Blog

Cloud adoption fosters need for database administration

Thanks to the cloud, mobile devices are now able to gain easy access to company data.

IT professionals throughout the world have debated how to best secure cloud servers from the malevolent figures looking to gain access to company data. Conventional firewalls primarily implemented for on-premise data centers haven't made the cut, leaving remote database support organizations to devise new ways of protecting the digital information belonging to their clients. 

Starting with the basic connections 
Before worrying about mobile communications, organizations need to ensure that in-house PCs and devices are not compromising data confidentiality. According to Rick Harvey, a contributor to Network Computing, many cloud providers believe their products to be secure because their data is encrypted. However, some vendors preoccupied with expanding storage capabilities often neglect where the key is held. 

"One cloud storage provider touts its server-side encryption as freeing customers from the hassle and risk of managing their own encryption and decryption keys," noted Harvey "In reality, this leaves the user's information vulnerable to snoops."

As a result, many cloud providers employ server-side security to maintain control of the system, which requires them to protect every data-hosting asset a client may own, from disks to routers. A favorable option entails having database administration maintain an in-house presence, allowing them to gain a better understanding of a client's networking assets. 

Ultimately, familiarity with the company's server landscape will give database experts the ability to move past the basic infrastructure and client-side security. Although entrusting them with the encryption keys may seem risky, assigning one person to protect one key is a better option than trying to secure a collection of three dozen. 

Mobile's not going away, so secure it 
Business employees feel empowered by their ability to read and edit company documents on their smartphones. However, being able to do so means that they're creating avenue by which a malicious figure could exploit and gain access to sensitive corporate material. A common problem for the average IT department lies in managing all the different remote user logins. 

CSO magazine reported that NetIQ recently developed what it believes to be a solution to the latter problem. Ian Yip, a security specialist with the company, told the source that the new tool, MobileAccess, enables secure access through a single touch from iOS or Android mobile devices to essential business services and data. 

"If a user has access to an on-premise instance of SAP and an account with Office 365, log in with a single sign on to MobileAccess will authenticate users to those services," the article stated. 

The program is sure to assist remote DBA experts looking to provide security for clients utilizing mobile communications. 

You can follow any responses to this entry through the RSS 2.0 feed. Both comments and pings are currently closed.

Comments are closed.