Welcome!

@CloudExpo Authors: Elizabeth White, Zakia Bouachraoui, Liz McMillan, Yeshim Deniz, Pat Romanski

Related Topics: @CloudExpo, Microservices Expo, Containers Expo Blog, Agile Computing, Cloud Security, @DXWorldExpo

@CloudExpo: Article

Choosing a Cloud Protection Gateway Provider

Important information for your vetting process

As the proliferation of the cloud continues, Cloud Protection Gateways are increasingly being discussed as a way to address security issues surrounding cloud adoption. Whatever stage of cloud adoption your organization is in, a thorough vetting of the different gateways available will be important to address key security issues, including data residency concerns, industry compliance and internal security best practices.

Key Features of Cloud Protection Gateways
Cloud Protection Gateways will be an integral part of your cloud adoption strategy. These gateways are built to intercept sensitive data while it is still physically on the premise of an organization and replace it with a random tokenized or strongly encrypted value. This process renders the data meaningless should anyone attempt to hack the data while it's in transit, being processed or stored in the cloud. Choosing a provider means trusting that provider's technological capabilities and soundness.

Choosing a Gateway - An Inclusive Business Decision
Choosing a Cloud Protection Gateway Provider impacts multiple teams within your organization. The following groups bring a unique perspective and can provide valuable insights to the decision:

  • Security Team - security of data may be the primary reason the gateway is being acquired.
  • Governance & Risk Team - to ensure the gateway is in line with regulations and company policies (i.e., data privacy).
  • Information Technology Team - are typically involved with deployment and management of the selected gateway.
  • End User Team - they will be using the applications moved to the cloud and will be affected by any impact that gateway has on application functionality.

The Key Information to Gather from Gateway Providers
The Security Team

The security team will want to know the details about the type of underlying security techniques being used to protect your data, beginning with whether the security strategy is encryption or tokenization.

If the security technique is encryption, the security team will want to know what algorithms are used and whether they are proprietary or certified by strong standards such as NIST FIPS 140-2. The security team will also have specific questions about who keeps control of keys. Best practice is to keep that control in the hands of your enterprise. It's also important to know whether existing third-part encryption key management solutions can be used versus adopting a new system, and whether that would impact usability.

If tokenization is the security strategy, the security team will need a third-party evaluation of the tokenization technique used so your enterprise can be sure best practices and guidelines on the best ways to deploy and use tokenization are being followed.

Key Information for Other Internal Teams
In an upcoming blog post, we'll consider what other information is important to gather from the perspective of the Governance & Risk Team, Information Technology Team and End User Team. In the meantime, take a look at the specifics of the PerspecSys Cloud Encryption Gateway and how it can help your enterprise implement a robust and secure cloud adoption strategy.


PerspecSys Inc. is a leading provider of cloud protection and cloud encryption solutions that enable mission-critical cloud applications to be adopted throughout the enterprise. Cloud security companies like PerspecSys remove the technical, legal and financial risks of placing sensitive company data in the cloud. PerspecSys accomplishes this for many large, heavily regulated companies across the world by never allowing sensitive data to leave a customer's network, while maintaining the functionality of cloud applications. For more information please visit http://www.perspecsys.com/ or follow on Twitter @perspecsys.

Read the original blog entry...

More Stories By David Stott

As Senior Director, Product Management at PerspecSys, David Stott leads efforts to ensure products and services meet market requirements. he works closely with multiple internal teams and client stakeholders to develop excellent customer experiences and advance the strategic product direction. He is an experienced product management and marketing professional with a successful record of aligning market needs and opportunities with product requirements, functionality, and go-to-market strategies. David joined PerspecSys from Covarity and has also held product management and marketing leadership roles with Angoss Software, ADP, and Ironside Technologies.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


CloudEXPO Stories
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and share the must-have mindsets for removing complexity from the development process, accelerate application delivery times, and ensure that developers will become heroes (not bottlenecks) in the IoT revolution.
DevOps with IBMz? You heard right. Maybe you're wondering what a developer can do to speed up the entire development cycle--coding, testing, source code management, and deployment-? In this session you will learn about how to integrate z application assets into a DevOps pipeline using familiar tools like Jenkins and UrbanCode Deploy, plus z/OSMF workflows, all of which can increase deployment speeds while simultaneously improving reliability. You will also learn how to provision mainframe system as cloud-like service.
CloudEXPO New York 2018, colocated with DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI, Machine Learning and WebRTC to one location.
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
DevOpsSummit New York 2018, colocated with CloudEXPO | DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City. Digital Transformation (DX) is a major focus with the introduction of DXWorldEXPO within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term.