![]() |
In his #EMCworld keynote on Tuesday morning, Joe Tucci used the phrase “the sea of trust” to capture the pervasive role that security has to have in the success of the “third platform” of mobile, cloud and big data. It’s a great metaphor, reflecting not only the pervasiveness that security has to have, but also the dynamism and power that it needs to embrace. We had the opportunity to explore this new vision for security in our birds-of-a-feather session on “Building Your Trusted Cloud.” We talked about the threat landscape for cloud, security capabilities that cloud service providers should have, best practices in security for the cloud and in engaging with CSPs. And there were great questions that led us into topics that we hadn’t foreseen. One of the best of these questions was from Mike Versace of IDC, who asked “What are the big breakthroughs that will make a difference in cloud security?” Mike’s question was excellent because it challenged us to think about what really mattered in establishing and maintaining that sea of trust. RSA’s Rob Sadowski responded with the developments in GRC tools, best practices and standards that help you manage the risk inherent in moving data and workloads into private, hybrid or public clouds. RSA Software Engineer Matt Coles emphasized the embedding of data security capabilities into technology, like encryption built into storage. EMC infosecurity expert Davi Ottenheimer spoke to the critical developments in embedded security in the virtual infrastructure. Matthew Gardiner of RSA called out the importance of new developments in security visibility and analytics technologies. And EMC security consultant John McDonald spoke about the breakthroughs in risk-based authentication as critical to the mobile user environment. It was great to have such a range of breakthroughs recognized, especially because they also represented a good cut at the most essential capabilities for establishing trust in the cloud. Sure there’s lots of work still needed in making these breakthroughs fully effective. But the essential elements for establishing and maintaining the trusted cloud are here. Maybe that’s the biggest breakthrough of all. |
Update your feed preferences |
