Skip to Content

Can you preserve sensitive or secure data in the cloud environment?

 

Explore

Today, I begin a 5-part series of blogs discussing the results of a recent industry survey conducted on behalf of NetIQ to understand the perceptions of cloud security within enterprises worldwide. Extensive in scope, we gather responses from over 200 IT managers (and above) with our questions on cloud security. We targeted security professionals across the North America, EMEA, and APAC regions that were currently employed at companies with at least 500+ employees. The results were often unexpected. Take for example, our question about whether or not IT managers believed their sensitive data would become more, or less, secure as it moves to the cloud (we also gave them the option of saying it was “too soon to tell” how their data security would be impacted.)

When enterprises adopt cloud computing and deploy databases in virtual environments, they run the risk of exposing highly-sensitive data to a broad base of internal and external attacks. Here, Knowledge Center contributor Slavik Markovich offers strategies to help enterprises protect their data when implementing a database security strategy in cloud or virtualized environments. - See more at: http://www.eweek.com/c/a/Cloud-Computing/How-to-Secure-Sensitive-Data-in-Cloud-Environments/#sthash.hZstT7N2.dpuf

 

Watch

  • Managing Security in the Cloud

 

Read

In the last few years, cloud computing has grown from being a promising business concept to one of the fastest growing segments of the IT industry. Now, recession-hit companies are increasingly realizing that simply by tapping into the cloud they can gain fast access to best-of-breed business applications or drastically boost their infrastructure resources, all at negligible cost. But as more and more information on individuals and companies is placed in the cloud, concerns are beginning to grow about just how safe an environment it is. This paper discusses security issues, requirements and challenges that cloud service providers (CSP) face during cloud engineering. Recommended security standards and management models to address these are suggested for technical and business community.

 

  • Subashini, S., and V. Kavitha. 2011. “A Survey on Security Issues in Service Delivery Models of Cloud Computing.” Journal of Network and Computer Applications 34 (1) (January): 1–11. doi:10.1016/j.jnca.2010.07.006.

Cloud computing is a way to increase the capacity or add capabilities dynamically without investing in new infrastructure, training new personnel, or licensing new software. It extends Information Technology’s (IT) existing capabilities. In the last few years, cloud computing has grown from being a promising business concept to one of the fast growing segments of the IT industry. But as more and more information on individuals and companies are placed in the cloud, concerns are beginning to grow about just how safe an environment it is. Despite of all the hype surrounding the cloud, enterprise customers are still reluctant to deploy their business in the cloud. Security is one of the major issues which reduces the growth of cloud computing and complications with data privacy and data protection continue to plague the market. The advent of an advanced model should not negotiate with the required functionalities and capabilities present in the current model. A new model targeting at improving features of an existing model must not risk or threaten other important features of the current model. The architecture of cloud poses such a threat to the security of the existing technologies when deployed in a cloud environment. Cloud service users need to be vigilant in understanding the risks of data breaches in this new environment. In this paper, a survey of the different security risks that pose a threat to the cloud is presented. This paper is a survey more specific to the different security issues that has emanated due to the nature of the service delivery models of a cloud computing system.

Groups:


about seo | book