Knowledge Center Links

link to blogs
link to blog talk radio
link to newsletters
link to frequently asked questions
link to cloud glossary
link to cloud security
link to white papers
link to cloud cube
link to current events
link to important websites

Protecting Your Data

You must protect the confidentiality, integrity, and availability of your data:

  • Confidentiality means that only those people who are supposed to see their data can see it. In the military environment, that has two attributes: right to know and need to know, and you need both to be allowed to see data. Because I’m in marketing I have the right to see things like product plans, but because I’m not working on Project Alpha I do not have the need to see Project Alpha’s product plans. Depending on the importance and sensitivity of Project Alpha, you might want to make sure I can’t see its data.
  • Integrity means that only authorized processes are allowed to modify data and only in very specific ways. For example, it means that the transaction I send to the Cloud arrives unchanged at the service provider, and the response comes back to me unmodified. It means data stored in my archive hasn’t been changed while it is just sitting there for years.
  • Availability means that the data is accessible when needed. If in order to satisfy my customers I need to respond to them in less than a second, I need to make sure I can always get any required response from the Cloud in time to meet that need. Ignoring any Internet related delays, it takes over an eighth of a second to get an answer from the other side of the Earth. Adding those delays, it can be close to half a second.

Data is in three “places” and there are security concerns around each:

  • Data-in-motion as it moves through networks like Local Area Networks (LAN), wide-area networks (WAN), storage networks (SAN), and the Internet. The Cloud extends the distance of these networks.
  • Data-at-rest as it is stored in storage systems like SAN and NAS; local hard disks on workstations, laptops, tablets, and cell phones; and escapable media like thumb drives, CDs and DVDs. Data gets stored many times in archives, backup, disaster recovery sites, and email messages. The Cloud can increase the number and geographic dispersal of this stored information.
  • Data-in-process inside of a workstation or server. Virtualization and the Cloud increase the risk of that data being available to others.

Check out our security questions you should answer before you sign a contract with a Cloud Service Provider.

We can help. Contact Us with your questions.

 The Unisys Stealth Solution for Network is a tranformational way to protect your data-in-motion in the Cloud, and anywhere. Download a short presentation.