Several tools and services have been developed to tackle different cloud security issues. I have chosen the top 5 tools and services that are being used by many companies and companies relying on cloud services. These tools include Bitglass, Netskope, Skyhigh Networks, Okta, and CipherCloud. Unfortunately, all these tools are commercial and should be purchased for a business to use them. Besides, they have one-month trial periods. Businesses can make use of this grace period before deciding to implement them in their cloud services such as devices and applications. I selected specifically these 5 tools since they tackle and offer a solution to the security of data posed by cloud computing. Skyhigh Networks, CipherCloud and Netskope tackle ITshadow problem. Bitglass service offers encryption of data and also assists in monitoring data of business regardless of geographical area. For multifactor authentication and automated user management, Okta is the best tool (Kausik, 2015).
Describe each tool
A tool used to offer transparent data protection for every business. It’s applicable both in mobile and computer applications, it maintains visibility oof data as well as reducing the loss of data in mobile devices and also in the cloud.
When it is time to discover, analyze and secure cloud apps usage, Skyhigh Networks is the correct tool. It capitalizes logs from the business implemented firewalls, gateways, and proxies to find out employee’s activities within the premise.
This is a service used in discovering and monitoring network-related services such as shadow IT and applications of a cloud. It provided detailed information based on the analysis carried out from downloaded content, user sessions and details of shared content.
It is a secure cloud-based tool that encrypts or tokenize data directly to the gateway of the business. CipherCloud tool’s main objective is ensuring data security stored within well-defined cloud platforms (JIN, H. M. (2012).
Okta is a tool based on ensuring all the cloud services that include mobile and on-premises apps are implemented with secure Single Sign-On. The tool has been pre-integrated with applications that are common to many businesses, the applications are salesforce, google, and others (Latif, 2009).
Collect all features
- Single Sign-On (SSO)
- Integration of LDAP and Active Directory
- Multifactor authentication
- Detection of cloud apps usage.
- Adaptive access control
- Data encryption
- Threat protection
Justify why these are sufficient
Cloud computing has grown tremendously, and it has gain popularity very quickly resulting in many businesses migrating their services to the cloud. Computers and mobile applications in the cloud have raised security issues. Privacy of data, the security of devices and residency are among security issues facing cloud. Businesses consider data security as the first option before migrating their services to the cloud. The features mentioned above are sufficient since they cut across almost all security issues facing the cloud. These features can ensure data encryption, web filtering, secure login, encryption of cloud, multifactor authentication among others Krutz, (2010). Businesses can choose tools that meet their business security demands. On implementing these features, a business can significantly secure their applications and devices stored and connected to cloud up to 95%.
Measure the importance of the feature
|Single Sign ON||5%||Enables users to use the same credentials for multiple related services. Credentials falling on the wrong hands may lead to security issues.|
|Integration of LDAP and Active Directory||5%||Low cost since businesses can utilize available resources without incurring extra resources.|
|multifactor authentication||10%||Users are granted permission upon offering two data pieces.|
|detection of cloud apps usage.||15%||Businesses can detect and discover the usage of cloud services. Unauthorized usage can be detected|
|Data encryption||30%||Data encryption is the most important cloud security issue. Encryption ensures information has been secured and can’t be used anyhow.|
|Adaptive access control||15%||The feature detects and forbids unauthorizes access to cloud services and applications|
|Threat protection||20%||This feature ensures threats are detected, prevented and investigated hence offering protection integration.|
|Integration of LDAP and Active Directory(C2)||1||0||0||0||0|
|detection of cloud apps usage. (C3)||2||1||1||1||1|
|Adaptive access control(C4)||2||1||1||2||1|
|multifactor authentication (C6)||1||2||2||1||2|
Sky-high Networks service
Cipher Cloud tool
Upon evaluation of features and support for each cloud security application, Netscope scores the highest. It supports large cloud applications. It also carries out analytic of threats among other security solutions. Services offered by Netscope override the cost of implementing the tool. I would advise businesses to choose this tool as the first option.
- Kahol, A., Bhattacharjya, A. K., & Kausik, B. N. (2015). U.S. Patent No. 9,047,480. Washington, DC: U.S. Patent and Trademark Office.
- Vines, R. L. K. R. D., & Krutz, R. L. (2010). Cloud security: A comprehensive guide to secure cloud computing (pp. 35-41). Wiley Publishing, Inc.
- Mather, T., Kumaraswamy, S., & Latif, S. (2009). Cloud security and privacy: an enterprise perspective on risks and compliance. ” O’Reilly Media, Inc.”.
- WANG, L. F., SHEN, J., & JIN, H. M. (2012). Study on Application of Commercial Cipher Cloud Storage System [J]. Information Security and Communications Privacy, 11.