The Cloud Security Conundrum

The Cloud Security Conundrum

Security is always an issue whenever sensitive data is involved no matter what era it is; this was true during the time of the Greeks and it is true now. The problem, however, is compounded by an ever increasing complexity of technology and the sheer number of hands that have access or may gain access to that data in one way or another. There is a big piece of mind that a large metal box with equally large locks affords when it comes to security; the internet is the opposite. With millions of people having access to the internet and by extension potential have access to all your data, a few of them will bound to have some interest in that data and may possibly have the skills and means to acquire them.

This is the fundamental fear that CISO’s (Chief Information and Security Officer) and system administrators possess towards cloud computing, the public kind. A private cloud can be very secure because outside access can be limited or entirely removed, but that would really not be considered cloud computing in essence even if the same technology is used, it would simply be a private network where benefits like scalability and affordability remain untapped.

They often think that the cloud is inherently insecure. The opposite is actually true. Service providers have a vested interest in keeping their services very secure and even before launching the service they would make sure that their core competency is security. Unlike private clouds where there might be one or two security experts, cloud service providers employ multiple security experts so that they would have a couple of pairs of eyes on the watch 24/7.

There is also a belief that since the cloud is relatively new, therefore it is not yet secure. But this is not true, in fact much of the current security holes and vulnerabilities of the cloud infrastructure exist in traditional network infrastructure because most technology and protocols used are the same. Cloud computing is even more secure because of virtualization. It would be possible to hack into a server, but when there is virtualization and a single hardware is emulating multiple servers via software, it becomes almost impossible to be able to break in environments that exist only in the RAM. The virtual environment can provide more security so investment should be in this regards.

But recent surveys done by various organizations are reporting that not only are companies experiencing increased productivity and large cost savings in their cloud computing solutions, they are also getting the added benefit of increased security. This is a good start in dispelling some of these fears, rather myths, that surround cloud computing. When all apprehension is gone, maybe the real evolution can begin.

By Abdul Salam

Abdul

Abdul Salam is IT professional and an accomplished technical writer with CloudTweaks. He earned his undergraduate degree in Information Technology followed by a postgraduate degree in Business Informatics. Abdul possess over 3 years’ experience in technical & business writing with deep knowledge in Cloud Computing, VMware,Oracle, Oracle ERP, Cloud ERP, Microsoft Technologies and Network Communications (Cisco, Juniper). Visit his LinkedIn profile at: http://linkd.in/TtFu7X

Sorry, comments are closed for this post.

The Industries That The Cloud Will Change The Most

The Industries That The Cloud Will Change The Most

The Industries That The Cloud Will Change The Most Cloud computing is rapidly revolutionizing the way we do business. Instead of being a blurry buzzword, it has become a facet of everyday life. Most people may not quite understand how the cloud works, but electricity is quite difficult to fathom as well. Anyway, regardless of…

Cloud Infographic – Cloud Fast Facts

Cloud Infographic – Cloud Fast Facts

Cloud Infographic – Cloud Fast Facts It’s no secret that Cloud Computing is more than just a buzz term as that ship has sailed off a long time ago. More and more companies are adopting the uses and benefits of cloud computing while aggressively factoring cloud services spending into their budget. Included is an excellent…

Forrester Releases Its “15 Emerging Technologies To Watch Before 2020” Report

Forrester Releases Its “15 Emerging Technologies To Watch Before 2020” Report

15 Emerging Technologies To Watch Before 2020 The cloud, big data, the internet of things, and wearable technology have all featured heavily in Forrester’s latest list of fifteen technologies to watch before 2020. It is becoming a reality for businesses that they need to adapt and change to an increasingly technologically-minded customer base. Traditional marketing…

Cloud Infographic: Corporate IT Security Stats

Cloud Infographic: Corporate IT Security Stats

Cloud Infographic: Corporate IT Security Stats Each week on CloudTweaks we provide a few shoutouts to companies who provide engaging and interesting infographics that reflect our readers interests.  In this case, we have an excellent infographic provided by the team at arellia.com which takes a closer look at cyber-security and some of the biggest malware threats…

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth The Internet of Things is the latest term to describe the interconnectivity of all our devices and home appliances. The goal of the internet of things is to create universal applications that are connected to all of the lights, TVs, door locks, air conditioning, and…

CONNECT TO THE CLOUD

 

Cloud Logo Sponsors

hp Logo CityCloud-PoweredByOpenstack-Bluesquare_logo_100x100-01
cisco_logo_100x100 vmware citrix100
Site 24x7


Contributor Spotlight

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Branded Content Programs

Advertising