Cloud Security Week in Review: ThreatTrack Security, Box, The Sixth Flag
February 13, 2016
Cloud Security this week took strong note of a ThreatTrackSecurity report that has identified the technical challenges business managers face when trying to secure their networks. The launch of Box (News - Alert) KeySafe takes on the task of assisting businesses with those types of challenges, and The Sixth Flag has begun to apply its Cell Structure Security to its workspace-as-a-service program.
ThreatTrack Security recently partnered with Opinion Matters to conduct a survey of 207 IT managers, all security professionals, to determine their collective technical challenges of securing the digital data of their respective workforces. Most notably, 56 percent of the managers reported that the complexity of dealing with malware was the most difficult challenge before them. The volume of malware also appears to play a significant role in this issue. Problems can stem from device usage, especially mobile devices, in ways a business would not intend, such as sharing devices with family members or visiting elicit websites while linked to corporate networks. In any case, ThreatTrack notes that many organizations need to better address the use of multiple devices on company networks and firm up the security tools they use to combat malware.
Cloud storage company and software developer Box is responding to a similar threat – a rise in ransomware attacks – with the introduction of Box KeySafe. This new service gives enterprises control over their public encryption keys by giving them secure storage in the cloud created for that purpose. It offers independent control from users, unchangeable usage policies, audit logs, and a simple user interface to encourage consistent use. It can link with Amazon Web Services or act as a stand-alone service for any keys Box users need to manage.
Finally this week, TMC (News - Alert) has addressed the topic of cloud security by noting the latest product launch from The Sixth Flag, which has now applied its Cell Structure Security to its workspace-as-a-service program. Cell Structure Security works to isolate all elements of a network, including user actions, to gain control over everything that happens within a business’s digital existence. It scrambles the credentials of every session of every user and encrypts all data that each user accesses within a session. When session have expired or tasks have been completed, any temporary data is destroyed.
This approach means to secure data from any origination point to any ending point. Between clouds, data remains encrypted, and when in-transit data reaches another cloud, it becomes subject to the same containerization it experienced before being sent. Company CEO Pete Kofod said his company was founded on military principles such as granular control of elements. These concepts have reportedly translated well into The Sixth Flag security protocols now positively affecting business operations outside the military.
Article comments powered by