Cloud Security Evolution (infographic)
A take on the evolution of cloud security, and what HYKER brings.
In 2000 most control and data was safely maintained within organizational borders using firewalls etc. Data never left the protected boundaries.
In 2010 the cloud had become a viable outsourcing option. Organizations need to trust the data center of the cloud provider and their security measures, taking a calculated risk for cost saving and availability reasons. Data is protected through rules, contracts, and technologies like encrypted databases, SSL/TLS during transport and oAuth for authentication of users. This is very much still the case today, but things are rapidly changing with the current increase of breaches and new legislation put into place, e.g. GDPR.
Hyker changes this by using cryptographic protection of the full data lifecycle, from data producer to data consumers. The encryption keys are maintained by the authorized users and applications in authorized devices, with centralized or delegated management. The organization has retained full control over the data and no longer have to rely on trusting the cloud provider. Data cannot be accessed in the cloud by the provider or external attacker, only by the key owners of specific data elements providing granular access control to the data.