A message from Jim Reavis, Chief Executive Officer of Cloud Security Alliance:

Dear CSA Membership,

As we enter into our 6th year of operation, we are seeing tremendous growth in enterprise usage of cloud computing. When we started CSA, cloud was often being used as a pilot or prototype for future IT systems. Clearly the future has arrived, and cloud computing is a pervasive presence and often the dominant force in enterprise IT.

Many examples of the maturation of cloud were on display at the recently concluded CSA Congress. There were many terrific presentations and sidebar conversations about security lessons learned at our most heavily attended Congress yet. Many of these presentations are now online and available at the URL at the bottom of this message.

Much of the innovation that is required to make your adoption of cloud secure and aligned with your risk posture is coming from the CSA corporate members. We would like to thank the CSA corporate members who sponsored CSA Congress and encourage you to learn how you can partner with these organizations to secure your cloud adoption roadmap.

Accellion, Inc. is an award-winning private company that provides mobile solutions to enterprise organizations to enable increased business productivity while ensuring data security and compliance. As the leading provider of private cloud solutions for secure file sharing, Accellion offers enterprise organizations the scalability, flexibility, control and security to enable a mobile workforce with the tools they need to create, access and share information securely, wherever work takes them. More than 12 million users and 2,000 of the world’s leading corporations and government agencies use Accellion solutions to increase business productivity, protect intellectual property, ensure compliance and reduce IT costs.www.accellion.com

Adallom is a SaaS security company founded in 2012 by alumni of the Israeli Intelligence Corps. We focus on evolving the way enterprises secure information in SaaS by monitoring all activity, detecting unauthorized access, and protecting users in real time. Adallom is the only SaaS security company to have defeated targeted SaaS attacks in the wild by applying advanced machine learning to real time user activity monitoring. We are members of Microsoft’s MAPP (Microsoft Active Protections Program), and would love to work with you on securing your company’s SaaS investment. www.adallom.com

Backupify is the leading provider of backup and recovery solutions for Software-as-a-Service (SaaS) applications. As more data, services and organizations migrate from local hard drives to the always-on cloud, Backupify is pioneering the protections and processes that will keep your irreplaceable online information safe, useful and under your control. More than 5,000 businesses and 200,000 users trust us to backup their data — with more signing up every day.www.backupify.com

Brainloop is the market-leading provider of highly intuitive SaaS solutions that enable our customers to securely manage and collaborate on confidential documents and information, whether inside or outside of their IT environments. When we founded the company in 2000, we saw businesses making major gains in productivity and competitiveness by using the Internet to collaborate with external partners. But the same tools that made collaboration so effective also wreaked havoc on the security and control over information distribution that companies relied on. A lot of companies tried to bring security and collaboration together by using virtual data rooms, but fell short on policy compliance. We saw a need to go beyond that, to create an easy-to-use online platform that companies can use to roll out their confidentiality policies so that users are automatically in compliance, every time they share a document. www.brainloop.com

Booz Allen Hamilton
Booz Allen Hamilton has been at the forefront of strategy and technology consulting for nearly a century. Providing a broad range of services in strategy and organization technology, operations and analytics. Booz Allen is committed to delivering results that endure. Booz Allen’s information assurance, privacy and security experts help clients develop a comprehensive privacy management approach that meets their business needs and minimizes risk. Our recognized leaders partner with clients to balance privacy needs with other critical IT management priorities, delivering solutions and tools to accommodate all facets of an organization’s business operations. www.boozallen.com

BSI’s comprehensive approach creates a gateway to excellence for your organization. Our training, assessment services and software enable your business to continually improve. BSI’s internal and lead auditor training provides an understanding of the rigors of management system standards and how to ensure compliance. Our assessments offer independent audits of your adherence to these standards. BSI’s configurable, web-based software solution, Entropy™, automates risk management, document control, audit, and compliance, performance and incident management, effectively managing the drive for excellence across the organization. From the decision to improve systems through to registration and continual improvements, BSI is your business improvement solutions partner. www.bsi-entropy.com

CipherCloud, the leader in cloud information protection, enables organizations to accelerate their adoption of cloud applications while ensuring visibility and control of their data. CipherCloud delivers data privacy, regulatory compliance, and data residency in the Cloud through an open platform that provides comprehensive data discovery, protection – search strong encryption, tokenization, data loss prevention, key management, and malware detection – and activity and anomaly monitoring services. www.ciphercloud.com

Elastica is the innovator of Data Science PoweredCloud™ Application Security. Its CloudSOC™ solution empowers the elastic enterprise, and enables companies to confidently leverage cloud applications and services while staying safe, secure and compliant. Elastica Apps on extensible CloudSOC™ platform today offer cloud audit for Shadow IT, granular transaction visibility, threat detection, security controls and post-incident forensic analysis. Elastica is venture-backed by the Mayfield Fund and is headquartered in San Jose, CA. www.elastica.net

Experian Data Breach Resolution, powered by the nation’s largest credit bureau, is a leader in helping businesses plan for an mitigate consume risk following data breach incidents. With more than a decade of experience, Experian Data Breach Resolution has successfully serviced some of the largest and highest-profile breaches in history. The group offers swift and effective incident management, notification, call center support and reporting services while serving millions of affected consumers with proven credit and identity protection products. www.experian.com/data-breach

Microsoft provides the most comprehensive approach to cloud computing, so that you can harness the full power of the cloud on your terms. Whether in your datacenter, with a service provider, or from a Microsoft’ datacenter and whether in a private cloud using HyperV™, a public cloud with Windows Azure™, or software as a service environment with Office365 Microsoft provides the flexibility and control to consume IT as a service in a way that best meets your unique business needs. www.microsoft.com/cloud

Netskope is the cloud app analytics and policy company. Only Netskope eliminates the catch-22 between being agile and being secure and compliant by providing complete visibility and enforcing sophisticated policies in cloud apps. Netskope performs deep analytics and lets decision-makers create policies in a few clicks that protect corporate data and optimize cloud app usage in real-time and at scale. With Netskope, people get their favorite cloud apps and the business can move fast, with confidence. www.netskope.com

Find Your Clouds, Protect Your Clouds, Use Your Clouds
Perspecsys’ AppProtex™ Cloud Data Protection Gateway enables enterprises to protect sensitive information before it leaves the network, ensuring compliance with data privacy, security and residency requirements. Data is replaced using industry-validated encryption from the enterprise’s preferred provider or the strongest form of tokenization, keeping it completely within the enterprise. AppProtex’s advanced architecture maintains cloud functionality, such as searching and e-mailing. Learn more on our blog or check out our CloudBits Tip Series from Perspecsys Paul. Perspecsys makes the public cloud private. www.perspecsys.com

Qualys®, Inc. is the leading provider of on demand IT security risk and compliance management solutions ­ delivered as a service. Qualys Software-as-a-Service solutions are deployed in a matter of hours anywhere in the world, providing customers an immediate and continuous view of their security and compliance postures. The QualysGuard® service is used today by more than 3,500 organizations in 85 countries, including 40 of the Fortune Global 100 and performs more than 200 million IP audits per year. Qualys has the largest vulnerability management deployment in the world at a Fortune Global 50 company. Qualys has established strategic agreements with leading managed service providers and consulting organizations including BT, Etisalat, Fujitsu, IBM, I(TS)2, LAC, NTT, SecureWorks, Symantec, Tata Communications and TELUS. www.qualys.com

Skyhigh Networks
Skyhigh Networks’ mission is to help CIOs securely enable productivity and innovation within their businesses. As the “Cloud Visibility and Enablement Company”, we help companies embrace cloud services with appropriate levels of security, compliance, and governance, while lowering risk and cost. Over 100 customers, including BMC Software, Cisco, Creative Artists Agency, Diebold, and DirecTV use Skyhigh’s unparalleled cloud visibility, usage analytics, and policy enforcement to support their “Cloud Adoption Lifecycle” (i.e. Discover – Analyze – Secure) today.www.skyhighnetworks.com

Solutionary, an NTT Group security company (NYSE: NTT), is the next generation managed security service provider (MSSP), focused on delivering managed security services, security consulting services and global threat intelligence. Comprehensive Solutionary security monitoring and security device management services protect traditional and virtual IT infrastructures, cloud environments and mobile data. The patented, cloud-based ActiveGuard® service platform uses multiple detection technologies and advanced analytics to protect against advanced threats. The Solutionary Security Engineering Research Team (SERT) researches the global threat landscape, providing actionable threat intelligence, enhanced threat detection and mitigating controls. Experienced, certified Solutionary security experts act as an extension of clients’ internal teams, providing industry-leading client service across industries. www.solutionary.com

Are concerns about data loss and compliance keeping you from moving critical business apps to the cloud? With the help of Spanning Backup, the industry’s most trusted backup and recovery solution for SaaS applications, you can keep your data safe and accessible. Now you can fully leverage the innovation and agility of the cloud while minimizing risk. Whether you’re using Google Apps, Salesforce, or Office365, our daily, automated backup and unbeatable restore solutions will keep your company protected and compliant. Trust in the cloud starts with Spanning. Learn more at www.spanning.com.

Thales e-Security is a leading global provider of information security providing data encryption solutions to the financial services, manufacturing, government and technology sectors. With a 40 year unrivalled track record of protecting corporate and government information, Thales solutions protect our customers most sensitive data and is used by four of the five largest energy and aerospace companies, government networks around the world, and secures more than 80 percent of the worldwide payment transactions. Thales e-Security has offices in Japan, Hong Kong, United Kingdom and the United States and is represented in over 90 countries around the world. www.thales-esecurity.com

Vormetric would like to thank the CSA Congress team for hosting a tremendous security and privacy event in San Jose, CA. Whether you attended this event or not, if you or your management still has doubts about moving sensitive data in the cloud, this webinar, Cloud Data Encryption Myths Debunked will remove those fears as it explains the current best practices and services available from cloud providers. To learn more please visit: https://webinar.darkreading.com/19011?keycode=CAA1AC

CSA Congress Session URL:


Shopping Cart
Scroll to Top