Prime Factors’ Hosts Educational Webinar on Cloud Encryption & Data Privacy

Share Article

Register for “Your Key to Safe Cloud Computing” Presented by Prime Factors, Inc., on Tuesday, October 28, at 1 PM Central, at http://www.primefactors.com/webinars, for a discussion of cloud encryption to protect data privacy

Ease EMV-migration with Prime Factors' Bank Card Security System (BCSS)

Prime Factors, Inc.

Good, fast sources of strong encryption calculation are abundant. Managing the encryption keys in a manner that prevents anyone at the cloud provider from having access to them is the real challenge.”

Migrating data processing from in-house to the cloud has compellingly attractive financial benefits. The massive economies of scale enjoyed by third party cloud capacity providers dwarfs what is available to any individual company. Prime Factors presents an educational webinar on Tuesday, October 28, at 1 PM Central, discussing strategies for migrating to the cloud without putting sensitive or regulated data at risk. “Your Key to Safe Cloud Computing: Key Management, Data Protection, and the Cloud” discusses the means by which enterprises can use cloud encryption to protect data privacy, without ceding control of encryption keys to the third party cloud providers.

Avoiding migration to the cloud when others in a market are doing so puts an enterprise at a cost-competitive disadvantage. However, no organization can consider migration to the cloud without immediately confronting the risks it entails. Massive organizations with well-funded infrastructures and dedicated staff are being breached weekly, and shifting responsibility for data protection to a third party, no matter how large or competently staffed, only increases the risk of exposure.

“The issues of committing to a third party service provider for the processing of sensitive data is not new,” says Prime Factors’ Vice President Jeff Cherrington. “That model has been in play since the 1960’s, at least, when time sharing on mainframes was state-of-the-art. What has changed is the degree of IP connectivity of all systems, and the ease with which criminals can access valuable data without ever showing their face, or putting themselves at direct risk. This change exists for in-house data centers and is magnified when processing is performed in the multi-tenant, geographically mobile cloud data center.”

The session will discuss, among other topics:

  •     The sources of threats to valuable data that process in the public cloud
  •     Differences in public cloud architectures and how they bear on threats & mitigations
  •     Best practices for cloud encryption recommended by authorities
  •     Practical implementation strategies such best practices impose

“The encryption part is easy,” continues Cherrington. “Good, fast sources of strong encryption calculation are abundant. Managing the encryption keys in a manner that prevents anyone at the cloud provider from having access to them is the real challenge.”

Join Prime Factors' Cherrington and Sr. Software Engineer Keith Bucher for an informative discussion and live question/answer session. Register at http://www.primefactors.com/webinars.

###

ABOUT PRIME FACTORS
Prime Factors, Inc. Prime Factors develops and markets enterprise encryption and centralized cryptographic key management platforms for integration into enterprises applications, demonstrating more than 30 years’ of success. It serves clients primarily in the banking & financial industry, as well as in high technology, healthcare, manufacturing, and retail. For more information, visit http://www.primefactors.com

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Jeff Cherrington

Tamie Millis
Prime Factors, Inc.

Visit website