Starting in 1996, Alexa Internet has been donating their crawl data to the Internet Archive. Flowing in every day, these data are added to the Wayback Machine after an embargo period.
Starting in 1996, Alexa Internet has been donating their crawl data to the Internet Archive. Flowing in every day, these data are added to the Wayback Machine after an embargo period.
TIMESTAMPS
The Wayback Machine - https://web.archive.org/web/20160128080342/http://searchcloudstorage.techtarget.com:80/answer/How-is-cloud-data-loss-prevention-changed-by-shadow-IT
Enjoy this article as well as all of our content, including E-Guides, news, tips and more.
Step 2 of 2:
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
or hard drives. But cloud data loss is now impacting the data center due to shadow IT -- the unauthorized use by members within an organization of cloud services. It presents a unique challenge; the service is clearly something that users want, so IT needs to provide a controlled version.
The most common shadow IT services that contribute to cloud data loss are cloud-based file sync and share, cloud backup and public cloud-based email. These services are typically used to sync and protect data across their various devices or to provide more convenient access to email. While the use of these services may be legitimate and not intended to be harmful to the organization, it can also lead to data loss.
The first step in addressing cloud data loss due to shadow IT is to offer similar services to users but use solutions that have IT operational controls.
For example, a file sync-and-share product that uses the public cloud is very easy to sign up for to share data across devices and between users. The problem is that sharing occurs without the knowledge of IT. Shares can be set up with other organizations that may be competitors. When a user leaves the organization, the sync may be terminated but all the data that was on their devices stays with them.
The first step in cloud data loss prevention with respect to shadow IT is to offer similar services to users but use solutions that have IT operational controls. The end-user interface needs to be as good as the commercially available programs. At the same time, IT control needs to provide capabilities like notification of external sharing, blocking of certain types of sharing and remote wipe.
The second step is to implement a reporting system that will continuously scan the environment to look for unauthorized use of cloud services. This reporting is essential because it is difficult to block non-supported devices arbitrarily. There may be legitimate use cases, and cloud services appear so quickly it is almost impossible to block them all. Reporting alerts the IT professional to the potential breach and then they can take action from there.
Cloud storage doesn't just have to be for backup. According to George Crump, cloud services can make deploying a new application or disaster recovery...continue reading
George Crump asks:
How do you prevent data loss in your cloud storage environment?
0 Responses So Far
Join the Discussion1 comment
Oldest Newest