Cloud Security

The Challenge of the Day

All Cloud conversations include questions around Security. As businesses rush to the Cloud to innovate, Information Security Risk Management teams are working to ensure that policies are followed and regulatory compliance mandates are met.

Dots

The Path forward

Most Chief Information Security Officers (CISOs) are adopting best-of-breed products that each meet niche requirements within the security domain.  Transitioning to the Cloud requires a significant set of new tools as well as updates to policies, standards, and guidelines. Your organization needs to support the changing landscape of Amazon Web Services (AWS) offerings, onboarding new Software as a Service (SaaS) applications, and Platform as a Service (PaaS) environments like IBM Bluemix – each of these present numerous security challenges.

The Cedrus team has decades of experience in this domain. We understand the challenges within risk driven security programs and work with our clients to address these concerns as they manifest in the adoption of Cloud. InfoSec Risk Management teams are also often challenged to meet the speed requirements presented by business and application teams.  To help our clients, our team has created re-usable implementation patterns and use cases to specifically solve problems within the domains of Digital Identity Management Transformation and Digital Asset Protection in the Cloud through CASB.

We are technically experienced thought leaders with a strong emphasis in cloud security.  We have deep skills in Identity and Access Management (IAM) and Cloud Access Security Brokers (CASB). We focus on providing solutions to risk and compliance challenges for our clients.  We partner with our clients for long-term mutually beneficial relationships.  Inside, we promote a culture of respect, growth, teamwork, and motivation that we bring to every engagement.

Cloud Security CASB

Digital Identity Management Transformation

  • Enterprise IAM Design and Implementation Services

Attestation / Compliance

Provisioning, RBAC, ABAC…

Authentication, SSO, Federation, Multi-factor

  • Business and Operational Process Transformation for Identity
  • Next Generation w/Cloud Context

Cloud Identity Services

IaaS/PaaS Services and Patterns

Managed Services

Digital Asset Protection in the Cloud through Cloud Access Security Broker (CASB)

  • Governance, Policy, and Standards Consulting
  • Design and Implementation Services
  • Cloud Web Gateway (Proxy, Filtering, Access Control delivered via Cloud)
  • Access Control to Cloud Apps
  • Data Loss Prevention (DLP)
  • Malware Detection and Prevention
  • Encryption Strategies
  • Key Management
  • Provider vs Bring Your Own Keys (BYOK) vs Gateway
  • Operational Transition
  • Coming Soon: Managed Services

Offerings

CASB Smart Assessment

 

This offering aims to help you evaluate your current state of your implementation, compared to your own policies, best practices, industry trends, and enterprise-class operational models.

Read More

CASB as a Program

 

Our Cedrus CASB as a Program – (CCaaP) will enable CASB to be a strategic enforcement point for customers’ cloud security and not simply a way to discover shadow IT.

Read More

Want more information on our Cloud Native practice? Contact us now