Iron Clad Data Protection in Multi-Tenant Cloud Environments

As enterprise cloud adoption matures, security, privacy, control, and visibility are becoming paramount for corporate IT.

In a multi-tenant cloud environment, data privacy and data security have become even larger issues. Key escrow management (deciding who manages and holds the encryption keys) is a critical strategic decision. If the wrong person within the cloud provider’s environment is given access to the customer’s data, a serious security breach can be the result.

File encryption by itself is not sufficient for adequate data security. Logging and auditing of user actions are fundamentals. Comprehensive data protection involves building a new management layer around the infrastructure to abstract that infrastructure while still providing visibility, tracking and control.  Authorizations must be regulated, limits and quotas must be set, and access rights and permissions set for actions such as starting or terminating virtual machines.  It is also essential to generate alerts, notifications, and API calls.

In this webinar, a panel of experts will examine infrastructure security needs. The discussion will provide a framework for addressing the data protection and privacy gaps and include metrics that can help businesses benchmark the success of their investments. The webinar will also present real-world case studies and cloud data protection best practices.

Join Gigaom Research and our sponsor, Dell Software, for “Iron Clad Data Protection in Multi-Tenant Cloud Environments”, a free analyst roundtable webinar, originally live on Tuesday, October 14th, 2014 at 10:00 a.m. PT. Register to view on-demand.

What will be discussed:

  • What data security and data privacy gaps need to be addressed to architect a secure data protection cloud environment?
  • How do the data protection needs and tolerances of enterprises in multi-tenant cloud-based environments differ from on-premises environments?
  • What are common points of breakage for the enterprise security posture in a complex or multi-cloud environment?
  • What factors are critical to provide comprehensive data security for public cloud environments?
  • What can businesses learn from companies that have experienced data loss in multi-tenant cloud environments?

Who should attend:

  • CIOs, CISOs, and CTOs
  • IT decision-makers
  • Infrastructure and Security architects