HANA.EXPERT Healthcare Cloud Protection for is the only security solution on the market designed to prevent attacks via files and URLs uploaded to

Cloud ecosystems operate on a shared security responsibility model. does a great job of covering various aspects of system and application level security. However, it is subscribers' responsibility to secure files and links uploaded to platforms by their customers and employees.

It's an essential component of your overall security strategy, and thanks to its Cloud-to-Cloud architecture, requires no middleware. As progressively more organizations outsource more of their IT infrastructure to the cloud, the duties of security personnel have changed, but not vanished — which is confirmed by the proliferation of ransomware and malware threats to cloud-based services.

However, customer security responsibilities differ across the spectrum of cloud-based service models. This variation in liabilities and duties between clients and providers requires that security professionals have a strong understanding of the Shared Responsibility Model.

This means understanding the general trends in Shared Responsibility Models across types of services as well as the individual details of shared responsibilities within the context of each specific service. In general, as the extent of outsourcing to the cloud increases, the security responsibilities of providers grow. Nevertheless, customers of cloud-service providers are always responsible for the content and data on the cloud as well as the user endpoints that access the cloud. For this reason, it is important to consider cloud-based security solutions that complement the security features offered by cloud service providers, with preference given to security solutions that work natively within the cloud.

There are many factors to be aware of when reviewing cloud-based services, but there are at least three key directives that should always be followed: (1) include the cloud in your business and security strategy, (2) understand your responsibility, and (3) choose your vendor carefully. Despite the changing landscape of threats and vulnerabilities, security personnel must not forget the basics of cyber security — the latest cloud innovations will never change sound fundamentals.

CISOs and security leaders must understand the scope of their responsibilities for security in the cloud. Provider-supplied security differs among infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS) models.

Shared Responsibility Model

Modern ways of working have demanded collaboration and data sharing approaches that heavily utilize cloud-based services. Unfortunately, as individuals share data through cloud applications, they risk the spread of malware designed to infect these systems. As noted previously, the systems of 11% of organizations have explicitly sanctioned cloud apps infected with malware.
As many organizations provide direct access for cloud applications through their firewalls and other network security functions, protection against malware, ransomware, and malicious links is often left solely to endpoints. This makes systems more vulnerable to attacks and boosts the likelihood of successful attacks — and this exposure becomes worse as the number of complementary security layers decreases.
Furthermore, in instances like the Cerberus attack targeting an Office 365 vulnerability, the chance of spreading the malware to other parts of the organization increases significantly — notably in use cases such as intranets, customer and partner communities, or any other cloud platform that allows sharing of files or links.

Layered Security with Salesforce Cloud Protection

Layered Security with Salesforce Cloud Protection

Safety of External Content for Salesforce Cloud

Safety of External Content for Salesforce Cloud

For more information, please contact:
Sales at 302 715-0062 or This email address is being protected from spambots. You need JavaScript enabled to view it.