Effective cloud security

July 2016 Surveillance, Information Security

Using the cloud for services and data storage is a common solution for many companies today, but we hear about breaches and hacking almost every day. With this state of affairs, is the cloud a reasonable option?

Mayleen Bywater, senior product manager for security solutions at Vox Telecom answers a few questions about the sensitive issue of security when it comes to cloud services – specifically security services.

What is the current state of cloud services when it comes to security, especially surveillance?

Bywater: Cloud computing is becoming a serious feature with regards to surveillance. Businesses which previously did not have the correct security measures in place, are now adopting cloud solutions as the need for more holistic security increases. There is much to be considered when it comes to surveillance, however, and questions inevitably arise around who has the right to monitor whom, and what the acceptable parameters are as far as surveillance goes. For this reason, the cloud in its current state is constantly evolving and it will be some time before it is clearly defined.

What questions do users need to ask of their cloud provider?

Bywater:

a. Are there policies in place to safeguard data, what are these?

b. Which policies, as a business, should I have in place to protect data internally?

c. Where is my data stored?

d. Who has access to my data?

e. Can I access the audit logs?

f. What authentication is used to verify the person accessing my data?

g. Are systems updated continuously? Do you upgrade/ maintain in batches when necessary or do you rely on yearly updates as they roll out?

h. Do you research the latest threats that are target driven and how soon do you implement fixes to ensure the environment is secure?

Who offers these services and what are the benefits for users?

Bywater: Larger ISPs are likely to offer hosted services, the benefits include:

• No costly CAPEX.

• Ease of access to maintenance updates.

• Access to IT skills that may not be available in-house.

• Affordable model, where you can keep upgrading your environment.

• Maximise in house IT skills to benefit your company more efficiently.

• Solution which grows with your business needs.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

AI human detection cameras vs outdoor detectors
Provision ISR SA Surveillance
The advancement of technology has revolutionised many aspects of security systems, notably in the transition from traditional outdoor alarm detectors to modern, AI-based, human-detection IP cameras, which offer many benefits.

Read more...
Safeguarding farmland with digital solutions
Axis Communications SA Surveillance
Marlenique Estate, located in the Western Cape, opted for an Axis end-to-end solution to protect its premises with access management, remote monitoring, and property and asset protection.

Read more...
There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.

Read more...
Addressing today’s mining challenges: cyber risks beyond IT
Editor's Choice Information Security Mining (Industry)
Despite the mining industry’s operational technology systems being vulnerable to cyberattacks, many decision-makers still see these threats as purely an IT issue, even though a breach could potentially disrupt mining operations.

Read more...
How to effectively share household devices
Smart Home Automation Information Security
Sharing electronic devices within a household is unavoidable. South African teens spend over eight hours per day online, making device sharing among family members commonplace. Fortunately, there are methods to guarantee safe usage for everyone.

Read more...
Cutting costs and enhancing security
Secutel Technologies Surveillance
[Sponsored] Visual verification, powered by the Secutel Visual Verifier, detects and verifies intrusions and physical attacks and ensures comprehensive protection in areas where high-value losses are at risk.

Read more...
Supercharge surveillance with AXIS Camera Station Pro
Duxbury Networking Surveillance Products & Solutions
Designed to put efficient surveillance at users’ fingertips with an intuitive interface that is easy to operate, AXIS Camera Station Pro 6.2 provides a customisable video management and access control solution for companies of all sizes.

Read more...
Fortinet establishes new point-of-presence in South Africa
News & Events Information Security
Fortinet has announced the launch of a new dedicated point-of-presence (POP) in Isando, Johannesburg, to expand the reach and availability of Fortinet Unified SASE for customers across South Africa and southern African countries.

Read more...
New tools for investigation and robust infrastructure security
News & Events Information Security
Cybereason continues to enhance its security platform, with recent updates introducing improvements in file search operations, investigation query results, and cloud workload protection, providing more granular data and faster key artefact identification.

Read more...
Easy, secure access for student apartments
Paxton Access Control & Identity Management Surveillance
Enhancing Security and Convenience at Beau Vie II Student Accommodation, a student apartment block located at Banghoek Road, Stellenbosch, with Paxton's access control and video management solution

Read more...