More than half of sensitive data has moved to the cloud, and there is a furious battle between the cloud providers to win over the remaining enterprise data. In order to overcome objections and concerns about data security and compliance, the cloud providers have added a multitude of encryption, key management, and hardware security module (HSM) services and APIs to the cloud offerings. These solutions are proprietary and typically have unique names, differentiating capabilities, limitations, and abbreviations! Where does an IT and compliance professional begin to understand the options available to them? A good start is learning from the panel of experts we have assembled to decipher the cloud providers' acronyms and services.
The takeaways for this training include:
• Trends that created the broad need for cloud security options
• Definition and architecture of leading cloud provider offerings
• Status of standardization for cloud key management
• Demonstration of multi-cloud key life cycle management
• Questions answered live with panel of experts