Cloud storage security protects files from. Comparative review of cloud storage


Dear readers TopReview, today it is impossible to imagine our Internet life without cloud services, in particular, . Undoubtedly, these services always have high security and privacy requirements.

TOP-6 Security rating of cloud data storages

Encryption levelSSHPersonal encryption keyTwo-Level Authentication
1 256-bit AES256-bitYes
2 128-bit AES256-bitYes
3 SpiderOakONE256-bit AES256-bitYes
4 iCloud Drive 128-bit AES128-bitYes
5 256-bit AES128-bitYes
6 256-bit AES128-bitYes

Additionally:

IDrive. IDrive encrypts files using 256-bit AES encryption before the files are downloaded and transferred to the servers. Data is also protected by 256-bit SSL transmission encryption. One of best features security is the ability to have your own encryption keys. The secret key encryption guarantees that your the files are private and that you are the only one who can decrypt them.

Google Drive. Account recovery is carried out using a secret question; the service itself checks the user-created password for strength and does not allow the use of easily hacked passwords. Data is encrypted during transmission, which prevents it from being compromised during download, however, to encrypt data on the server you will need third party programs. Google Drive has a version for business accounts that allows you to provide more high level file protection.

SpiderOak. Considered one of the safest cloud storage data. Thus, Edward Snowden stated that data encrypted through this service cannot be accessed by anyone, even the most cunning attacker. The developers assure that the password for accessing the account is not transferred anywhere, but is created during the first authorization special key, which gives the desktop client access to the cloud data storage.

iCloudDrive. After the 2014 incident when massive hack accounts in iCloud, Apple has seriously taken up improving the security of the service - now data in iCloud Drive is encrypted both during transmission and on the server, the password is checked for strength, and there is two-factor authentication.

Yandex.Disk. There is two-factor authentication, including using a PIN code, QR code and TouchID. When downloading, files are checked for viruses, and data is transmitted over an encrypted channel. The service has not been without scandals in its history either.

Important data can be stored on external mediahard drives, USB flash drives, even floppy disks. However, the safety of information in this case will be constantly under threat, because the physical object is easy to lose. If the USB card contains confidential information about the organization’s activities, the flash drive can be stolen by competitors, which will cause enormous damage to the company.

For these reasons, USB drives are becoming a thing of the past, just like disks and floppy disks used to be. They are being replaced by cloud data storage, which allows you to access files at any time and from any computer. In this article we will give a rating of cloud storage and talk about the advantages and weaknesses various services.

Cloud storage is an online storage within which user data is distributed across numerous servers. The user does not know the structure and location of the servers; from his point of view, the “cloud” is a large virtual flash card, the information on which is password protected.

Using cloud storage is quite simple: a person needs to register on one of the sites offering data storage services, remember the username/password, then upload valuable information “to the Internet.” When he needs the information, he goes to the same site from any PC or mobile gadget, logs in and gains access to information.

Cloud services have many advantages over other methods of data storage:

  • The user does not risk losing information irrevocably in case of failure of a computer or gadget.
  • It is convenient to share information from the “cloud” - you can send links to separate files via mail or social networks.
  • The user only has to pay for large amounts of memory. If his needs are small, he has the right to limit himself to a free quota, which is provided by almost all storage facilities.
  • User can customize general access to files and, as a result, organize working together with data online.

When it comes to the disadvantages of cloud storage, users first of all express doubts whether such services are able to guarantee the confidentiality of the information entrusted to them. As an example, they give a famous incident that happened with Dropbox in 2011 - when, after an update, anyone could log into any account using a random password. Undoubtedly, It is impossible to vouch for the reliability of all cloud storages– this is why it is so important to approach the choice of a service for storing information carefully and scrupulously.

Top cloud storage services: which service to choose?

The best cloud storage services include the following services:

Google Drive

  • Free place: 15 GB.
  • : 5 TB.
  • : 30 TB.
  • : Supported on Android above 4.4 and iOS above 8.0.

The service is quite young - it was launched only in 2012. However, despite this Google Drive(aka Google Drive ) has already managed to achieve well-deserved worldwide popularity and the laurels of one of the most convenient cloud storages.

Convenience Google Drive is that this “cloud” is integrated with all other services from Google– of which great amount. A user, for example, can send a letter received to the storage with just one click. Mailbox Gmail, save the photo uploaded to the cloud in the application Google Photos . Besides, Google Drive allows the user to open and edit documents Google Docs.

The application boasts an interesting feature Google Drive for Android - it is capable scan documents. Just click the “Scan” button and take a photo of the document - the PDF file will appear in the “My Drive” section.

In favor Google Drive They say a large number of supported file formats (over 30), the ability to configure offline access to documents, support SSL protocol, which guarantees the security of stored information. Active users of ecosystem services Google you don’t even need to think about finding another cloud storage – Google Drive will suit them 100%!

Premium subscription cost:

139 rub. / month

699 rub. / month

6,990 rub. / month

RUB 13,990 / month

RUB 20,990 / month

Yandex.Disk

  • Free place: 3 GB expandable up to 10 GB.
  • Maximum size of one file: 10 GB (when using the program) / 2 GB (when downloading via browser).
  • Maximum volume space: 1 TB.
  • Mobile OS compatibility: Supported on Android above 4.0.3, iOS above 8.0, Windows Phone 7 / 8 and on Symbian 9.3.

In terms of restrictions disk space Russian service Yandex.Disk looks completely uncompetitive in comparison with cloud storage Google Drive. In particular, instead of 15 “free” gigabytes, the user is provided with only 3 gigabytes. Another 7 GB can be obtained for participating in the referral program, but not every user wants to spam their friends. The maximum amount of disk space for one account is also small - only 1 TB (for Google 30 TB). However, it is Yandex.Disk considered among domestic users the most popular "cloud". For what reasons?

U Yandex.Disk other advantages than the service from Google, and for a Russian they are important. For example, it is possible to upload photos and videos from social networks to the “cloud” from Yandex “ In contact with" And " Classmates» directly, without application additional software. Cloud storage is integrated with all kinds of services from Yandex and can be integrated with the office suite Microsoft Office 2013, as well as connect to TVs equipped with the function SmartTV.

Besides, Yandex.Disk has the right to boast of its cross-platform - there are web clients and mobile applications not only under iOS, Android, Windows, but also under Linux And Symbian.

At the same time, Google specialists are working on Linux-they are only working on a version of their cloud storage, and apparently do not intend to release applications for Windows Phone and Symbian at all. Among domestic users mobile technology a lot of fans of the company Nokia and its smartphones running exactly the two OSes mentioned earlier - these users have a mobile Google Drive not available.

As a result, we can say that popularity Yandex.Disk in Russia is due not only to the desire of users to support domestic brand, but also the presence of quite tangible advantages over foreign services.

Premium subscription cost:

100 GB

300 rub. / year

800 rub. / year

2000 rub. / year

One Drive

  • Free place: 5 GB.
  • Maximum size of one file: 10 GB.
  • Maximum amount of space: 5 TB.
  • Mobile OS compatibility: Supported on Android above 4.0, iOS above 9.0, Windows Phone 7 / 8, Symbian Belle and MeeGo 1.2.

Among cloud storages OneDrive from Microsoft– a real “dinosaur”. This service has been operating since 2007, but until 2014, users were familiar with it under the name SkyDrive. Renaming had to be done due to a lawsuit with the television company BSkyB who accused Microsoft in plagiarism.

Unfortunately, in Lately"cloud" OneDrive began to lose ground more and more rapidly and give way to similar services from Google and other developers. The fact that in 2016 Microsoft reduced the volume free space in my cloud storage from 15 GB to 5 GB, obviously did not add OneDrive popularity. "Cloud" Microsoft does not have any outstanding advantages over analogues - the main advantages of this service are integration with the package Office 365 and the ability to organize simultaneous work on documents online. Alas, other services also provide access to documents, but in addition to this they offer a lot of other “goodies”.

Continue to store information in OneDrive It is only appropriate for those users who accessed the services of this service before the 2016 reforms. Owners of old accounts still have access to 15 free gigabytes.

Premium subscription cost:

Mega

  • Free place: 50 GB.
  • Maximum size of one file: unlimited (when downloading from a browser – 2 GB).
  • Maximum amount of space: 4 TB.
  • Mobile OS compatibility: Supported on Android above 4.0, iOS above 7.0, Windows Phone 7/8, BlackBerry 10.

Just think about it - 50 free gigabytes! While competitors offer only 10-15 GB! About cloud storage Mega the brainchild of the New Zealand company of the same name - I want to tell you so much that it would be enough for several articles.

"Cloud" Mega not only remarkable large volume free space. Its main advantage has always been safety. Actually, to create Mega developer Kim Dotcom was inspired by the scandalous revelations of Edward Snowden, who said that American citizens can only dream about confidentiality of information. Mega uses end-to-end encryption : the data is encrypted in the browser - as a result, the program Mega itself does not know what information the user downloaded to the disk.

However, Kim Dotcom himself undermined confidence in his brainchild, declaring in 2015 that personal information is at risk and users should make backup copies as a matter of urgency.

According to the creator of the service, the company experienced significant pressure from the US government, and this pressure was expressed mainly in refusal to cooperate with Mega everyone payment systems, including PayPal. In fact, the start-up was doomed to exist without any cash flow at all. In the end, Kim Dotcom announced a hostile takeover of the company by Chinese investors and left - in his own words, to develop a competing program for Mega.

History with Mega reminiscent of a conspiracy thriller. Each user must decide for himself whether to trust personal data to a company with such a controversial reputation. It is worth noting that in addition to Dotcom itself, the safety of information in Mega so far no one has complained.

Premium subscription cost:

200 GB

500 GB

4.99 euros/month

9.99 euros/month

19.99 euros / month

29.99 euros / month

Cloud Mail.ru

  • Free place: 25 GB.
  • Maximum size of one file: 2 GB (if you purchase space – 32 GB).
  • Maximum amount of space: 4 TB.
  • Mobile OS compatibility: Supported on Android above 4.0, iOS above 7.0, Windows Phone above version 8.

Service "Cloud Mail.ru", which appeared in 2013, immediately pleased users with an attraction of unprecedented generosity - everyone was provided with 100 free gigabytes. Later, the amount of free space was reduced to 16 GB, then increased to 25 GB - this limit is still relevant.

Among the advantages " Cloud Mail.ru» includes not only large volume free space. The service can boast high speed downloads and unloads for domestic users, as well as cross-platform - “ Cloud Mail.ru", for example, is available to advanced users whose computers have Linux.

It is worth mentioning the disadvantages of the service. According to user reviews, “ Cloud Mail.ru" is very buggy and often crashes when launched on older versions of Windows.

Users also complain that Mail.ru Group in addition to its cloud storage it produces hidden installation various toolbars and agents - but this is already a familiar story.

Premium subscription cost:

128 GB

256 GB

512 GB

690 rub. / year

RUB 1,490 / year

RUB 2,290 / year

RUB 3,790 / year

6,990 rub. / year

RUB 13,900 / year

RUB 27,900 / year

Conclusion

The choice of users who are not afraid that their data will be stolen by foreign intelligence services is obvious - Google Drive is the most convenient cloud storage, providing an impressive amount of free space for free. Users who want to support a domestic manufacturer should pay attention to Yandex.Disk And Cloud Mail.ru. Both services, however, have very significant shortcomings: cloud from Yandex provides little disk space, and the product is from Mail and still quite “raw”.

I would like to note that the rating does not include Dropbox- one of the founders cloud technologies. Flaw Dropbox the fact that it offers only 2 GB of free space - a trifle in these days. In addition, the cloud service does not show flexibility in purchasing issues extra space; individuals Only 1 tariff is offered. Otherwise, it is difficult to regard this as disrespect for users.

The biggest concern for companies is the security of external cloud services. Thus, respondents are worried that incidents may occur at suppliers to whom business processes are outsourced, at third-party cloud services, or in the IT infrastructure where the company rents computing power. However, despite all this concern, only 15% of companies conduct third-party security compliance audits.

“Despite the fact that recent large-scale hacks have occurred inside the data center, traditional security systems still focus only on protecting the network perimeter and controlling access rights. However, it is rarely taken into account Negative influence solutions for protecting physical infrastructure for performance virtual environments, explained Veniamin Levtsov, vice president for corporate sales and business development at Kaspersky Lab. - That’s why it’s so important to use appropriate, comprehensive protection in converged environments to ensure security virtual systems specially designed solutions. We are implementing an approach in which, regardless of the type of infrastructure, all systems are provided with a uniform level of security coverage of the entire corporate network. And this is where our technologies and modern VMware developments (such as microsegmentation) complement each other perfectly.”

2014: Ponemon and SafeNet data

Most IT organizations are unaware of how corporate data is protected in the cloud, leaving companies putting their users' accounts and sensitive information at risk. This is just one of the conclusions of a recent fall 2014 study conducted by the Ponemon Institute and commissioned by SafeNet. The study, titled "Challenges of Information Management in the Cloud: Global Data Security Study," surveyed more than 1,800 information technology and IT security professionals worldwide.

Among other findings, the study found that while organizations are increasingly embracing the power of cloud computing, corporate IT departments face challenges managing and securing data in the cloud. The survey found that only 38% of organizations have clearly defined roles and responsibilities for ensuring the protection of confidential and other sensitive information in the cloud. To make matters worse, 44% of enterprise data stored in the cloud is not controlled or managed by IT departments. In addition, more than two-thirds (71%) of respondents noted that they are facing increasing challenges when using traditional security mechanisms and techniques to protect sensitive data in the cloud.

With the growing popularity of cloud infrastructures, the risks of confidential data leaks also increase. About two thirds of surveyed IT professionals (71%) confirmed that cloud computing today has great importance for corporations, and more than two-thirds (78%) believe cloud computing will remain relevant two years from now. In addition, according to respondents' estimates, about 33% of all their organizations' needs for information technology and data processing infrastructure can be met today using cloud resources, and over the next two years this share will increase to an average of 41%.

However, the majority of respondents (70%) agree that compliance with data confidentiality and data protection requirements in a cloud environment is becoming increasingly difficult. In addition, respondents note that the types of corporate data stored in the cloud such as addresses are most at risk of leaks Email, consumer and customer data and payment information.

On average, more than half of all enterprise cloud deployments are carried out by third-party departments rather than by corporate IT departments, and on average, about 44% of enterprise data hosted in the cloud is not controlled or managed by IT departments. As a result of this, only 19% of respondents could declare their confidence that they know about everyone cloud applications, platforms or infrastructure services used in currently in their organizations.

Along with the lack of control over the installation and use of cloud services, there was no consensus among respondents as to who is actually responsible for the security of data stored in the cloud. Thirty-five percent of respondents said that responsibility is shared between users and cloud service providers, 33% believe that responsibility lies entirely with users, and 32% believe that the cloud service provider is responsible for data security.

More than two-thirds (71%) of respondents say it is becoming increasingly difficult to protect sensitive user data stored in the cloud using traditional security tools and methods, and about half (48%) say it is becoming increasingly difficult for them to control or restrict end users access to cloud data. As a result, more than a third (34%) of IT professionals surveyed said that their organizations have already implemented corporate policies that require quality mandatory condition to work with certain cloud computing services, use security mechanisms such as encryption. Seventy-one (71) percent of respondents said the ability to encrypt or tokenize confidential or otherwise sensitive data is important to them, and 79% believe that these technologies will become increasingly important over the next two years.

When asked what their companies do to protect data in the cloud, 43% of respondents said their organizations use private networks to transfer data. Roughly two-fifths (39%) of respondents said their companies use encryption, tokenization, and other methods to protect data in the cloud. cryptographic means. Another 33% of respondents do not know what security solutions are implemented in their organizations, and 29% said that they use paid services security provided by their cloud computing service providers.

Respondents also believe that managing enterprise encryption keys is essential to keeping data secure in the cloud, given the increasing number of key management and encryption platforms used by their companies. Specifically, 54% of respondents said their organizations maintain control over encryption keys when storing data in the cloud. However, 45% of respondents said they store their encryption keys in software, in the same place where the data itself is stored, and only 27% store the keys in more secure environments, such as on hardware devices.

When it comes to accessing data stored in the cloud, sixty-eight (68) percent of respondents say it becomes more difficult to manage user accounts in a cloud environment, while sixty-two (62) percent of respondents said their organizations have access to the cloud is also provided for third parties. Roughly half (46 percent) of those surveyed said their companies use multi-factor authentication to protect third-party access to data stored in the cloud. About the same number (48 percent) of respondents said their companies use technology multi-factor authentication including to protect the access of their employees to the cloud.

Why are customers unhappy with cloud providers?

Opaque cloud

A recent Forrester Consulting study shows that many organizations feel that their cloud service providers don't provide enough information about their cloud experience, which is hurting their business.

In addition to the lack of transparency, there are other factors that reduce the enthusiasm for moving to the cloud: the level of service for customers, additional costs and adaptation during migration (on-boarding). Organizations love the cloud, but not its providers—at least not as much.

The study was commissioned by iland, a provider of corporate cloud hosting, was held throughout May and included infrastructure and maintenance professionals from 275 organizations in Singapore and Singapore.

“Among all the complexities of today's cloud, there are also unfortunate flaws,” writes Lilac Schoenbeck, vice president of product support and marketing at iland. “Such critical metadata is not communicated, significantly inhibiting cloud adoption, yet organizations base their growth plans on the assumption that cloud resources are limitless.”

Where is the key to achieving harmony in business relationships? Here's what VARs need to know to try to resolve issues and bring the parties to reconciliation.

Lack of attention to clients

Apparently, many cloud users do not feel that same personal approach.

Thus, 44% of respondents said that their provider does not know their company and does not understand their business needs, and 43% believe that if their organization was simply larger, then the supplier would probably pay more attention to them. In short, they feel the coldness of an ordinary transaction when buying cloud services, and they don't like it.

And one more thing: there is one practice that a third of the companies surveyed pointed out, which also instills a feeling of pettiness in the transaction - they are charged a fee for the slightest question or incomprehensibility.

Too many secrets

A supplier's reluctance to provide all the information not only irritates customers, but often costs them money.

All respondents to the Forrester survey said they were experiencing some financial and financial impact. current work due to missing or proprietary data about their cloud usage.

“The lack of clear cloud usage data leads to performance issues, difficulty reporting to management the true cost of use, charges for resources that users never consume, and unexpected bills,” Forrester states.

Where's the metadata?

IT leaders responsible for cloud infrastructure in their organizations want cost and performance metrics that provide clarity and transparency, but apparently have difficulty communicating this to vendors.

Survey respondents noted that the metadata they receive about cloud workloads is typically incomplete. Nearly half of the companies responded that regulatory compliance data was not available, 44% reported a lack of usage data, 43% reported a lack of historical data, 39% reported a lack of safety data, and 33% reported a lack of billing and cost data.

Transparency issue

The lack of metadata causes all sorts of problems, respondents say. Nearly two-thirds of those surveyed reported that a lack of transparency prevents them from fully understanding the benefits of the cloud.

“Lack of transparency breeds various problems, and primarily this is a question of usage parameters and service interruptions,” the report says.

Approximately 40% try to fill these gaps themselves by purchasing additional tools from their own cloud providers, while the other 40% simply purchase services from another provider where such transparency exists.

Regulatory Compliance

Whatever one may say, organizations are responsible for all their data, whether on local storage systems or sent to the cloud.

More than 70% of respondents to the study said their organizations are regularly audited and must demonstrate compliance wherever their data resides. And that poses a barrier to cloud adoption for nearly half of the companies surveyed.

“But the regulatory compliance aspect of you needs to be transparent to your end users. When cloud providers withhold or don't disclose this information, they prevent you from achieving this,” the report said.

Compliance issues

More than 60% of companies surveyed responded that regulatory compliance issues are limiting further cloud adoption.

The main problems are:

  • 55% of companies with such requirements said that the most difficult thing for them to do is implement adequate controls.
  • About half say they have difficulty understanding the level of compliance provided by their cloud provider.
  • Another half of respondents said it was difficult for them to obtain the necessary documentation from the provider about compliance with these requirements in order to pass the audit. And 42% find it difficult to obtain documentation of their own compliance for workloads running in the cloud.

Migration problems

The on-boarding process appears to be another area of ​​general dissatisfaction, with just over half of the companies surveyed saying they were dissatisfied with the migration and support processes their cloud vendors offered them.

Of the 51% dissatisfied with the migration process, 26% said it took too long, and 21% complained about a lack of hands-on input from provider staff.

More than half were also dissatisfied with the support process: 22% cited long wait times for a response, 20% cited insufficient knowledge of support staff, 19% cited a lengthy problem-solving process, and 18% received bills with higher-than-expected support costs.

Obstacles on the way to the cloud

Many of the companies surveyed by Forrester are being forced to hold back their cloud expansion plans due to problems they are experiencing with existing services.

Web giant Google provides many great features in its cloud storage. Google says it's safe to store your data with them. Even if your computer, tablet, or phone fails, your Google Drive data is safe. The company also claims that files stored in their data center cannot disappear.

To use Drive, you need a Google account. Creating a Google account couldn't be easier. Google will ask you to come up with strong password. The password must contain at least 8 characters. However, there is no requirement for case-sensitive or varied letters and numbers when registering with Google. Although this could improve security.

Protection account at Google, this is a fundamental step in securing Drive storage. Google offers two-step verification (two-factor authentication) in order to increase the security of your account. Once you enable this feature, every time you log into any of the Google services you will need to enter an additional code. After entering the correct username and password on the Google account page, you will receive an SMS with a verification code on your mobile phone. You will be able to log into Google only after entering this code. Thus, two-step authentication can make Google Drive more secure from hackers. You can also receive such codes using smartphone apps.

In accounting Google posts there is a secret question and the ability to enter email address or phone number for account recovery, and this will also allow you to regain control of your account in the event of a hack. You also control the apps you sign into with your account. Browsing history, IP address, and device information are also available so you can track activity on your Google account.

Encryption is simply vital for any cloud service. Although Google Drive uses HTTPS, it does not provide its own file encryption service. So if you want to encrypt your files, do so before sending them to Google Drive. You can use Boxcryptor for free to secure your cloud files.

Google Drive offers a range of custom sharing options. Using these settings, you can control who can access files, who can download them, edit them, etc. You can view file versions on Google Drive. So if you need the previous version, you can get it by clicking on right button mouse on the required file and selecting the ‘Manage Versions’ option.

It may be noted that the security of Google's online storage service depends on the security of your Google account. If you can protect your Gmail ID accounts, then you can count on reliable protection files on Google Drive.

Microsoft OneDrive

Cloud storage OneDrive from the most powerful software developer Microsoft. To use OneDrive, you must have a Microsoft account. Visit Outlook.com to open a new Microsoft account. During the subscription process, Microsoft takes a number of robust security measures to protect the consumer from hackers. Microsoft suggests and requires a complex password of at least 8 characters with case-sensitive letters. All this is done for the sake of safety.

The security of OneDrive depends on the security of your Microsoft account. So if your Microsoft account is secured, it also keeps your OneDrive space secure.

Microsoft takes account security on Outlook.com very seriously. To create an account, you need to go to the “Account Settings” option and confirm your identity there using two-step authentication. For account settings, this feature is enabled by default.

Microsoft's two-step verification has more functionality than Google's similar feature. However, you can safely trust both services.

OneDrive uses an HTTPS connection to operate. ‘Recent activity’. From there, you can also manage apps that you've authorized for use with Outlook.com.

OneDrive offers a free file history view for office documents. ‘ Previous versions’ other file formats are available for business-level users. So if you make changes to Office documents, you can view the previous version for free in OneDrive. OneDrive files are not accessible without your permission. Despite this, OneDrive does not encrypt files uploaded to its server. Thus, you can ensure a higher level of security for your data by using third-party encryption services, for example, Boxcryptor.

Dropbox is one of the most popular online storage providers. It is used for both personal and commercial purposes. Dropbox is exclusively cloud storage. So all their energy is concentrated on the cloud...

Dropbox says data security is their top priority. When subscribing to Dropbox, you will notice that the process is quite simple and fast. You will be asked to enter your name, email address and password. The account creation page will prompt you to use a strong password. However, there is no obligation to maintain a certain level of security.

Subscribing to Dropbox may not require immediate email verification, but you will need to verify your email in order to seamlessly share files. All these options will be available as you use the service.

Dropbox offers a file version feature so you can revert to an older version necessary files. If the file was edited and later you needed to get its previous version, just right-click on new version file, and select the "Previous Versions" option from the context menu.

A Dropbox account comes with a range of additional systems security. You can also use two-step verification, which requires you to enter a unique code every time you sign in to Dropbox. This code can be received on your mobile phone. You can also get the code through a smartphone app. Either way, two-factor authentication can significantly increase the security of your account.

The Dropbox Security Settings page also allows you to monitor and manage connected devices, browsing history, linked apps, and more to prevent unauthorized access.

Dropbox uses an HTTPS connection on its website and during data transfers between you and the cloud storage. You can control access to files using data sharing options.

Dropbox itself does not provide the option to encrypt files before uploading to their server. Dropbox says it encrypts files during transfer and at all other times. However, you can encrypt files before sending them to Dropbox. There are a whole lot of tools for this. Boxcryptor is one of them. It uses industry standard "AES-256 bit" encryption technology to further enhance the security of your files.

Copy is one of the most popular cloud storage services, competing with Dropbox, Google Drive, OneDrive, etc. The service also offers a referral bonus through which existing users can increase their free storage. The registration process for Copy takes just a few seconds. You will be asked to provide a name, email address and password. During the registration process for Copy. All that was indicated regarding the password is that it must consist of at least 6 characters.

Copy.com uses a secure HTTPS connection during data transfer between the user and its server. The company also claims that they store data in an encrypted format. But despite this, you cannot encrypt data on Copy.com yourself. But no one has canceled third-party services for encrypting data before sending it to Copy. So you can safely encrypt your files first, and then send them for storage to Copy.

Copy.com does not offer two-step verification, which plays a very large role in maintaining account security. Hopefully they will start offering this valuable option soon.

Copy has a file history check feature that allows you to get previous versions of your files. Unfortunately, Copy.com does not have an option to view your account history.

Despite its excellent user interface and functionality, Copy still lacks some essential features.

Mega service, which is known for its confidentiality. Mega was founded by Kim Dotcom. The service provides each new user with 50 GB of free space. To register with Mega, you need to provide basic information such as name, email address, password, etc. Mega requires you to use a strong password. If the password is not strong enough, you will receive the following message: ‘your password is not strong enough to continue’.

Mega uses an HTTPS connection and client-side encryption technology. This means that locally encrypted information will be sent to Mega. When downloading information from the service, it is decrypted. According to Mega's security help page, your files cannot be read on the server. The company strongly recommends not to lose your password. The Mega password is not only a password, but a code that opens the main decryption key. Mega claims that it is impossible to recover the password on the service. If not backup copy the main decryption key, then all data stored on the service server will be lost.

However, there are reports that Mega's browser-based encryption system has certain weaknesses.

Mega offers excellent security features, but, unfortunately, the service does not have file version history. Can be restored deleted files using the 'SyncDebris' application from Sync Client, or from the 'Rubbish Bin' folder on Mega. To monitor activity, Mega provides a browsing log option and an application management option.

What's interesting is that Mega doesn't have a two-step verification option, which would greatly improve the service's privacy and security efforts.

This section took a detailed look at the available security features of popular cloud storage providers such as Google Drive, Dropbox, Copy and Mega. When it comes to security, they all have their own and special offers. Now let's see what basic security features these services offer. Below is an easy-to-follow checklist.

    Password Strength Requirement: Google, Microsoft and Mega require you to use a strong password. Dropbox and Copy are more flexible in this regard.

    Email address verification requirement: All services sooner or later require you to verify your email address.

    Two-step verification: Google Drive, OneDrive and Dropbox provide two-step verification. Copy and Mega on this moment do not provide such an option.

    Client-side encryption: Only Mega offers client-side encryption. This is done from the device from which the files are downloaded.

    Server-side encryption: Dropbox, Mega and Copy store files encrypted on their servers. Where you can use local encryption to avoid risks.

    Using a secure connection (HTTPS): All of these providers use a secure HTTPS connection. However, Mega gives users the option to disable it (optional).

    Usage security questions to verify users: Google Drive has this option available. OneDrive, Dropbox, Copy and Mega do not currently use a security question.

From the above, it is clear that Google Drive provides almost all security features except encryption. Microsoft OneDrive and Dropbox follow closely behind. Mega provides sophisticated security such as encryption, but the service does not have two-step verification. Copy needs to work on turning its great cloud storage experience into a more secure environment with two-step verification, password strength requirements, and other innovative security systems.

Today I would like to talk about Mail.ru Cloud. How reliable is it? Is it worth storing files in it?

I have been using this service for a long time and with success. To start (at the time of writing), 25 GB is given. A treasure trove where you can place a bunch of necessary documentation, photo and video archives. And it's free! As space increases, you must pay extra.

For ease of uploading, you can use both the web interface and a special program.

Having installed it, a folder appears on your desktop where you can easily transfer the necessary information.

And of course there is an application for smartphones, which can also be purchased freely on Google Play and similar mobile stores.

Obako Mail.ru can be used immediately after you register your email. The entrance to it is located at the top of the screen, in the “All projects” section.

How reliable are cloud storage services?

I don’t think it’s necessary to say that no one will provide you with 100% reliability. But if you follow certain rules, such as: do not share email passwords with third parties, constantly check your computer for viruses, do not enter your mailbox from other people’s devices, install an access code on your gadget, etc., etc., then Everything will be fine!

And the company carefully monitors the safety of its users and constantly makes all sorts of improvements. For example, Two-factor authentication. Now you can log into your mailbox by first entering a special code that will be sent to your phone as an SMS.

Yes, I want to remember that deleting mail leads to the destruction of everything in the storage!

Should I store files in the Mail.ru Cloud?

Certainly! First of all, it's convenient. And in order not to overload your laptop or tablet with a large abundance of information in the form of significant archives, we upload it there! It won't be too difficult to load it back. In some cases, you can view media and text archives online without downloading them to your PC or gadget. And I also think that accessibility will be a significant advantage - no matter where you are, you can transfer documents to friends in two clicks.

What types of cloud storage are there?

Today the most common are:

Dropbox - B free use provides 2 GB.
Box.net - 5 Gigabits
Google Drive - 5 GB
Yandex.Disk - 10 Gigabytes
SkyDrive - 7 GB
MEGA - 50 GB free
[email protected] - up to 1 Tirabyte

And also lesser known: Adrive.com, Bitcasa.com, Yunpan.360.cn, 4shared.com, Sugarsync.com, Idrive.com, iFolder (kablink.org), Opendrive.com, Syncplicity.com, Mediafire.com, Cubby.com, Adrive.com.

Naturally, if desired, the space provided can be increased for a fee per month/year.

What services do you use? Describe their pros and cons. I, and I think many blog readers will be interested to know.

To the entry "About Cloud Mail.ru in simple language" 9 comments

    Thank you for the article. I started using this cloud. Really convenient. Previously I used Y.disk, but there is not enough space there.

    I use Yandex Disk. I’m happy with it so far. I ate Mailom, Golde.iCloud (I only store contacts there) Yandex Disk is suitable for simplicity and practicality.

    But I didn’t rely on other people’s clouds and raised my own. The program is called OwnCloud, has desktop and mobile clients, you can also share files in it. And the volume is unlimited; whatever screw you put into the server, that’s what it will be.

    By the way, I use this service from one computer running FREEBSD, and a netbook LUBUNTU







2024 gtavrl.ru.