{"id":24109,"date":"2014-06-21T00:41:00","date_gmt":"2014-06-21T04:41:00","guid":{"rendered":"http:\/\/www.opensource.im\/?p=24109"},"modified":"2014-06-21T00:41:00","modified_gmt":"2014-06-21T04:41:00","slug":"cloud-encryption-best-practices-for-financial-services","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/cloud-encryption-best-practices-for-financial-services.php","title":{"rendered":"Cloud Encryption Best Practices for Financial Services"},"content":{"rendered":"<p><p>      In many industries, cloud computing is now vital to remaining      competitive. The cloud typically offers superior flexibility,      scalability, accessibility, and high availability, enabling      businesses to grow more agile and responsive. Regulatory      compliance concerns often make banks and other financial      service providers slower to adopt the cloud, but even in the      financial services industry, the cloud will soon become a      necessity.    <\/p>\n<p>      Banks are already seeing attractive use cases for cloud      computing, as Bank Systems & Technology's Bryan Yurcan      and Jonathan Camhi       pointed out late last year. Cloud-based payment      processing is one hot topic. Cloud-based document management      is another. Analytics for business insight and fraud      detection are also growing popular. However, all of these      applications will require a thorough understanding of the      regulatory restrictions and how to comply with them.      One of the most essential tools to make sure your cloud      adoption meets regulatory requirements is cloud data      encryption.    <\/p>\n<\/p>\n<p>      What to Protect      PCI DSS mandates the protection of customer account data,      which you'll need in order to process payments in the cloud.      Per       PCI DSS 3.0, that data includes:    <\/p>\n<p>      PCI DSS requires organizations to \"use strong cryptography      and security protocols\" for the transmission of sensitive      cardholder information. Some of these fields are more      sensitive than others, however. PANs are more sensitive than      expiration dates, for example, while verification codes and      PINs are so sensitive that PCI DSS outright forbids the      storage of them after the transaction is completed. Your      cloud data encryption strategy should include the ability to      apply varying strengths of encryption at a granular,      policy-based level so that you can apply the appropriate      amount of protection to each data type.    <\/p>\n<p>      Here are some best practices that can help you use cloud data      encryption to safely make the most of the cloud.    <\/p>\n<p>      Cloud Data Encryption Best Practices    <\/p>\n<p>      Use cloud data encryption that preserves your cloud      application functionality To enjoy      the benefits of cloud computing, develop a cloud data      encryption strategy that secures your data but also preserves      the functionality of the cloud applications you've chosen.      Tools like CipherCloud's Searchable Strong Encryption can      help, as can encryption and tokenization schemes that retain      the original format of the data while hiding the actual      values.    <\/p>\n<p>      How does your organization use cloud encryption to remain      compliant? Let us know your thoughts in the comments    <\/p>\n<p>      Paige Leidig is SVP at CipherCloud. He has 20 years of      experience in technology, marketing, and selling enterprise      application solutions and managing trusted customer      relationships. As SVP of Marketing, he is responsible for all      aspects of marketing at CipherCloud. Paige was previously in      the Office of the CEO at SAP, where he was responsible for      leading and coordinating SAPs acquisition and integration      activities on a global basis. He has managed a number of      marketing initiatives at SAP, including responsibility for      all go-to-market activities for SAPs Cloud applications      portfolio. Preceding his SAP career, Paige held senior      management positions with Ariba, Elance, and E*Trade.    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See more here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/linux.sys-con.com\/node\/3108291\/RK=0\/RS=cwzR6imgDzF4bFyCiUZ0HAdIZUU-\" title=\"Cloud Encryption Best Practices for Financial Services\">Cloud Encryption Best Practices for Financial Services<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> In many industries, cloud computing is now vital to remaining competitive. The cloud typically offers superior flexibility, scalability, accessibility, and high availability, enabling businesses to grow more agile and responsive. Regulatory compliance concerns often make banks and other financial service providers slower to adopt the cloud, but even in the financial services industry, the cloud will soon become a necessity<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-24109","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24109"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=24109"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24109\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=24109"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=24109"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=24109"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}