Can The Security Models Of Google And IBM Combine To Improve Cloud Security?

Can The Security Models Of Google And IBM Combine To Improve Cloud Security?

People know Google as a consumer-savvy multinational while they see IBM as a product-oriented company. While the former is famous for its rollercoaster of search services and e-mail hosting platforms, the latter is the mind behind many applications and devices the IT community uses now. It is worthwhile to know that four years ago, the two Internet and electronic giants agreed to lock heads on what many deem to be the blooming trend of the tender century—cloud computing. The question is: will they manage to create a major package that will serve the security requirements of both the public and enterprises?

A fair answer could emerge by evaluating the separate cloud models of the two companies. Google is famous for its service-oriented cloud facilitation, with services including e-mail sharing, search engine, and everything in-between. It has also gone to the technological field through Android gadgets which are also using various cloud models. There are also programs like Google Maps that guide people to search places if caught up on the wrong side of geography.

IBM, on the other hand, has been steady on applications. In fact, some analysts consider the company to be more academia-focused than showy. However, no one can deny that its programs have contributed immensely in transforming the web to what it is today.

After this evaluation it is possible to find how the two companies can combine their separate models for a more secure cloud environment. They can improve cloud computing by using IBM’s apps to transform the Platform as a Service (PaaS) dispensation. At the same time, they can utilize the sharing model of the e-mail and social media to interact with many people, at once, when using their programs.

Security

The security of such a partnership would be the main issue of concern. They would have to find a way to encrypt data as it passes from the access to the core layers of security models. Luckily enough, apps (like those of IBM) sometimes offer safety automatically. They can serve as the starting point for safety. It is also true that the search engine company (Google) can synchronize its apps with those of IBM and create a more dynamic layer of open source interactions. This would have a double security dispensation—before one moves to retrieve data, the devices will have to request for passwords; others will automatically bring up firewalls against transgressors of private clouds.

It’s even possible that a Google-IBM partnership may improve cloud computing in analytics. Research in trends would reveal the dens of insecurity through frequent customer concerns.

By John Omwamba

About Abdul

Abdul is a senior consultant with Energy Services, and author of numerous blogs, books, white papers, and tutorials on cloud computing and accomplished technical writer with CloudTweaks. He earned his bachelor’s degree in Information Technology, followed by an MBA-IT degree and certifications by Cisco and Juniper Networks.

He has recently co-authored: Deploying and Managing a Cloud Infrastructure: Real-World Skills for the CompTIA Cloud+ Certification (Wiley).

View All Articles

Sorry, comments are closed for this post.

The Success Formula For Private Cloud Deployments

The Success Formula For Private Cloud Deployments

OpenStack For Private Clouds On February 15th Tom Bittman of Gartner published a blog which asserted that 95% of Private Clouds are Failing. When an industry analyst makes a statement that big, in one of the top three priorities for enterprise CIOs today, it’s critical that we as an industry step back and understand how we…

The Internet of Things And The Knowledge Revolution

The Internet of Things And The Knowledge Revolution

The Knowledge Revolution Think about a few things in your life right now. It really doesn’t matter what they are, as long as you interact with them daily. They could be your phone, your shoes, your watch, your car, your refrigerator, your garage door opener…you get the idea. What do all of these things have…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

The Global Impact of the USA Freedom Act on Cloud Adoption

The Global Impact of the USA Freedom Act on Cloud Adoption

The Global Impact On Cloud Adoption It’s hard to believe it has been a little over 18 months since Edward Snowden first revealed information about the NSA’s secret surveillance programs to the world. Since that day in June 2013 data privacy and security, specifically in the cloud, have taken on a whole new level of…

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing Despite the rapid growth of cloud computing, the cloud still commands a small portion of overall enterprise IT spending. Estimates I’ve seen put the percentage between 5% and 10% of the slightly more than $2 trillion (not including telco) spent worldwide in 2014 on enterprise IT. Yet growth projections…

It Takes a Village to Raise a Cloud

It Takes a Village to Raise a Cloud

The Community Cloud “We are special. We have unique needs. Our demands for compliance and security go way above your average organization. There is no way we are going to put our precious data in a public cloud. It is just a non-starter.” Sound familiar? This kind of reasoning is often the driver behind either…

What Agency Can Benefit The Most From IoT/CSP?

What Agency Can Benefit The Most From IoT/CSP?

What Agency Can Benefit The Most? I was recently giving a talk to some students when one of them asked me a question I hadn’t heard before. She said “How does the Internet of Things really impact the government? What agency benefits the most from IoT/CPS?” I paused for a moment, it is a great…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor