Saturday, February 17, 2018
Home » Security and Compliance » Security & Compliance » Introducing our 5in15 Webinars

Introducing our 5in15 Webinars

Welcome to the first installment of our 5in15 Webinars, where we run through five slides of information in 15 minutes. These quick presentations are designed to share information about products or thoughts in the industry. Our debut episode takes a look at something that’s always top of mind for the enterprise: security within cloud deployments.

Gone are the days of a strict nine-to-five work environment. Nowadays, we live in a world of flexible work schedules and 24-hour businesses. That can result in difficulties with enterprise IT—a common issue is remote access users, such as quality assistance or UI developers, needing access to AWS or other cloud resources in a secure manner. It’s not an easy thing to grant, and we’ve seen this challenge in a number of areas. That’s why we’ve partnered with FortyCloud to provide a solution: 2Factor Secure Cloud Access for AWS.

Before discussing the solution, though, it’s important to take a look at some of the problems and challenges of transitioning to the cloud:

  • The security processes, tools and standards in traditional IT environments don’t necessarily translate to the public cloud.
  • The concern of giving up control of an organization’s data is still high.
  • It’s not easy to create, manage and distribute credentials, especially with a third party involved. Those credentials often grant access to the underlying network to all users.

These problems create a ripple effect: due to security concerns, enterprises are unable to take full advantage of the public cloud’s benefits, including power, flexibility and scalability. Current work arounds often increase latency by introducing proxies or multiple network hops and can bring about all sorts of access issues.

Our 2Factor Secure Cloud Access for AWS aims to put these fears at ease. It integrates Datapipe Auth – a centrally managed two-factor authentication solution requiring a password and pin – with FortyCloud’s software-as-a-service (SaaS) security model, delivering enhanced security, access, and control to clients operating AWS environments. And rather than giving every user the same amount of access, it adds identity-based firewall access and user VPN to AWS with Roles Based Access Control (RBAC) and Management. In essence, this solution gives users network-based access control to a cloud environment.

Things can get a bit more complex in AWS environments, where we have to consider policies and size of deployment. With FortyCloud, we help users access data securely, regardless of their location. The goal, of course, is to provide not only improved security, but also enhanced control and greater compliance. The public cloud shouldn’t lose any of the traditional IT security standards, and it won’t with 2Factor Secure Cloud Access. This product also ends common hacking practices, like brute force or password phishing, by removing the risk of password compromise. And customers can remain in the driver’s seat, as administrators are able to control, monitor and report on employee remote access.

There are a number of challenges and obstacles in the enterprise. Security shouldn’t be one of them. For more information, please visit our 2Factor Secure Cloud Access page. You can view the full 5in15 webinar below, and feel free to give us a shout on Twitter with any questions or insights using the hashtag #DP5IN15.

About David Lucky

David Lucky
As Datapipe’s Director of Product Management, David has unique insight into the latest product developments for private, public, and hybrid cloud platforms and a keen understanding of industry trends and their impact on business development. David writes about a wide variety of topics including security and compliance, AWS, Microsoft, and business strategy.

Check Also

Navigating Public Cloud Compliance in Singapore: Working with the Right Vendors is Key

The MAS compiles a comprehensive list of recommended control mechanisms to meet strict requirements. While this list may seem daunting, many of these control mechanisms can be addressed by the well-developed products and services provided by leading vendors such as AWS and Datapipe.