Top Myths About Cloud Computing

Top Myths About Cloud Computing

Cloud computing has been a hot topic during the last few years for technology specialists all over the world. Cloud computing has been adopted by many enterprises, but still challenges continue to rise. With all the articles and documentation on this subject, there are many myths that have developed over time. So here are the most common myths regarding cloud computing: security, data loss and performance.

Security is compromised in the cloud

Without a doubt, this is the most talked about point. In order to be a successful service provider, cloud providers have to assure the customers or prospects that their data is secure. The security risks that exist in the cloud are no different than the ones that exist in-house. The greatest advantage when outsourcing to cloud is that providers are permanently focused on improving controls and procedures so that the data is always secure, while enterprises might neglect this focus from time to time. So one could argue that a risk could be to remain in a physical environment. Most cloud computing providers also offer the customer different levels of security protection, which allows for more enhanced security.

You lose control of data in the cloud

This is another common myth. Most people think that they will not be able to access their data whenever they need because they cannot see the actual physical SAN/Drive’s that the data is being stored on. With the Cloud, the technology maintenance and support issues are in the hands of the cloud hosting provider, which means a high level of availability and data.  Data in cloud environments is segmented and encrypted and some providers also allow you to control how your data is stored, which would allow your data to be on a shared storage system or dedicated storage.  I have worked with these types of cloud systems and think that flexibility is the future of cloud management.

Performance is a problem in the cloud

It is easier to add additional resources in a cloud environment and if deployed correctly, those resources can be balance and enable you to achieve a higher level of performance and redundancy. The latest servers built for the cloud, like the Cisco UCS that I’m familiar with run on very high performance blades that most companies do not deploy in a physical environment which has allowed us to achieve much more performance over the same systems in a physical environment.  There could be some refactoring of your db’s and applications to take advantage of the cloud to receive the same benefits we have received above.

By Rick Blaisdell / RicksCloud

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…