SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
WHITE PAPER
SECURITY
OF THE CLOUD
Enterprise IT is transitioning from the use
of traditional on-premise data centers to
hybrid cloud environments. As a result,
we’re experiencing a paradigm shift in
the way we must think about and manage
enterprise security.
From Four Walls to No Walls
Until now, the conventional view on IT security has been that applications
and data are safe because they’re physically housed within the confines
of a company’s data center walls using company-owned equipment. So,
it’s not surprising that many decision makers perceive greater risks as they
trade physical assets for cloud-based solutions. Pre-cloud, data security
focused on physical access and control, network security, and device
threats. However, in the cloud world, OPEX infrastructure models are
the norm. Corporate data constantly moves to/from company-owned
equipment, to/from non-corporate devices, and it traverses both Layer 2
and Layer 3 network segments. IT personnel need to address encryption,
authentication, and authorization (identity management) security strate-
gies at the physical, data link, network, transport, session, presentation,
and application layers.
The majority of the security budget once went to protecting the perimeter
of the enterprise. Now, because of compliance mandates and the nature
of cloud computing, security must be woven into every functional area of
the company— from each business unit’s infrastructure and line of business
applications to externally sourced SaaS service agreements and identity
management systems. Note that it’s important to consider the dynamics
of security within the cloud whether you adopt cloud-based application
delivery or not.
CONSIDERTH E DY N A M I C S O F
S E CU R IT Y WITH I N
TH E C LO U D
WHITE PAPER
SECURITY OF THE CLOUD
PAGE 2
Business-Critical Computing in the Cloud
YOUR CHALLENGE: ADOPT CLOUD AND SECURE IT
Cloud computing opens up new avenues of collaboration, cost
management, and convenience. Now you have a more agile way
to deliver business-critical information with business partners,
consumers, and end-users. You can minimize operational expenses
by leveraging pooled resources and paying for just what you
need, as you need it. And you can support the convenient mobile
data access your users demand.
Business-critical computing on-premise
» Over-buying to meet highest anticipated demand
» Dedicated storage
» Dedicated compute
» Control: only the devices are mobile, not the apps
» Security budget dedicated to protecting the perimeter
and controlling access
Business-critical computing in the cloud
» Pooled resources, scale on-demand
» Shared networking and compute in public clouds
» Delivery via the Internet in public clouds
» Security must be embedded within every layer and application
when delivering via public infrastructure
» Private hosted clouds can be leveraged to deliver cloud
economics without re-architecture
Cloud computing paves the way for IT advancements. But, without
the proper cloud security mechanisms in place, your enterprise
risks data leaks and security breaches. Cloud security fortifies IT
efforts at every layer. The strength of that security depends upon
the type of cloud you choose, the infrastructure supporting it, your
service providers, and the identity management tools you use to
collaborate with employees, partners, and consumers.
Security in Public, Private and Hybrid Clouds
Cloud computing can be divided into two general camps: public,
in which the network, compute, and storage are multi-tenanted
with little or no SLA on availability; and private, in which resources
are dedicated, architected for high availability, and backed with
SLA guarantees. When it comes to flexibility and economy, both
types of cloud deliver with ease. When it comes to security, how-
ever, private clouds can offer significant advantages over public.
PUBLIC
The public cloud can be a hostile environment. You will have
limited or no visibility into the underlying infrastructure and
security controls. Nor will you have control over who’s sharing
your resources and the risks they could potentially introduce
into the host system or data stores. Therefore, public clouds
require a holistic approach to security: every component of the
infrastructure must be secure and auditable in order to support
business-critical computing and compliance.
Tips when considering public cloud
» Be wary of network QOS and DDOS mitigation. Your public
cloud probably doesn’t manage this for you.
» Be wary of noisy neighbor syndrome. Does your provider
offer performance guarantees?
» Ensure adequate data security and firewalling
of your environment.
» Ensure adequate authentication and security controls.
Fortunately, tools are being developed to give IT administrators
back some level of control over data in public clouds. Citrix,
NetApp, and VMware each offer forms of cloud-level data
management. Citrix ShareFile, for example, provides a hybrid
approach to public clouds. Data can live wherever it’s needed
but is always under the control of the ShareFile control plane.
Data can’t be shared without permission, and data that’s managed
remotely can be wiped clean no matter what device it’s on.
EVERYLEVELC LO U D S E C U R IT Y F O R T I F I E S IT DATA A N D S E C U R IT Y AT
PAG E 3
PRIVACY
AND SECURIT Y ARE
THE LINCHPINS OF
BUSINESS - CRITICAL
COMPUTING
PRIVATE
A private cloud is a virtualized datacenter within the cloud.
Think of it as relocating your data center to an offsite location:
you have dedicated compute, network, and storage resources
that you manage as your own, just like you did on-premise. In
this way, you can leverage the economics of the cloud without
reworking business processes and applications to accommodate
the rigorous security demands of public clouds. In the case of
Faction’s private hosted cloud, you can ‘come as you are’ and bring
your own security (BYOS) or network (BYON) thanks in part to
our Cloud’s Faction-to-Faction Layer 2 Direct Connect service.
Private clouds are especially advantageous to shops with tight
regulatory requirements or limited resources.
Tips when considering private cloud
» Make sure your cloud provider lets you bring your own
security capabilities. Don’t settle for your provider’s options;
use yours. You’ve tested it. You use it. You trust it.
» Ask your provider about their private networking and vLAN
capabilities. Ideally you want Layer 2 connections to/from your
customer premise, data centers and from cloud to cloud. With
Layer 2 you maintain network isolation and reduce complexities.
At Faction, for example, customers can bring their network to
our Cloud as-is. We eliminate the need to provision and manage
complex firewalls, routers, and Spanning Tree Protocol [STP].
HYBRID
In some cases, the best methodology will command the resources
of both private and public clouds. This hybrid approach supports
the shift from traditional, singlesystem to multi-tiered application
deployment. It also increases the available resources for test and
development, business continuity, and managing resource demand
spikes. To support data privacy and prevent leaks, all data moving
between private and public clouds must be encrypted, and
access to it must be tied to user identities.
Tips when considering hybrid cloud
» Ensure your cloud provider offers flexible usage of their storage
and compute resources. In other words, if all you need is storage,
does your cloud provider allow you to just buy storage?
» Determine whether your cloud provider gives you the ability
to leverage existing tools, such as VMware APIs.
» Make sure your cloud provider allows you the ability to provision
and leverage your existing vLAN topology. With Layer 2 private
connectivity, you can use the same connection to access both
public and private resources while maintaining network
separation between public and private environments.
Fortunately, tools are being developed to give IT administrators
back some level of control over data in public clouds. Citrix,
NetApp, and VMware each offer forms of cloud-level data
management. Citrix ShareFile, for example, provides a hybrid
approach to public clouds. Data can live wherever it’s needed
but is always under the control of the ShareFile control plane.
Data can’t be shared without permission, and data that’s managed
remotely can be wiped clean no matter what device it’s on.
Compliance and the Cloud Service Provider
Whichever type of cloud strategy you choose—public, private or
a combination of both—your cloud provider will play a key role
in its success. You’ll have many factors to consider in selecting
your provider, but for the purposes of this paper, we’ll focus on
compliance, since customer privacy and data security are the
linchpins of business-critical computing for many industries.
(For more insight into the many factors to consider, read our
whitepaper, Tips for Selecting Your Cloud Service Provider.)
To make sure the service provider can live up to the promises
they’re making, ask for the results of a third-party compliance
audit. Look for audit capabilities like SSAE-16 SOC 1/2 and the
ability to ink HIPAA Business Associate Agreements (BAA). Many
agreements are multi-layered these days, so a key differentiator
among cloud providers is their ability and willingness to work
with consulting firms and other business entities to execute
on these agreements.
Keep in mind that certifications are often only a stepping stone
to actual audit performance. Be sure the provider has the
personnel to support your audits and is willing to adapt to your
individual needs rather than dictating how you should approach
security. If you can take advantage of a provider’s ability to be
flexible with Layer 2 networking, for example, you’ll benefit from
a compliance cost standpoint because it allows you to recoup
your network and security architecture investment and limit
your exposure to risk by minimizing technology changes and
subsequent process change.
PAGE 4
Identity Management and
Application Integration
Adopting applications in the new world of the cloud isn’t just
a matter of selecting the best applications to get the job done.
Now you need to figure out how each application will integrate
with your authentication (identity management) requirements.
For example, requiring users to maintain multiple logins for
multiple applications often negates the convenience factor of
cloud access and injects new risks. From a human interaction
standpoint, it erodes efficiency and security (who can remember
all those logins and passwords without writing them down
somewhere?). Instead, use identity management tools to rapidly
provision and deprovision users while maintaining the convenience
of simple logon processes. There are a variety of ways to achieve
a secure hybrid cloud deployment.
Methods for securing hybrid cloud deployments:
» Use secure file sharing tools to allow data sharing while
controlling compliance
» Use identity management tools to rapidly provision and
de-provision users
» Implement single sign-on (SSO) to eliminate password
proliferation and the associated risks
» Utilize multi-factor authentication mechanisms as required
» Integrate new applications with identity management systems
» Drive higher levels of access control to data and databases
As we tear down the walls protecting the perimeter of our
enterprises and open new conduits to communication, collabo-
ration, and mobility, most IT departments have moved security
and data privacy to the top of their priority lists. And for good
reasons: maintaining compliance, protecting reputations, and
improving workforce productivity to name a few. Fortunately,
security and cloud computing aren’t mutually exclusive. Secure
cloud computing can be achieved with the proper tools, service
providers, business associate agreements, and the deliberate
integration of applications and enterprise-wide identity
management systems.
About Faction
Faction is an enterprise-class IaaS cloud service provider offer-
ing private, public,  hybrid cloud solutions through channel
partners. At Faction we supply cloud the way you want it with
extreme performance, deep control, and broad customization
capabilities. When you join the Faction fold, you take back the
keys to your kingdom. Reign as supreme commander in chief of
your cloud. No compromises. No exceptions.
Faction is the only cloud that offers patented plug-and-play
direct connections (via layer 2) into its cloud resulting in huge
time savings (no time spent re-configuring everything)! With
Type II SSAE 16 and SOC 1  2 compliant cloud nodes in eight
geographies across the United States and in Europe (Seattle,
Santa Clara, Denver, Chicago, Atlanta, New Jersey, New York,
and the United Kingdom), Faction offers both Cisco UCS and
Open Compute platforms, is a Platinum-level NetApp Service
Provider, and is VMware vCloud® Powered. For more informa-
tion, visit www.factioninc.com or call (855) 532-4734.
RICKVINCENTDIRECTOR OF SOLUTIONS ENGINEERING
About the Author
As Director of Solution Engineering for Faction, Richard
Vincent is responsible for architecting robust IAAS
solutions, for channel partners and enterprises, enabling
them to conduct business with compelling differentiation.
Prior to joining Faction, Mr. Vincent served as a Storage
Solution Executive at Dell, performed as an independent
cloud consultant, and held the position of Director, Data
Center Computing for Global Technology Resources, Inc
GTRI. Mr. Vincent is a graduate of the University of Georgia,
College of Business and is fluent in the Japenese language.
www.cloudsmartz.com
Copyright 2015 CloudSmartz, Inc. All Rights Reserved. All other logos and trademarks are the property of the
respective trademark owners.
1-800-836-2050

Más contenido relacionado

La actualidad más candente

Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesKresimir Popovic
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0David Spinks
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security IssuesStelios Krasadakis
 
PRISMACLOUD Cloud Security and Privacy by Design
PRISMACLOUD Cloud Security and Privacy by DesignPRISMACLOUD Cloud Security and Privacy by Design
PRISMACLOUD Cloud Security and Privacy by DesignPRISMACLOUD Project
 
Cloud computing understanding security risk and management
Cloud computing   understanding security risk and managementCloud computing   understanding security risk and management
Cloud computing understanding security risk and managementShamsundar Machale (CISSP, CEH)
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationCloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationVenkateswar Reddy Melachervu
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportVivek Maurya
 
Cloud Computing: legal issues
Cloud Computing: legal issuesCloud Computing: legal issues
Cloud Computing: legal issuesISPABelgium
 
Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Brian K. Dickard
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issuesAleem Mohammed
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 
Cloud Security Issues 1.04.10
Cloud Security  Issues 1.04.10Cloud Security  Issues 1.04.10
Cloud Security Issues 1.04.10Rugby7277
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNithin Raj
 

La actualidad más candente (20)

Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cloud security (domain6 10)
Cloud security (domain6 10)Cloud security (domain6 10)
Cloud security (domain6 10)
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security Issues
 
PRISMACLOUD Cloud Security and Privacy by Design
PRISMACLOUD Cloud Security and Privacy by DesignPRISMACLOUD Cloud Security and Privacy by Design
PRISMACLOUD Cloud Security and Privacy by Design
 
Cloud security
Cloud security Cloud security
Cloud security
 
Cloud computing understanding security risk and management
Cloud computing   understanding security risk and managementCloud computing   understanding security risk and management
Cloud computing understanding security risk and management
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationCloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
 
Cloud security and adoption
Cloud security and adoptionCloud security and adoption
Cloud security and adoption
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
 
Cloud Computing: legal issues
Cloud Computing: legal issuesCloud Computing: legal issues
Cloud Computing: legal issues
 
Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Authentication cloud
Authentication cloudAuthentication cloud
Authentication cloud
 
Cloud Security Issues 1.04.10
Cloud Security  Issues 1.04.10Cloud Security  Issues 1.04.10
Cloud Security Issues 1.04.10
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Cloud security (domain11 14)
Cloud security (domain11 14)Cloud security (domain11 14)
Cloud security (domain11 14)
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 

Similar a Whitepaper: Security of the Cloud

Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar reportshafzonly
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docxcherry686017
 
CLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACHCLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACHSHAIMA A R
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfCiente
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
 
wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125Gabor Bokor
 
Cloud computing
Cloud computingCloud computing
Cloud computingHira Zahan
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfDataSpace Academy
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDSweta Kumari Barnwal
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...AJASTJournal
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...AJASTJournal
 
Cloud Computing_presentation.pptx
Cloud Computing_presentation.pptxCloud Computing_presentation.pptx
Cloud Computing_presentation.pptxGopalThapa9
 
Best cloud computing training institute in noida
Best cloud computing training institute in noidaBest cloud computing training institute in noida
Best cloud computing training institute in noidataramandal
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogativeWayne Poggenpoel
 

Similar a Whitepaper: Security of the Cloud (20)

Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docx
 
Securing The Journey To The Cloud
Securing The Journey To The Cloud Securing The Journey To The Cloud
Securing The Journey To The Cloud
 
CLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACHCLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACH
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
Cloud computings
Cloud computingsCloud computings
Cloud computings
 
cloud1_aggy.pdf
cloud1_aggy.pdfcloud1_aggy.pdf
cloud1_aggy.pdf
 
wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTINGSECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTING
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
 
Cloud Computing_presentation.pptx
Cloud Computing_presentation.pptxCloud Computing_presentation.pptx
Cloud Computing_presentation.pptx
 
Best cloud computing training institute in noida
Best cloud computing training institute in noidaBest cloud computing training institute in noida
Best cloud computing training institute in noida
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogative
 

Más de CloudSmartz

CIO APAC Magazing: Jumping the SDN/NFV Disillusion Curve
CIO APAC Magazing: Jumping the SDN/NFV Disillusion CurveCIO APAC Magazing: Jumping the SDN/NFV Disillusion Curve
CIO APAC Magazing: Jumping the SDN/NFV Disillusion CurveCloudSmartz
 
CIO APAC Magazing: A 360 View of SDN/NFV
CIO APAC Magazing: A 360 View of SDN/NFVCIO APAC Magazing: A 360 View of SDN/NFV
CIO APAC Magazing: A 360 View of SDN/NFVCloudSmartz
 
CloudSmartz White Paper: Real Time IT
CloudSmartz White Paper: Real Time ITCloudSmartz White Paper: Real Time IT
CloudSmartz White Paper: Real Time ITCloudSmartz
 
Cloudsmartz Case Study - FiberSuite for FiberTech
Cloudsmartz Case Study - FiberSuite for FiberTech Cloudsmartz Case Study - FiberSuite for FiberTech
Cloudsmartz Case Study - FiberSuite for FiberTech CloudSmartz
 
Cloudsmartz Case Study - Pacnet App Dev
Cloudsmartz Case Study - Pacnet App DevCloudsmartz Case Study - Pacnet App Dev
Cloudsmartz Case Study - Pacnet App DevCloudSmartz
 
CloudSmartz Case Study - Cloud/IaaS Services
CloudSmartz Case Study - Cloud/IaaS ServicesCloudSmartz Case Study - Cloud/IaaS Services
CloudSmartz Case Study - Cloud/IaaS ServicesCloudSmartz
 
Cloudsmartz Case Study: Managed Services
Cloudsmartz Case Study: Managed ServicesCloudsmartz Case Study: Managed Services
Cloudsmartz Case Study: Managed ServicesCloudSmartz
 
CloudSmartz Case Study: Development Services
CloudSmartz Case Study: Development ServicesCloudSmartz Case Study: Development Services
CloudSmartz Case Study: Development ServicesCloudSmartz
 
CloudSmartz Digital CX Delivery Brochure
CloudSmartz Digital CX Delivery BrochureCloudSmartz Digital CX Delivery Brochure
CloudSmartz Digital CX Delivery BrochureCloudSmartz
 
CloudSmartz SDxSuite Brochure
CloudSmartz SDxSuite BrochureCloudSmartz SDxSuite Brochure
CloudSmartz SDxSuite BrochureCloudSmartz
 
CloudSmartz SDxSuite Brochure
CloudSmartz SDxSuite BrochureCloudSmartz SDxSuite Brochure
CloudSmartz SDxSuite BrochureCloudSmartz
 
Software-Defined Networking & Network Function Virtualization
Software-Defined Networking & Network Function VirtualizationSoftware-Defined Networking & Network Function Virtualization
Software-Defined Networking & Network Function VirtualizationCloudSmartz
 
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...CloudSmartz
 
[BROCHURE] Choosing the Right MSP to support All of Your Business Devices
[BROCHURE] Choosing the Right MSP to support All of Your Business Devices[BROCHURE] Choosing the Right MSP to support All of Your Business Devices
[BROCHURE] Choosing the Right MSP to support All of Your Business DevicesCloudSmartz
 
CloudSmartz Layer 2 Direct Connect [Factsheet] | Smarter Transformation
CloudSmartz Layer 2 Direct Connect [Factsheet] | Smarter TransformationCloudSmartz Layer 2 Direct Connect [Factsheet] | Smarter Transformation
CloudSmartz Layer 2 Direct Connect [Factsheet] | Smarter TransformationCloudSmartz
 
CloudSmartz Disaster Recovery [Use Case] | Smarter Transformation
CloudSmartz Disaster Recovery [Use Case] | Smarter TransformationCloudSmartz Disaster Recovery [Use Case] | Smarter Transformation
CloudSmartz Disaster Recovery [Use Case] | Smarter TransformationCloudSmartz
 

Más de CloudSmartz (16)

CIO APAC Magazing: Jumping the SDN/NFV Disillusion Curve
CIO APAC Magazing: Jumping the SDN/NFV Disillusion CurveCIO APAC Magazing: Jumping the SDN/NFV Disillusion Curve
CIO APAC Magazing: Jumping the SDN/NFV Disillusion Curve
 
CIO APAC Magazing: A 360 View of SDN/NFV
CIO APAC Magazing: A 360 View of SDN/NFVCIO APAC Magazing: A 360 View of SDN/NFV
CIO APAC Magazing: A 360 View of SDN/NFV
 
CloudSmartz White Paper: Real Time IT
CloudSmartz White Paper: Real Time ITCloudSmartz White Paper: Real Time IT
CloudSmartz White Paper: Real Time IT
 
Cloudsmartz Case Study - FiberSuite for FiberTech
Cloudsmartz Case Study - FiberSuite for FiberTech Cloudsmartz Case Study - FiberSuite for FiberTech
Cloudsmartz Case Study - FiberSuite for FiberTech
 
Cloudsmartz Case Study - Pacnet App Dev
Cloudsmartz Case Study - Pacnet App DevCloudsmartz Case Study - Pacnet App Dev
Cloudsmartz Case Study - Pacnet App Dev
 
CloudSmartz Case Study - Cloud/IaaS Services
CloudSmartz Case Study - Cloud/IaaS ServicesCloudSmartz Case Study - Cloud/IaaS Services
CloudSmartz Case Study - Cloud/IaaS Services
 
Cloudsmartz Case Study: Managed Services
Cloudsmartz Case Study: Managed ServicesCloudsmartz Case Study: Managed Services
Cloudsmartz Case Study: Managed Services
 
CloudSmartz Case Study: Development Services
CloudSmartz Case Study: Development ServicesCloudSmartz Case Study: Development Services
CloudSmartz Case Study: Development Services
 
CloudSmartz Digital CX Delivery Brochure
CloudSmartz Digital CX Delivery BrochureCloudSmartz Digital CX Delivery Brochure
CloudSmartz Digital CX Delivery Brochure
 
CloudSmartz SDxSuite Brochure
CloudSmartz SDxSuite BrochureCloudSmartz SDxSuite Brochure
CloudSmartz SDxSuite Brochure
 
CloudSmartz SDxSuite Brochure
CloudSmartz SDxSuite BrochureCloudSmartz SDxSuite Brochure
CloudSmartz SDxSuite Brochure
 
Software-Defined Networking & Network Function Virtualization
Software-Defined Networking & Network Function VirtualizationSoftware-Defined Networking & Network Function Virtualization
Software-Defined Networking & Network Function Virtualization
 
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
 
[BROCHURE] Choosing the Right MSP to support All of Your Business Devices
[BROCHURE] Choosing the Right MSP to support All of Your Business Devices[BROCHURE] Choosing the Right MSP to support All of Your Business Devices
[BROCHURE] Choosing the Right MSP to support All of Your Business Devices
 
CloudSmartz Layer 2 Direct Connect [Factsheet] | Smarter Transformation
CloudSmartz Layer 2 Direct Connect [Factsheet] | Smarter TransformationCloudSmartz Layer 2 Direct Connect [Factsheet] | Smarter Transformation
CloudSmartz Layer 2 Direct Connect [Factsheet] | Smarter Transformation
 
CloudSmartz Disaster Recovery [Use Case] | Smarter Transformation
CloudSmartz Disaster Recovery [Use Case] | Smarter TransformationCloudSmartz Disaster Recovery [Use Case] | Smarter Transformation
CloudSmartz Disaster Recovery [Use Case] | Smarter Transformation
 

Último

New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateCannaBusinessPlans
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
BeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdfBeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdfDerekIwanaka1
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingNauman Safdar
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdflaloo_007
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 
Cracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareCracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareWorkforce Group
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Timegargpaaro
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Falcon Invoice Discounting
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...meghakumariji156
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxCynthia Clay
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon investment
 
Buy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified Binance Account
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1kcpayne
 

Último (20)

New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
BeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdfBeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdf
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Cracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareCracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' Slideshare
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Buy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From Seosmmearth
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 

Whitepaper: Security of the Cloud

  • 1. WHITE PAPER SECURITY OF THE CLOUD Enterprise IT is transitioning from the use of traditional on-premise data centers to hybrid cloud environments. As a result, we’re experiencing a paradigm shift in the way we must think about and manage enterprise security. From Four Walls to No Walls Until now, the conventional view on IT security has been that applications and data are safe because they’re physically housed within the confines of a company’s data center walls using company-owned equipment. So, it’s not surprising that many decision makers perceive greater risks as they trade physical assets for cloud-based solutions. Pre-cloud, data security focused on physical access and control, network security, and device threats. However, in the cloud world, OPEX infrastructure models are the norm. Corporate data constantly moves to/from company-owned equipment, to/from non-corporate devices, and it traverses both Layer 2 and Layer 3 network segments. IT personnel need to address encryption, authentication, and authorization (identity management) security strate- gies at the physical, data link, network, transport, session, presentation, and application layers. The majority of the security budget once went to protecting the perimeter of the enterprise. Now, because of compliance mandates and the nature of cloud computing, security must be woven into every functional area of the company— from each business unit’s infrastructure and line of business applications to externally sourced SaaS service agreements and identity management systems. Note that it’s important to consider the dynamics of security within the cloud whether you adopt cloud-based application delivery or not. CONSIDERTH E DY N A M I C S O F S E CU R IT Y WITH I N TH E C LO U D
  • 2. WHITE PAPER SECURITY OF THE CLOUD PAGE 2 Business-Critical Computing in the Cloud YOUR CHALLENGE: ADOPT CLOUD AND SECURE IT Cloud computing opens up new avenues of collaboration, cost management, and convenience. Now you have a more agile way to deliver business-critical information with business partners, consumers, and end-users. You can minimize operational expenses by leveraging pooled resources and paying for just what you need, as you need it. And you can support the convenient mobile data access your users demand. Business-critical computing on-premise » Over-buying to meet highest anticipated demand » Dedicated storage » Dedicated compute » Control: only the devices are mobile, not the apps » Security budget dedicated to protecting the perimeter and controlling access Business-critical computing in the cloud » Pooled resources, scale on-demand » Shared networking and compute in public clouds » Delivery via the Internet in public clouds » Security must be embedded within every layer and application when delivering via public infrastructure » Private hosted clouds can be leveraged to deliver cloud economics without re-architecture Cloud computing paves the way for IT advancements. But, without the proper cloud security mechanisms in place, your enterprise risks data leaks and security breaches. Cloud security fortifies IT efforts at every layer. The strength of that security depends upon the type of cloud you choose, the infrastructure supporting it, your service providers, and the identity management tools you use to collaborate with employees, partners, and consumers. Security in Public, Private and Hybrid Clouds Cloud computing can be divided into two general camps: public, in which the network, compute, and storage are multi-tenanted with little or no SLA on availability; and private, in which resources are dedicated, architected for high availability, and backed with SLA guarantees. When it comes to flexibility and economy, both types of cloud deliver with ease. When it comes to security, how- ever, private clouds can offer significant advantages over public. PUBLIC The public cloud can be a hostile environment. You will have limited or no visibility into the underlying infrastructure and security controls. Nor will you have control over who’s sharing your resources and the risks they could potentially introduce into the host system or data stores. Therefore, public clouds require a holistic approach to security: every component of the infrastructure must be secure and auditable in order to support business-critical computing and compliance. Tips when considering public cloud » Be wary of network QOS and DDOS mitigation. Your public cloud probably doesn’t manage this for you. » Be wary of noisy neighbor syndrome. Does your provider offer performance guarantees? » Ensure adequate data security and firewalling of your environment. » Ensure adequate authentication and security controls. Fortunately, tools are being developed to give IT administrators back some level of control over data in public clouds. Citrix, NetApp, and VMware each offer forms of cloud-level data management. Citrix ShareFile, for example, provides a hybrid approach to public clouds. Data can live wherever it’s needed but is always under the control of the ShareFile control plane. Data can’t be shared without permission, and data that’s managed remotely can be wiped clean no matter what device it’s on. EVERYLEVELC LO U D S E C U R IT Y F O R T I F I E S IT DATA A N D S E C U R IT Y AT
  • 3. PAG E 3 PRIVACY AND SECURIT Y ARE THE LINCHPINS OF BUSINESS - CRITICAL COMPUTING PRIVATE A private cloud is a virtualized datacenter within the cloud. Think of it as relocating your data center to an offsite location: you have dedicated compute, network, and storage resources that you manage as your own, just like you did on-premise. In this way, you can leverage the economics of the cloud without reworking business processes and applications to accommodate the rigorous security demands of public clouds. In the case of Faction’s private hosted cloud, you can ‘come as you are’ and bring your own security (BYOS) or network (BYON) thanks in part to our Cloud’s Faction-to-Faction Layer 2 Direct Connect service. Private clouds are especially advantageous to shops with tight regulatory requirements or limited resources. Tips when considering private cloud » Make sure your cloud provider lets you bring your own security capabilities. Don’t settle for your provider’s options; use yours. You’ve tested it. You use it. You trust it. » Ask your provider about their private networking and vLAN capabilities. Ideally you want Layer 2 connections to/from your customer premise, data centers and from cloud to cloud. With Layer 2 you maintain network isolation and reduce complexities. At Faction, for example, customers can bring their network to our Cloud as-is. We eliminate the need to provision and manage complex firewalls, routers, and Spanning Tree Protocol [STP]. HYBRID In some cases, the best methodology will command the resources of both private and public clouds. This hybrid approach supports the shift from traditional, singlesystem to multi-tiered application deployment. It also increases the available resources for test and development, business continuity, and managing resource demand spikes. To support data privacy and prevent leaks, all data moving between private and public clouds must be encrypted, and access to it must be tied to user identities. Tips when considering hybrid cloud » Ensure your cloud provider offers flexible usage of their storage and compute resources. In other words, if all you need is storage, does your cloud provider allow you to just buy storage? » Determine whether your cloud provider gives you the ability to leverage existing tools, such as VMware APIs. » Make sure your cloud provider allows you the ability to provision and leverage your existing vLAN topology. With Layer 2 private connectivity, you can use the same connection to access both public and private resources while maintaining network separation between public and private environments. Fortunately, tools are being developed to give IT administrators back some level of control over data in public clouds. Citrix, NetApp, and VMware each offer forms of cloud-level data management. Citrix ShareFile, for example, provides a hybrid approach to public clouds. Data can live wherever it’s needed but is always under the control of the ShareFile control plane. Data can’t be shared without permission, and data that’s managed remotely can be wiped clean no matter what device it’s on. Compliance and the Cloud Service Provider Whichever type of cloud strategy you choose—public, private or a combination of both—your cloud provider will play a key role in its success. You’ll have many factors to consider in selecting your provider, but for the purposes of this paper, we’ll focus on compliance, since customer privacy and data security are the linchpins of business-critical computing for many industries. (For more insight into the many factors to consider, read our whitepaper, Tips for Selecting Your Cloud Service Provider.) To make sure the service provider can live up to the promises they’re making, ask for the results of a third-party compliance audit. Look for audit capabilities like SSAE-16 SOC 1/2 and the ability to ink HIPAA Business Associate Agreements (BAA). Many agreements are multi-layered these days, so a key differentiator among cloud providers is their ability and willingness to work with consulting firms and other business entities to execute on these agreements. Keep in mind that certifications are often only a stepping stone to actual audit performance. Be sure the provider has the personnel to support your audits and is willing to adapt to your individual needs rather than dictating how you should approach security. If you can take advantage of a provider’s ability to be flexible with Layer 2 networking, for example, you’ll benefit from a compliance cost standpoint because it allows you to recoup your network and security architecture investment and limit your exposure to risk by minimizing technology changes and subsequent process change.
  • 4. PAGE 4 Identity Management and Application Integration Adopting applications in the new world of the cloud isn’t just a matter of selecting the best applications to get the job done. Now you need to figure out how each application will integrate with your authentication (identity management) requirements. For example, requiring users to maintain multiple logins for multiple applications often negates the convenience factor of cloud access and injects new risks. From a human interaction standpoint, it erodes efficiency and security (who can remember all those logins and passwords without writing them down somewhere?). Instead, use identity management tools to rapidly provision and deprovision users while maintaining the convenience of simple logon processes. There are a variety of ways to achieve a secure hybrid cloud deployment. Methods for securing hybrid cloud deployments: » Use secure file sharing tools to allow data sharing while controlling compliance » Use identity management tools to rapidly provision and de-provision users » Implement single sign-on (SSO) to eliminate password proliferation and the associated risks » Utilize multi-factor authentication mechanisms as required » Integrate new applications with identity management systems » Drive higher levels of access control to data and databases As we tear down the walls protecting the perimeter of our enterprises and open new conduits to communication, collabo- ration, and mobility, most IT departments have moved security and data privacy to the top of their priority lists. And for good reasons: maintaining compliance, protecting reputations, and improving workforce productivity to name a few. Fortunately, security and cloud computing aren’t mutually exclusive. Secure cloud computing can be achieved with the proper tools, service providers, business associate agreements, and the deliberate integration of applications and enterprise-wide identity management systems. About Faction Faction is an enterprise-class IaaS cloud service provider offer- ing private, public, hybrid cloud solutions through channel partners. At Faction we supply cloud the way you want it with extreme performance, deep control, and broad customization capabilities. When you join the Faction fold, you take back the keys to your kingdom. Reign as supreme commander in chief of your cloud. No compromises. No exceptions. Faction is the only cloud that offers patented plug-and-play direct connections (via layer 2) into its cloud resulting in huge time savings (no time spent re-configuring everything)! With Type II SSAE 16 and SOC 1 2 compliant cloud nodes in eight geographies across the United States and in Europe (Seattle, Santa Clara, Denver, Chicago, Atlanta, New Jersey, New York, and the United Kingdom), Faction offers both Cisco UCS and Open Compute platforms, is a Platinum-level NetApp Service Provider, and is VMware vCloud® Powered. For more informa- tion, visit www.factioninc.com or call (855) 532-4734. RICKVINCENTDIRECTOR OF SOLUTIONS ENGINEERING About the Author As Director of Solution Engineering for Faction, Richard Vincent is responsible for architecting robust IAAS solutions, for channel partners and enterprises, enabling them to conduct business with compelling differentiation. Prior to joining Faction, Mr. Vincent served as a Storage Solution Executive at Dell, performed as an independent cloud consultant, and held the position of Director, Data Center Computing for Global Technology Resources, Inc GTRI. Mr. Vincent is a graduate of the University of Georgia, College of Business and is fluent in the Japenese language. www.cloudsmartz.com Copyright 2015 CloudSmartz, Inc. All Rights Reserved. All other logos and trademarks are the property of the respective trademark owners. 1-800-836-2050