Ensuring Security in the Cloud

BLOG: Security has been cited in numerous studies as the number one inhibitor to cloud adoption, but in fact, a good cloud vendor is likely to protect your data better than you would be able to do using your own resources. Here’s why. By Neil Titcomb, UK and Ireland Cloud Sales Director at Genesys.

Contact Centre CLUB

Control doesn’t necessarily mean secure

The main issue identified with cloud security is that data is stored on servers a company doesn’t own or control – but control does not necessarily equal security in this instance. Cloud computing offers a level of physical and electronic security that an on-site server or locked file cabinet cannot even begin to approach.

A reputable cloud vendor will ensure only authorised people have access to company data, and identity verifications will be used throughout. As well as this, vendors protect data in a multitude of ways:

Physical Security – maintaining service levels

• Cloud vendors will use back-up power supplies, so there will be no chance of your data disappearing should there be a power outage.
• Cloud vendors work with a number of internet service providers, so if one fails or is performing poorly, there will always be others available. The same is used for the hard drives – multiple are used, so if one fails, another hard drive can take its place to ensure continuous service delivery.
• Data is replicated in multiple locations, so in the case of a fire/flood or any other kind of disaster, you know your data will be safe.

Application Security – ensuring only authorised access

• Firewalls and anti-virus detection software will be used on all of the devices used to store your data.
• Data is always encrypted, so even if someone were to get hold of the data, it would be impossible for them to use it in any way.
• Administrative controls will be in place, preventing access to certain files and ensuring only authorised personnel will be able to get hold of your data.
• Security audits will be undertaken by providers, where they will hire professional hackers to try and hack into their applications and to provide audit reports with their findings, to ensure no one unauthorised can gain access to the data stored within.