The Challenge of the Day
All Cloud conversations include questions around Security. As businesses rush to the Cloud to innovate, Information Security Risk Management teams are working to ensure that policies are followed and regulatory compliance mandates are met.
The Path forward
Most Chief Information Security Officers (CISOs) are adopting best-of-breed products that each meet niche requirements within the security domain. Transitioning to the Cloud requires a significant set of new tools as well as updates to policies, standards, and guidelines. Your organization needs to support the changing landscape of Amazon Web Services (AWS) offerings, onboarding new Software as a Service (SaaS) applications, and Platform as a Service (PaaS) environments like IBM Bluemix – each of these present numerous security challenges.
The Cedrus team has decades of experience in this domain. We understand the challenges within risk driven security programs and work with our clients to address these concerns as they manifest in the adoption of Cloud. InfoSec Risk Management teams are also often challenged to meet the speed requirements presented by business and application teams. To help our clients, our team has created re-usable implementation patterns and use cases to specifically solve problems within the domains of Digital Identity Management Transformation and Digital Asset Protection in the Cloud through CASB.
We are technically experienced thought leaders with a strong emphasis in cloud security. We have deep skills in Identity and Access Management (IAM) and Cloud Access Security Brokers (CASB). We focus on providing solutions to risk and compliance challenges for our clients. We partner with our clients for long-term mutually beneficial relationships. Inside, we promote a culture of respect, growth, teamwork, and motivation that we bring to every engagement.
Digital Identity Management Transformation
- Enterprise IAM Design and Implementation Services
Attestation / Compliance
Provisioning, RBAC, ABAC…
Authentication, SSO, Federation, Multi-factor
- Business and Operational Process Transformation for Identity
- Next Generation w/Cloud Context
Cloud Identity Services
IaaS/PaaS Services and Patterns
Digital Asset Protection in the Cloud through Cloud Access Security Broker (CASB)
- Governance, Policy, and Standards Consulting
- Design and Implementation Services
- Cloud Web Gateway (Proxy, Filtering, Access Control delivered via Cloud)
- Access Control to Cloud Apps
- Data Loss Prevention (DLP)
- Malware Detection and Prevention
- Encryption Strategies
- Key Management
- Provider vs Bring Your Own Keys (BYOK) vs Gateway
- Operational Transition
- Coming Soon: Managed Services