There certainly are a bevy of opinions out there regarding the relative security of cloud computing. The number of questions that arise from a discussion of this issue multiplies as the conversation evolves. It is clear that while this is just the beginning of the dialog, it is important to address it now, before the clouds become an entrenched part of day to day business as we know it.
Google Apps and others have led the way in the field of cloud computing. While these are a great deal less than a company looking for an enterprise solution may be looking for, it does give a great glimpse on the issues involved and what we need to look at in order to start getting an idea of how to secure our data.
Many prospects come to the cloud with a grocery list filled with items they don't even have on their own data-centers. A key benefit for a cloud solution is that they are far more able to keep up with software updates, security patches and other aspects of your information's integrity that you would be on your own with normally. What scares most people, who see cloud computing as a security nightmare waiting to unfold before them, is giving up the way they have managed data in the past. Three of the more frequently mentioned items when it comes to the security available in the clouds are: 1) Access 2) Control 3) Collaboration
To further the debate, questions about access to a cloud providers database makes one pause and consider the vulnerability they may have if sensitive data is leaked either through an accidental error, or a deliberate hack. Cloud computing providers need to make this a primary point of reassurance to customers, as there are too many incidents making the news to ignore. Witness Twitter's recent display of corporate underwear due to an employee not following security protocols.
IBM's recent problems with high-level executive defections gave us a glimpse of this scenario. Also, the degree of control you wish to exert over your business comes into play. Allowing sensitive data to reside on a cloud as opposed to your own servers is a choice, but one fraught with consequences. Collaboration is also a large part of security concerns, as employee migration and industrial espionage are something to be looked at in greater detail.
Cisco's John Chambers, presenting at security meeting, noted that in the first quarter of 2009 he held 262 meetings, 200 of which were virtual meetings. "It's got to be secure as we do this," he said. "This is our lives." Certainly Cisco will be a major player in helping to shape the way the clouds are secured and tied together, so they indeed have a vested interest, but are definitely worth listening to. - 29875
Google Apps and others have led the way in the field of cloud computing. While these are a great deal less than a company looking for an enterprise solution may be looking for, it does give a great glimpse on the issues involved and what we need to look at in order to start getting an idea of how to secure our data.
Many prospects come to the cloud with a grocery list filled with items they don't even have on their own data-centers. A key benefit for a cloud solution is that they are far more able to keep up with software updates, security patches and other aspects of your information's integrity that you would be on your own with normally. What scares most people, who see cloud computing as a security nightmare waiting to unfold before them, is giving up the way they have managed data in the past. Three of the more frequently mentioned items when it comes to the security available in the clouds are: 1) Access 2) Control 3) Collaboration
To further the debate, questions about access to a cloud providers database makes one pause and consider the vulnerability they may have if sensitive data is leaked either through an accidental error, or a deliberate hack. Cloud computing providers need to make this a primary point of reassurance to customers, as there are too many incidents making the news to ignore. Witness Twitter's recent display of corporate underwear due to an employee not following security protocols.
IBM's recent problems with high-level executive defections gave us a glimpse of this scenario. Also, the degree of control you wish to exert over your business comes into play. Allowing sensitive data to reside on a cloud as opposed to your own servers is a choice, but one fraught with consequences. Collaboration is also a large part of security concerns, as employee migration and industrial espionage are something to be looked at in greater detail.
Cisco's John Chambers, presenting at security meeting, noted that in the first quarter of 2009 he held 262 meetings, 200 of which were virtual meetings. "It's got to be secure as we do this," he said. "This is our lives." Certainly Cisco will be a major player in helping to shape the way the clouds are secured and tied together, so they indeed have a vested interest, but are definitely worth listening to. - 29875
About the Author:
The cloud is taking over business infrastructure and its CRM Is the cloud turning into a Storm?