Key Terms for Cloud Security
Cloud-based file storage and transfer can be great alternatives to insecure email or FTP, but you may have some questions about what features and security cloud service can offer. Here are some common terms that are essential to know when evaluating cloud service providers.
SaaS: Software as a service (SaaS) is a model for cloud computing where software and data are hosted remotely on the software provider’s servers. Users connect to the service via the Internet. Web-based email clients are a popular example of SaaS, allowing users to log in to their inbox from an Internet browser rather than opening an installed client on their desktop.
Uptime: Storing data in the cloud is only helpful if you can get to information when you need it. Cloud service providers should be able to give you an idea of how reliable their service has been in the past. Uptime guarantees should account for scheduled maintenance that may affect the availability of the service.
Encryption: Business-focused cloud services will have security measures in place to protect data from being intercepted or hacked. For peace of mind, make sure that your provider encrypts data during transfer to and from their servers. If you send, upload, or download information with the service, it should be protected. Many providers will also encrypt your information while it is at rest on their servers.
Data Portability: Business needs change, and you may find that you need to retrieve all of your data from a cloud provider someday. Ask providers if it is possible to completely remove your information should you no longer require the service or decide to move to a different provider.
While you continue to use the service, ensure that you can remove any data that is out of date or no longer in use. A service should allow you to completely remove files so that you don’t have information stored when it’s no longer necessary.
Redundancy: A cloud service provider should have detailed plans for managing disaster scenarios. While your own business may be tied to a specific location, many SaaS providers maintain multiple server locations and back up data for their primary servers to protect again data loss. Ask providers how they would manage a server failure to verify that they have the infrastructure to get the service back online in a reasonable timeframe.
BYOD: “Bring Your Own Device” has become a popular phrase. As consumers buy tablets and phones to increase connectivity, they naturally want to integrate work functions with their new mobile devices.
Businesses are smart to allow employees to use mobile devices for work. Working remotely can improve productivity and lead to a happier workforce. In order to take advantage of the benefits of convenient mobile work, companies can look into securing their mobile workflow so that data security is not compromised.
Visit ShareFile to learn more about how our secure, cloud-based file transfer solution can benefit your business.