Amazon Web Services starts to assert itself
How cloud security balances risk versus reward
What are the roadblocks to a worldwide cloud security standard?
The cloud storage phenomenon has resulted in a widely used platform used by both companies and individuals as an easy means to store their data. However, as is typical with new technology, the security has fallen behind and left many users vulnerable to intrusions on their privacy that could result in data loss and theft. This problem is due in large part to the factors that make cloud security difficult. (At Virtual Internet an intense effort has been made to use the latest technology and standards (including ISO 9001 and 27001 certification) to safeguard and...
Demystifying the cloud security hype
You’re already using it
You may already be familiar with the term ‘Real Time Protection’, which could just as easily be labeled ‘Cloud Protection’. Simply put, when a vendor’s research team identifies a new email threat, the characteristics of the message are sent to all affected hardware appliances straightaway, so that the malicious content is immediately blocked. This all happens far ahead of the regular update by on-premise virus signatures.
Because they are outsourced,...
It’s money that matters in the cloud…well, at least ROI
One in three mission critical apps currently in the cloud, says survey
Research from identity management provider SailPoint has revealed that US and UK based IT leaders see one in three mission critical apps as currently in the cloud, with that figure rising sharply by 2015.
The Market Pulse Survey of 400 IT and business leaders, which defined ‘mission critical’ as apps mainly focused on storage, file-sharing and communications, forecast that the number is expected to grow to one in two in three years.
The figures differed slightly dependent on which side of the...
When encryption doesn’t mean more secure
By Ken Smith
I have had a number of clients reach out to me about how to implement whole disk encryption, SQL transparent data encryption, and encryption of VMware VMDK files in order to satisfy “data at rest” security requirements. My response is usually something like “Say that again?”
These types of encryption approaches are designed to better protect data at rest on media that may be accessible to individuals who are not authorized to access such data. This is usually some form of...
When is a stack not a stack? When it’s Unified in the cloud
Why governance must drive all security initiatives…even cloud
I heard these sage words at a recent ISSA (Information Systems Security Association) meeting from a CIO speaking about security from the cloud.