|By Marketwired .||
|May 21, 2014 06:00 AM EDT||
MCLEAN, VA -- (Marketwired) -- 05/21/14 -- Perspecsys, the leader in enterprise cloud data protection, today revealed a continental cloud divide between the U.S. and Europe, based on data findings from a study it conducted at the InfoSec Europe Conference. Perspecsys surveyed 117 IT professionals to determine that more than half (62%) of organizations believe using a European-based cloud is easier from a regulatory and compliance perspective. More than half (51%) of respondents even claimed that they do not fully trust U.S.-based clouds. The data points to the obvious misconceptions around deploying cloud computing in the states and overseas.
This continental cloud divide is evidenced by several instances; for example, last year concerns mounted after revelations of government surveillance programs by the NSA and others. The divide was confirmed again recently with the ruling from a U.S. judge who ordered Microsoft to provide emails to U.S. authorities, even email data that was stored in European-based data centers. Attendees at the InfoSec Europe Conference agreed that it's not a good situation: that fact that a U.S.-based company, despite location of its data center, can be required to hand over data regardless of where it is processed and stored. These are some of the reasons why an increasing number of European IT and security professionals are exploring the role that cloud data control gateways can play in helping them keep sensitive data local and resident within their home jurisdiction, even when adopting U.S.-based clouds.
Key findings from the study include:
- Cloud adoption is widespread -- 80% of InfoSec Europe attendees use some sort of cloud applications
- Many IT departments do not trust U.S.-based clouds:
- 47% believe their data is more secure contained in European-based versus U.S.-based clouds
- 62% believe that negativity toward U.S.-based clouds is justified, based on reports of the NSA having visibility into this data
- 59% do not believe that European-based government agencies conduct practices to the same extent as the NSA
In a study conducted at the 2014 RSA Conference, Perspecsys' findings indicated that companies are not being proactive enough when it comes to protecting sensitive data in the cloud. Solutions that can provide more control of data, even while adopting clouds from around the globe, are becoming popular methods of ensuring higher-levels of security and stricter adherence to compliance standards. This was seen by survey respondents as a critical element of their security program as confidence in U.S.-based clouds continues to fluctuate.
"The common thread throughout the conversations we had at InfoSec Europe was that there are legitimate concerns around the adoption and use of U.S.-based clouds," said David Canellos, CEO of Perspecsys. "The data from our survey confirms that organizations are taking a serious look at their cloud policies and questioning where their regulated data will be more compliant and secure. This issue is not going away anytime soon, in fact -- it's growing."
More than half of the professionals surveyed said they would store at least some of their data in European-based clouds even if data residency and privacy laws did not exist. But increasingly, enterprises are discovering that the Perspecsys AppProtex Cloud Data Control Gateway eliminates the compliance and security challenges associated with data control and access when they adopt the cloud -- regardless of where the cloud provider's data centers are located. The gateway can deploy encryption or the strongest form of tokenization -- a technique particularly aligned with the requirements defined in data residency and sovereignty regulations -- to enable data stored and processed in the cloud to remain fully compliant while ensuring cloud application users to have full use of cloud functionality such as searching, sorting and reporting on sensitive information that has been protected -- that allows companies to retain absolute control over confidential data and intellectual property.
An infographic highlighting the findings can be found here: http://perspecsys.com/cloud-trust/.
Perspecsys Inc. is a leading provider of cloud data control solutions that enable mission critical cloud applications to be adopted throughout the enterprise. Perspecsys gives organizations the ability to understand how employees are using cloud applications and take the necessary steps to protect sensitive information before it leaves the network. By removing the technical, legal and financial risks of placing sensitive data in the cloud, Perspecsys makes the public cloud private. Based in Toronto, Perspecsys Inc. is a privately held company backed by investors, including Intel Capital, Paladin Capital and Ascent Venture Partners. For more information please visit www.perspecsys.com and follow us on Twitter @Perspecsys.
Is your aging software platform suffering from technical debt while the market changes and demands new solutions at a faster clip? It’s a bold move, but you might consider walking away from your core platform and starting fresh. ReadyTalk did exactly that. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, will discuss why and how ReadyTalk diverted from healthy revenue and over a decade of audio conferencing product development to start an innovati...
Sep. 27, 2016 08:30 PM EDT Reads: 2,024
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
Sep. 27, 2016 08:15 PM EDT Reads: 2,219
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, will compare the Jevons Paradox to modern-day enterprise IT, e...
Sep. 27, 2016 07:30 PM EDT Reads: 2,140
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
Sep. 27, 2016 07:15 PM EDT Reads: 429
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
Sep. 27, 2016 07:00 PM EDT Reads: 2,849
Whether they’re located in a public, private, or hybrid cloud environment, cloud technologies are constantly evolving. While the innovation is exciting, the end mission of delivering business value and rapidly producing incremental product features is paramount. In his session at @DevOpsSummit at 19th Cloud Expo, Kiran Chitturi, CTO Architect at Sungard AS, will discuss DevOps culture, its evolution of frameworks and technologies, and how it is achieving maturity. He will also cover various st...
Sep. 27, 2016 06:45 PM EDT Reads: 1,810
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
Sep. 27, 2016 06:30 PM EDT Reads: 3,562
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
Sep. 27, 2016 06:30 PM EDT Reads: 2,193
SYS-CON Events announced today that Niagara Networks will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
Sep. 27, 2016 06:15 PM EDT Reads: 382
SYS-CON Events announced today that Secure Channels will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The bedrock of Secure Channels Technology is a uniquely modified and enhanced process based on superencipherment. Superencipherment is the process of encrypting an already encrypted message one or more times, either using the same or a different algorithm.
Sep. 27, 2016 06:00 PM EDT Reads: 1,696
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
Sep. 27, 2016 05:45 PM EDT Reads: 1,658
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning...
Sep. 27, 2016 05:30 PM EDT Reads: 2,014
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Sep. 27, 2016 05:15 PM EDT Reads: 2,766
If you had a chance to enter on the ground level of the largest e-commerce market in the world – would you? China is the world’s most populated country with the second largest economy and the world’s fastest growing market. It is estimated that by 2018 the Chinese market will be reaching over $30 billion in gaming revenue alone. Admittedly for a foreign company, doing business in China can be challenging. Often changing laws, administrative regulations and the often inscrutable Chinese Interne...
Sep. 27, 2016 05:15 PM EDT Reads: 303
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
Sep. 27, 2016 05:00 PM EDT Reads: 1,598