porticor Cloud Security, and Amazon S3 as the final backup destination, all integrated by one of our fine cloud integrators.

Secure Cloud Backup – The Business Need
In this use case, an enterprise organization was struggling with an inefficient and costly offsite backup infrastructure that was meant to manage an incrementally expanding database.  An offsite server farm was costly to operate and maintain and the tape backup and recovery methods used were time consuming. Furthermore, the company failed to meet regulatory requirements with regard to data availability. To eliminate the complexity and cost associated with this backup methodology, one of our integrators, Emind Systems implemented an onsite dedicated server which mirrored directories and volumes on the local network and replicated data to an Amazon Web Services S3. But a critical requirement was cloud data security and encryption; this is where Porticor comes in.

Cloud Security and Cloud Encryption options considered
One of the top concerns of enterprises deploying cloud encryption is “data confidentiality”, or in other words – who controls the encryption keys, and therefore can potentially access the data. Some cloud providers offer data encryption as part of their service, but as the cloud provider manages and maintains your cloud encryption keys, they can potentially see your data. Rich Mogull described it well on his blog “How to Tell If Your Cloud Provider Can Read Your Data (Hint: They Can)”. One secure alternative would be an on-premise key management server, but that is costly (in operation and capital expenses), and limits the cloud flexibility tremendously.

Secure Cloud Backup – Mission Accomplished
To avoid these issues while maintaining information security, Porticor’s Virtual Private Data has been integrated  (for further reading download the white paper here) in their backup scenario. The end result is a highly scalable, elastic and secure backup solution. The onsite server mirrored the data and transferred it to a pre-configured AWS S3 bucket, and Porticor encrypts each object on its way to S3. Each object has been encrypted using a unique encryption key, yet the customer maintains a single “project” key, which allows for an automated key management cycle while not sharing the encryption keys with anyone.

 

Ariel Dan is co-founder at Porticor Cloud Security

The post Cloud Security – Implementing a Secure Cloud Backup Case Study appeared first on Porticor Cloud Security.

Read the original blog entry...

More Stories By Gilad Parann-Nissany

Gilad Parann-Nissany, Founder and CEO at Porticor is a pioneer of Cloud Computing. He has built SaaS Clouds for medium and small enterprises at SAP (CTO Small Business); contributing to several SAP products and reaching more than 8 million users. Recently he has created a consumer Cloud at G.ho.st - a cloud operating system that delighted hundreds of thousands of users while providing browser-based and mobile access to data, people and a variety of cloud-based applications. He is now CEO of Porticor, a leader in Virtual Privacy and Cloud Security.

CloudEXPO Stories
Most modern computer languages embed a lot of metadata in their application. We show how this goldmine of data from a runtime environment like production or staging can be used to increase profits. Adi conceptualized the Crosscode platform after spending over 25 years working for large enterprise companies like HP, Cisco, IBM, UHG and personally experiencing the challenges that prevent companies from quickly making changes to their technology, due to the complexity of their enterprise. An accomplished expert in Enterprise Architecture, Adi has also served as CxO advisor to numerous Fortune executives.
Eric Taylor, a former hacker, reveals what he's learned about cybersecurity. Taylor's life as a hacker began when he was just 12 years old and playing video games at home. Russian hackers are notorious for their hacking skills, but one American says he hacked a Russian cyber gang at just 15 years old. The government eventually caught up with Taylor and he pleaded guilty to posting the personal information on the internet, among other charges. Eric Taylor, who went by the nickname Cosmo the God, also posted personal information of celebrities and government officials, including Michelle Obama, former CIA director John Brennan, Kim Kardashian and Tiger Woods. Taylor recently became an advisor to cybersecurity start-up Path which helps companies make sure their websites are properly loading around the globe.
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a member of the Society of Information Management (SIM) Atlanta Chapter. She received a Business and Economics degree with a minor in Computer Science from St. Andrews Presbyterian University (Laurinburg, North Carolina). She resides in metro-Atlanta (Georgia).
SUSE is a German-based, multinational, open-source software company that develops and sells Linux products to business customers. Founded in 1992, it was the first company to market Linux for the enterprise. Founded in 1992, SUSE is the world’s first provider of an Enterprise Linux distribution. Today, thousands of businesses worldwide rely on SUSE for their mission-critical computing and IT management needs.
Mid-sized companies will be pleased with StorageCraft's low cost for this solution compared to others in the market. There are no startup fees, our solution has a predictable monthly cost, highly competitive pricing and offers ongoing value for our partners month after month. By enabling pooling and StorageCraft's 30-days of free virtualization the company removes several concerns surrounding machine size management and disaster recovery testing costs that add to the complexity of implementing a disaster recovery solution. In addition, their One-Click orchestration makes it simple to recover when needed, as all the work to setup a network and different connections is already complete.