As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. Enterprises must protect their data from (1) system administrators who don’t need to see the data in the clear and (2) adversaries who become system administrators from stolen credentials. In short, enterprises must take control of their data: The best way to do this is by using advanced encryption, centralized key management and cutting edge access controls and policies.
When an outside party owns, controls, and manages infrastructure and computational resources, how can you be assured that sensitive data remains private and secure, that your organization is protected from damaging data breaches, and that you can still satisfy the full range of reporting, compliance and regulatory requirements?