Firewalls in the cloud era: They improve the cloud and the cloud improves them

Firewalls will always be required as they are the sole devices that analyse and control communication of data and applications.

Firewall technology ensures networks are running the way we want them to.  As a result I came to the conclusion that the question is not ‘will on-premise firewalls disappear’, but ‘how will firewalls be influenced by cloud technologies?’.

In order to address this we have to look at some of the history.

Enter Unified Threat Management

10 years ago the...

By Wieland Alge, 13 February 2013, 0 comments. Categories: Architecture, Security.

New Zealand commissioner offers cloudy advice for SMEs

The New Zealand Privacy Commissioner, Marie Shroff, has released a document discussing data and security implications for companies moving to the cloud.

Even though the report looks at the relative basics of cloud computing from an enterprise perspective, the guidelines it recommends still make interesting reading.

The key tenet from the research was that nobody else except the user is ultimately responsible for the information they put in the cloud. “If there’s a privacy breach, you’re...

By James Bourne, 12 February 2013, 0 comments. Categories: Research, Security.

How "policy as a service" is critical for cloud deployments

The financial ROI of cloud security and compliance is judged by decision makers in end-user organisations by the same measures as is done for Cloud computing in general, i.e. by how much it cuts up-front capital expenditure and in-house manual maintenance cost. However, manually translating security policy into technical implementation is difficult, expensive, and error-prone (esp. for the application layer). In order to reduce security related manual maintenance cost at the end-user organisation, security tools need to become more automated. With the emergence of cloud PaaS, it is therefore logical to move all or parts of the model-driven...

By cloudbestpractices.net, 08 February 2013, 0 comments. Categories: Infrastructure, PaaS, Security.

5 biggest mistakes admins make with cloud firewalls

firewall-dome9The cloud can be a great investment for most organisations. It offers the promise to significantly increase capacity and agility, while simultaneously reducing costs. Companies invest significant resource to attain a great ROI in the cloud, but if that investment isn’t secured, migrating could turn out to be a disaster. Most cloud adopters underestimate the philosophical and technological change required to security when migrating to the cloud. It’s a problem that affects...

By Dome9, 07 February 2013, 0 comments. Categories: Migration, Security.

Can your business stay secure in the cloud?

Cloud security is not a paradox!

 “Is cloud computing secure?” A question that has been asked since the dawn of “the cloud” and the answer has been debated many times over. Cloud security has been a long, never-ending discussion and more often than not evidence shows businesses rarely regret taking the plunge into a cloud infrastructure.

Despite the misconception that the cloud is entirely unprotected, there has still been a phenomenal growth in the cloud market in recent years....

By maildistiller, 07 February 2013, 0 comments. Categories: Infrastructure, Security.

New cyber threats within the internet of everything

Cisco released findings from two global studies that provide a vivid picture of the rising security challenges that businesses, IT departments and individuals face -- particularly as employees become more mobile, blending work and personal lifestyles throughout their waking hours. Despite popular assumptions that security risks increase as a person's online activity becomes shadier, findings from the Cisco 2013 Annual Security Report (ASR) reveal that the highest concentration of online security threats tend to target legitimate destinations visited by...

By David H Deans, 04 February 2013, 0 comments. Categories: Security.

Data Privacy Day reminds us of the importance of transparency

Luca Schiavoni, Analyst, Regulation, Ovum

The celebration of the Data Privacy Day on January 28, 2013 came at a moment when awareness of the importance of the matter is higher than it has ever been. However, many obstacles get in the way of full data privacy, including companies’ unwillingness to fully disclose what they do with their users’ data, consumers’ unwillingness to actually read lengthy terms and conditions pages when signing up to a service, and the fact that some companies’ business models...

By Ovum StraightTalk, 31 January 2013, 0 comments. Categories: Big Data, Security.

Cloud increases chance of denial-of-service attacks, report warns

The eighth annual Worldwide Infrastructure Security Report from security provider Arbor Networks has revealed how cloud services and data centres are “increasingly victimised” by cyber attackers.

The report, which looked at a 12 month period ending September 2012, asked nearly 200 security-based questions to 130 respondents in the enterprise and network operator fields.

The key points of the research were:

  • 94% of data centre operators reported security attacks
  • 76% had suffered distributed denial of service (DDoS) attacks towards their customers, whilst...

By James Bourne, 29 January 2013, 0 comments. Categories: Big Data, Security.

Symantec survey examines increase in “rogue clouds”

A new research report from Symantec has warned against the use of ‘rogue’ clouds for best practice.

The survey, entitled ‘Avoiding the Hidden Costs of Cloud’, spoke to IT execs at 3,236 organisations across nearly 30 countries worldwide and found that there was a link between using rogue clouds and losing confidential information, resulting in hidden costs.

A rogue cloud is one which is...

By James Bourne, 21 January 2013, 0 comments. Categories: Enterprise, Research, Security.

Is cloud computing ready for prime time?

By John Dixon, Senior Solutions Architect

A few weeks ago, I took part in another engaging tweetchat on cloud computing. The topic: is cloud computing ready for enterprise adoption? You can find the transcript here.

As usual with tweetchats hosted by CloudCommons, five questions are presented a few days in advance of the event. This time around, the questions were:

  • Is public cloud mature enough for enterprise adoption?
  • Should public cloud be a part of every...
  • By GreenPages Technology Solutions, 10 January 2013, 0 comments. Categories: Enterprise, Public, Security, Virtualisation.

    5 cloud server security tips for 2013

    5-Tips-Circle-LargeIf you’re like most, cloud is going to be a big part of your life in 2013. So to help you start the year off right, we’ve prepared the following tips for securing your cloud servers. Here are your 5 cloud security tips for 2013 (in no particular order): Tip #1: Lock down the server firewall Big surprise – a firewall management service provider telling you to lockdown the firewall, but putting aside the...

    By Dome9, 09 January 2013, 0 comments. Categories: Best Practice, Security.

    Amazon Web Services starts to assert itself

    By Laurent Lachal, Senior Analyst, Ovum SoftwareAt the end of November 2012, Amazon Web Services (AWS) held its first partner and customer conference in Las Vegas. Dubbed AWS “re: Invent”, the event was a success. It enabled AWS to assert itself as a large and influential player in the IT marketplace. However, as well as AWS’s strengths, it also highlighted some of its traditional weaknesses. These include poor communications and an inability to put forward messages adapted to the needs of enterprise executives.

    A...

    By Ovum StraightTalk, 08 January 2013, 0 comments. Categories: Enterprise, IaaS, Security.

    How cloud security balances risk versus reward

    riskrewardI spend a great deal of my day thinking about security. How it affects the enterprise; how to best position and protect assets. How it shapes risk management and how it delivers potential benefits through smoother operations, enhanced trust and loss prevention.

    At its core, security is...

    By Cloud Security, 04 January 2013, 0 comments. Categories: Security.

    What are the roadblocks to a worldwide cloud security standard?

    The cloud storage phenomenon has resulted in a widely used platform used by both companies and individuals as an easy means to store their data. However, as is typical with new technology, the security has fallen behind and left many users vulnerable to intrusions on their privacy that could result in data loss and theft. This problem is due in large part to the factors that make cloud security difficult. (At Virtual Internet an intense effort has been made to use the latest technology and standards (including ISO 9001 and 27001 certification) to safeguard and...

    By VI, 03 January 2013, 0 comments. Categories: Security, Storage.

    Demystifying the cloud security hype

    You’re already using it

    You may already be familiar with the term ‘Real Time Protection’, which could just as easily be labeled ‘Cloud Protection’. Simply put, when a vendor’s research team identifies a new email threat, the characteristics of the message are sent to all affected hardware appliances straightaway, so that the malicious content is immediately blocked. This all happens far ahead of the regular update by on-premise virus signatures.

    Because they are outsourced,...

    By Wieland Alge, 21 December 2012, 0 comments. Categories: Security.

    One in three mission critical apps currently in the cloud, says survey

    Research from identity management provider SailPoint has revealed that US and UK based IT leaders see one in three mission critical apps as currently in the cloud, with that figure rising sharply by 2015.

    The Market Pulse Survey of 400 IT and business leaders, which defined ‘mission critical’ as apps mainly focused on storage, file-sharing and communications, forecast that the number is expected to grow to one in two in three years.

    The figures differed slightly dependent on which side of the...

    By James Bourne, 12 December 2012, 0 comments. Categories: Applications, Research, Security.