{"id":4862,"date":"2012-11-29T14:16:00","date_gmt":"2012-11-29T14:16:00","guid":{"rendered":"http:\/\/cloudcomputing.sys-con.com\/node\/2464514"},"modified":"2012-11-29T14:16:00","modified_gmt":"2012-11-29T14:16:00","slug":"gartner-highlights-cloud-data-encryption-gateways","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/gartner-highlights-cloud-data-encryption-gateways\/","title":{"rendered":"Gartner Highlights Cloud Data Encryption Gateways"},"content":{"rendered":"<p>Last month Gartner Analyst Jay Heiser conducted an extremely informative and thought-provoking webinar entitled \u201cThe Current and Future State of Cloud Security, Risk and Privacy.\u201d During the presentation, Mr. Heiser highlighted what he called the \u201cPublic Cloud Risk Gap,\u201d characterized in part by inadequate processes and technologies by the cloud service providers and in part by a lack of diligence and planning by enterprises using public cloud applications. In many ways, it was a call to arms to ensure that adequate controls, thought and preparation are put to use before public clouds are adopted by enterprises and public sector organizations.<br \/>\nFrom the side of the cloud application provider, the webinar noted that most cloud service offerings are incomplete when measured against traditional \u201con-premise\u201d security standards, there are relatively few security-related Service Level Agreements (SLAs), and there is minimal transparency on the security posture of most cloud services. From the enterprise side (the cloud service consumer), he points out that they frequently come to the table with inadequate planning and consideration in the area of security requirements definition and have an incomplete data sensitivity classification governing their data assets. Despite this, the webinar highlighted that organizations of all sizes are increasingly willing to place their data externally, and they are increasingly likely to have at least some formalized processes for the assessment of the associated risk \u2013 which is good news.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/2464514\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last month Gartner Analyst Jay Heiser conducted an extremely informative and thought-provoking webinar entitled \u201cThe Current and Future State of Cloud Security, Risk and Privacy.\u201d During the presentation, Mr. Heiser highlighted what he called the <\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-4862","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/4862","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=4862"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/4862\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=4862"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=4862"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=4862"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}