About Cloud Service

Rabu, 23 November 2016

Security Cloud Services

Security Cloud Services - Cloud computing has changed the way business is conducted. Elastic compute, storage, and application usage increase innovation and collaboration. With a growing number of connected devices, the cloud also provides the ability to scale up or down to respond quickly to changing market conditions. Yet, many organizations are hesitant to fully leverage the cloud, citing concerns about compliance, data loss, and unauthorized access.

Instantaneous cloud-based access means that vital intellectual property and enterprise and customer data are scattered across multiple infrastructures. Most data centers today have a hybrid infrastructure that spans physical, virtualized, and cloud deployments, both on premises and off premises. The key driver for this massive data center transformation is a need to keep up with the changing compute landscape and, more importantly, to provide agile IT infrastructure services to help meet business expansion goals.

‘Cloud security’ is a broad term referring to the many different security aspects of the cloud – which itself comes in many different forms, each having it own security implications and requirements. Like the cloud itself, cloud security is a relatively recent discipline which is constantly evolving to meet new challenges and demands. Cloud security encompasses all of the different elements of this broad ecosystem, including maintaining the security of data within the cloud itself and between end users and the cloud; ensuring the integrity of apps used to access the cloud and use its services; through to protection of the servers and other hardware that make up cloud infrastructure.

Shadow IT is a great thing until it runs into the security of cloud computing. All too often line-of-business users are establishing applications and moving data into the cloud without understanding all the security implications.

The Cloud Security Alliance has put together a list of the nine most prevalent and serious security threats in cloud computing. Many of them relate in one way or another to the weaknesses implicit in Shadow IT.

The alliance bills its list as the "Notorious Nine: Cloud Computing Threats in 2013." The CSA itself was formed in 2008 on the heels of the Information Systems Security Association CISO Forum in Las Vegas. Jim Reavis, a well-known security researcher and author, issued a call for action to secure the cloud at the event, leading to the founding of the organization.

Although users talk about ‘the cloud’, cloud computing comes in several different forms, each of which has its own specific strengths and weaknesses – both from business and a security perspective.

Because cloud computing is a comparatively new phenomenon, and one that is gaining in scope and complexity all the time, the tools required to maintain its security are also in their infancy. New companies, software and processes are being developed on an ongoing basis. Cloud security tools also lag the development of the cloud itself – predicted by Gartner to reach over $200 billion by 2016 – but are catching up fast. Here are 10 companies that have different offerings for cloud security – some new, some established players, but all worth knowing about.

Share on Facebook
Share on Twitter
Share on Google+
Tags :

Related : Security Cloud Services

0 komentar:

Posting Komentar

Comment This form