Uncertainties surround the adoption of new technologies. The cloud is no exception. There is a persistent fear of loss of control. There is paranoia about security. But, maintaining control of the cloud and ensuring security in the cloud is simple–if you know how.

Fears of losing control over the cloud are very real. The genesis of this fear can be traced back to the nature of cloud computing. First, enterprise data is sent over the Internet to a remote server that is not in the control of the organization. Second, the Internet is a public transmission system. Third virtualization makes it impossible to state with certainty the location of the data in the cloud.

Cloud service enablers like Asigra appreciate the validity of the fear and address the root cause effectively and efficiently.

Private cloud computing or the internal cloud as it is often called, is one offering at the altar of control. SecurStore’s Cloud service, powered by Asigra, offers on-premise/off-premise dedicated solutions in the cloud that are purpose built for garnering backup efficiencies while providing absolute control over the data stores. Agentless architectures backup operating systems, file systems or applications using industry standard programming interfaces without encountering risks associated with “agent pollution” and “open ports” on the firewall. The dedicated private cloud provisions for multi-site licenses, permits additions of servers/data bases on the fly, requires no upgrades and is non-disruptive to applications. The enterprise administrator sitting at a central control has a complete and uninterrupted view of the entire network and its operation at all times.

Security is almost absolute and that is second offering on the altar of control. SecurStore, powered by Asigra, uses a third party certified (FIPS 140-2) cryptographic algorithm to encrypt data. The AES 256 bit encryption algorithm is impregnable and has withstood the test of strength for over three decades. Data transmitted from smart phones or handheld devices like tablets is encrypted at the point of transmission/in flight and is stored in the encrypted format. The software permits key escrow management, password rotation support and destroys data only on receipt of the certificate of destruction. Unauthorized users have no access to data as the centrally administrated console layers security with elaborate user management tools that identifies users and assigns them with specific user rights and permissions. Usage logs record the history of user action and administrations are endowed with the ability to track user activity and clamp down on any unusual activities on the network.