
{"version":"1.0","provider_name":"OTAVA","provider_url":"https:\/\/www.otava.com","title":"Video: Is Data Less Secure in a Cloud Environment?","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Jq01mnJjEN\"><a href=\"https:\/\/www.otava.com\/blog\/is-data-less-secure-in-a-cloud-environment\/\">Video: Is Data Less Secure in a Cloud Environment?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.otava.com\/blog\/is-data-less-secure-in-a-cloud-environment\/embed\/#?secret=Jq01mnJjEN\" width=\"600\" height=\"338\" title=\"&#8220;Video: Is Data Less Secure in a Cloud Environment?&#8221; &#8212; OTAVA\" data-secret=\"Jq01mnJjEN\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.otava.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"Online Tech&#8217;s Senior Product Architect Steve Aiello continues his data security series of videos on data encryption by dispelling the myth that data is less secure in a well-run data center or in a cloud environment. Actually &#8211; data is more secure with a\u00a0cloud hosting provider. Does your office have the appropriate level of physical security in place, including: Biometric authentication &#8211; key fobs, pins and fingerprint readers for access to your servers Solid, reinforced concrete walls Heat and fire suppression sensors Additional locks on cabinets Visitor logs Does your limited technical staff have the ability to: Ensure your patches are up-to-date Expertise to run enterprise antivirus, anti-malware, file integrity monitoring solution with IDS\/IPS solution Fully redundant, high availability firewall maintenance Expertise to implement encryption in storage arrays Know-how to harden operating systems Ability to alert in case of anomalies Set up web application firewalls Set up and configure highly mobile VPNs in a cost-effective manner Comparing the services of cloud service providers to the man-hours and hardware required for a in-house solution, a cloud hosting provider offers more value and expertise at lower costs. Watch the full video on our site. Learn more about encryption of data at rest...","thumbnail_url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg"}