SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
Market                Pulse




reaching for the Cloud

   It leaders cite benefits, downplay security as they
   move applications to the cloud.
   Will security worries be the undoing of cloud adoption? Not likely, given other,
   more pressing threats like device theft, mobility and IT consumerization. And with
   new technologies able to mitigate the real and perceived risks inherent in hybrid
   clouds—the combination of internal and external services—IT leaders say they
   see opportunities to up the ante on security for greater end-to-end protection.

   “It’s possible to do as good a job securing the cloud       With advantages to both approaches, a hybrid cloud
   as the local infrastructure, but it is more likely that     strategy is increasingly becoming the preferred option.
   someone else has better economies of scale and              In fact, 47 percent of those surveyed by IDG are using
   the specialization needed to help do it better than         at least one application and/or a portion of their com-
   you ever could,” says Chris Shull, director of informa-     puting infrastructure via a hybrid cloud model, while
   tion technology for the Jewish Federation of Greater        another 53 percent plan to do so in the future.
   Philadelphia.
                                                               Those users confidently point to the top-line gains
   IDG Research Services recently conducted an online          from hybrid cloud deployment, including greater
   survey of 122 business and technology leaders across        market flexibility, improved business continuity and
   a range of industries to gain a better understanding of     innovation, superior customer service, a stronger
   cloud security trends. Among its conclusions:               competitive edge and expanded revenue opportunities.

   n Security for the cloud is a concern, but it is not as     They also cite bottom-line efficiencies such as reduced

   troubling as other data threats.                            resource waste and savings on the CapEx front (see
                                                               figure 1).“My executives are thrilled to have more
   n Nearly half of those surveyed use or plan to use
                                                               features and capabilities, greater accessibility and bet-
   a hybrid approach to managing security for cloud
                                                               ter security, all at a fraction of any reasonable cost one
   environments.
                                                               could put on in-house systems,” Shull says.
   n A number of technologies are being deployed to ad-
                                                               Still, many IT professionals are reluctant to relinquish
   dress security concerns, including integrating the exist-
                                                               management responsibility to outside parties. “Hybrid
   ing security infrastructure into cloud environments.
                                                               cloud implementations effectively straddle internal and
                                                               public infrastructures, and can introduce complexi-
   Embracing the Cloud                                         ties,” says Martin Capurro, director of Applications and
   IT service models are evolving at record speed, though
   none faster than cloud computing. CIOs everywhere
   say they are considering the merits of the cloud com-
   pared to traditional on-premise delivery. Specifically,
   they say, cloud models enable enterprises to leverage
   third-party expertise and more attractive economics,
   while on-premise services offer greater control.




                                                                                                            WP101366 12/10
Market                  Pulse




                           Benefits of a Hybrid Cloud Approach                                         survey respondents considering cloud
                                                                                                       security to be a significant risk. Seventy-
    Greater flexibility to react to
    changing market conditions                                                               51%       five percent consider lost or stolen devices
       Reducing resource waste                                                           48%           to be a significant security risk, 65 percent
                                                                                                       fret about IT consumerization, and 56
    Enabling business continuity                                                        47%
                                                                                                       percent worry about mobility.
              Savings on CAPEX                                                     43%
                                                                                                       All said, only 40 percent of the technol-
             Enabling innovation                                           37%
                                                                                                       ogy and business leaders surveyed are
    Improving customer support
                    or services                                        34%                             extremely or very confident that their
         Gaining a competitive/                             25%                                        security infrastructure is prepared to pro-
              information edge
                                                                                                       tect data in the cloud. And that has them
Expanding revenue opportunities                      19%
                                                                                                       weighing their cloud security options: Is it
                            Other          8%                                                          better to own all aspects of security or to
                      Don’t know      3%                        Source: IDG Research, October 2010     outsource the whole function? On-premise
                                                                                                       implementations offer a single security au-
                                                                                                       thority, more control over data protection,
                                                                                                       full visibility into one’s risk and compliance
                      Infrastructure Solutions for Qwest, a network services              posture, and less complexity. Managed services, on the
                      provider based in Denver. Working with two separate                 other hand, release CIOs from the financial and man-
                      infrastructures, CIOs must coordinate efforts, commu-               agement burden of in-house solutions while enabling
                      nicate and even share data with their cloud provider.               them to leverage the security resources and expertise
                      What’s more, today’s fluid perimeter—pocked with                    of a third party.
                      mobile devices and social networking sites—becomes
                                                                                          “In biology, hybrids are often bred to gain the best
                      harder to monitor in a hybrid environment.
                                                                                          features of multiple breeds,” Shull says. “So is the ad-
                                                                                          vantage of combining multiple technologies to ensure
                      Sorting Out Security                                                better security.” Some 45 percent of the survey respon-
                      Those issues eventually give way to the nagging                     dents agree, indicating they prefer a hybrid or mixed
                      security concerns in the cloud, the greatest of which               approach to cloud security. With a mixed security
                      is the protection of sensitive data. Survey respondents             model, CIOs can maximize the advantages of managed
                      are most focused on preventing data leaks, setting and              security services while maintaining control over their
                      maintaining security policies, managing data access,                critical data protection strategy.
                      preventing intrusions and maintaining compliance (see
                      figure 2). And those risks can be compounded by a                   Outsourcing to a third party can also be an afford-
                      dual environment. “A threat in one environment could                able way to add security capabilities when budgets
                      permeate the other,” explains Troy Herrera, enterprise              are tight. Of course, there may be challenges in terms
                      marketing director for Juniper Networks, a network                  of visibility and the ability to enforce security; but,
                      infrastructure provider based in Sunnyvale, Calif. A                by working together holistically, communicating, col-
                      hacker who gains access to a cloud application, for ex-             laborating and sharing reports, the internal-external
                      ample, could make his way into the enterprise network,              partnership can prove very beneficial.
                      while an error in access control rights on the corporate
                      network could affect cloud application security.
                                                                                          Integrating Internal with External
                      Yet the security of the cloud does not appear to be                 “A service provider can complement what you’re doing
                      as pressing as other threats, with only 49 percent of               and even enhance protection,” Herrera explains. “The



   2
Market                 Pulse




                                 Cloud Security Concerns                                             to extend the network into the cloud.” Of
                                                                                                     course, the networking component is still
                   Preventing data leaks                                                 61%         evolving. Today, it’s all Internet-based, but
Setting and maintaining security policies                                            56%             eventually the cloud will be delivered on
                                                                                                     different fabrics, such as Ethernet. That
               Managing access to data                                             54%
                                                                                                     will enable technology leaders to create,
             Detecting/prevent intrusion                                         52%
                                                                                                     deploy and manage their infrastructure as
  Keeping compliant with data retention                                          52%                 they have in the past, and thus maintain
                  laws and regulations
                                                                                                     the desired level of security, performance
                         Encrypting data                                      49%
                                                                                                     and control over operations.
                   Backup and recovery                                        49%
                                                                                                     It’s equally important to establish process
    Detecting/prevent viruses and spam                                        48%
                                                                                                     integration. Setting up procedures by
                      Managing patches                             36%                               which partners can share reports and
                                                                                                     logs is critical, as is agreeing to common
                                                              Source: IDG Research, October 2010
                                                                                                     escalation procedures, security policies
                                                                                                     and compliance milestones.

                    key is to implement the proper security measures with               Still, some level of separation can be advantageous:
                    the goal of achieving end-to-end security, and to be                “Keeping the multiple parts of our hybrid and multilay-
                    cognizant not to weaken security along the way.”                    ered defenses disconnected adds important indepen-
                                                                                        dence and resiliency to them,” Shull says.
                    One of the IDG survey respondents concurs, advis-
                    ing that CIOs “start by extending existing capabilities
                    into the cloud.” Security has long been integral to
                                                                                        Investing Wisely
                                                                                        As for specific technology integrations, CIOs have
                    internal infrastructure, and those investments should
                                                                                        zeroed in on the most pressing hybrid cloud security
                    be expanded into the cloud. Some 82 percent of
                                                                                        concerns. Most respondents—about 80 percent—say
                    respondents agree, saying interoperability with existing
                                                                                        they have already implemented anti-virus, spyware,
                    security solutions is very important.
                                                                                        spam filters and VPN technology. Web filtering, intru-
                    Many security solutions can work together, whether                  sion detection, network access control and firewalls
                    on-premise or in the cloud, Herrera adds. For example,              are nearly as popular (see figure 3). “These core tech-
                    an in-house network access control solution can                     nologies have been part of IT for a while,” Herrera says.
                    identify users by communicating with an outsourced                  “Now CIOs need to focus on upgrades to accommodate
                    VPN. A Web services application secured in the cloud                the changing environment and performance shift that
                    could store underlying data in an internal SAN. And a               come with cloud infrastructure.”
                    service provider offering can federate with the internal
                                                                                        New technology investments are critical as infra-
                    environment to protect and enforce identities. CIOs
                                                                                        structure becomes more complex. The top priority for
                    just need to coordinate with their vendors to ensure
                                                                                        50 percent of respondents going forward is security
                    interoperability.
                                                                                        incident and event management (SIEM), which offers
                    Part of that process, Capurro suggests, involves inte-              crucial visibility into event anomalies and provides a
                    grating core infrastructure elements with the cloud                 centralized portal in which to view logs. Data loss pre-
                    environment—including the network. In fact, one                     vention and identity and access management (IAM)—
                    respondent cautions technology leaders to “make sure                which can work in conjunction with one’s NAC solution
                    that the hosting provider has a clear strategy for how              to protect data and enhance access control—were also



 3
Market                Pulse




                                                        cited as likely investments in the coming year.

    A Few Words from                                    Capurro believes IT professionals should put more
    Your Peers                                          stock in service level agreements as well. Cloud envi-
                                                        ronments must provide not just scale and flexibility, but
    The right approach to securing a hybrid cloud
                                                        also performance assurance, including speed and avail-
    infrastructure can quickly dispel any lingering
                                                        ability. Application performance management solutions
    doubts about data protection. Some of the IDG
                                                        can supplement those agreements and give CIOs the
    survey respondents offer the following advice:
                                                        visibility they need to monitor platform performance.
    Do the proper planning. “Understand your            Provisions must be made for data portability in terms
    company’s current needs as well as those for        of moving and retrieving data.
    the next five to 10 years. That will save you
    time and effort as well as money,” says one
    respondent. CIOs are advised to take their time     The Bottom Line
    and think holistically. Others suggest engaging     Since moving certain critical business applications,
    in a third-party security audit, site inspec-       including e-mail, to the cloud, Shull says he is “enjoying
    tions, penetration testing and piloting before      better security” than he could provide in-house. The
    deploying any solution. And always read the         IDG survey respondents already using cloud services
    fine print, they say, especially in service level   agree: They expect hybrid cloud implementations to
    agreements.                                         enhance security through improved service perfor-
                                                        mance, 24/7 support, higher levels of expertise, a reduc-
    Shop for the right partner. “The cloud is as dan-
                                                        tion in dedicated security staff resources and lower
    gerous as posting your data to Facebook if you
    have not done a security review of the cloud        security management costs.
    vendor,” warns one respondent. CIOs should          So can CIOs really trust the cloud with their most criti-
    make sure they know who they are dealing            cal data? “Absolutely,” Herrera says. “You just have to
    with. Understand not just the vendor’s security     be smart in its management.” So go ahead and reach
    practices and infrastructure capabilities but
                                                        for that cloud—and its silver lining.
    also their long-term plans and financials.
    Partners should be well rounded, with multiple
    offerings and expertise in transport as well as
                                                        About Juniper Networks
    security products.                                  Juniper Networks is in the business of network innova-
                                                        tion. From devices to data centers and consumers to
    Choose solutions carefully. “Use only trusted
                                                        cloud providers, Juniper Networks delivers the software,
    solutions,” advises a respondent. When it
                                                        silicon and systems that secure infrastructure and trans-
    comes to infrastructure, CIOs must evaluate
                                                        form the economics of networking. For more informa-
    an offering’s scalability and performance.
    Establish a “trust zone” for data protection,       tion, visit (www.juniper.net).
    and inspect data center facilities. Technology
    solutions should be geared toward longevity—
                                                        About Qwest
    consider open-standards approaches to               Building on unparalleled network services, Qwest helps
    ensure interoperability with new technolo-          businesses leverage existing and emerging technology.
    gies. Look for manageability and operational        In addition to services utilizing over 173,000 network
    simplicity. And whenever possible, strive to        miles, Qwest has technology and expertise that extends
    consolidate multiple security solutions onto a      to broader applications and technologies. For more
    single platform.                                    information, visit (http://www.qwest.com/business/
                                                        solutions/why-qwest/list.html


4

Mais conteúdo relacionado

Mais procurados

How Cash & Flexibility Are Driving Cloud Investment
How Cash & Flexibility Are Driving Cloud InvestmentHow Cash & Flexibility Are Driving Cloud Investment
How Cash & Flexibility Are Driving Cloud InvestmentMikhail Demidov
 
Cloud Computing in the Midmarket: Assessing the Options
Cloud Computing in the Midmarket: Assessing the OptionsCloud Computing in the Midmarket: Assessing the Options
Cloud Computing in the Midmarket: Assessing the Optionsarms8586
 
Advanced Applications & Networks
Advanced Applications & NetworksAdvanced Applications & Networks
Advanced Applications & NetworksPrakash Nagpal
 
IT Security for Oil and Gas Companies
IT Security for Oil and Gas CompaniesIT Security for Oil and Gas Companies
IT Security for Oil and Gas CompaniesRichard Cole
 
IDC MarketScape Worldwide Scale-Out File-Based Storage 2012 Vendor Analysis Dell
IDC MarketScape Worldwide Scale-Out File-Based Storage 2012 Vendor Analysis DellIDC MarketScape Worldwide Scale-Out File-Based Storage 2012 Vendor Analysis Dell
IDC MarketScape Worldwide Scale-Out File-Based Storage 2012 Vendor Analysis Dellarms8586
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMwareOpSource
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseReadWrite
 
2012 security services clientprex
2012 security services clientprex2012 security services clientprex
2012 security services clientprexKim Aarenstrup
 
An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...researchinventy
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715Jim Romeo
 
Tech trendnotes
Tech trendnotesTech trendnotes
Tech trendnotesStudying
 
Belden Total Enterprise Network White Paper
Belden Total Enterprise Network White PaperBelden Total Enterprise Network White Paper
Belden Total Enterprise Network White Paperadventive1
 
Removing the Cloud of Insecurity
Removing the Cloud of InsecurityRemoving the Cloud of Insecurity
Removing the Cloud of InsecurityRackspace
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceTrend Micro
 
CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonPatricia M Watson
 
A View From the CIO's Driver Seat
A View From the CIO's Driver SeatA View From the CIO's Driver Seat
A View From the CIO's Driver SeatJuniper Networks
 

Mais procurados (18)

How Cash & Flexibility Are Driving Cloud Investment
How Cash & Flexibility Are Driving Cloud InvestmentHow Cash & Flexibility Are Driving Cloud Investment
How Cash & Flexibility Are Driving Cloud Investment
 
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
 
Cloud Computing in the Midmarket: Assessing the Options
Cloud Computing in the Midmarket: Assessing the OptionsCloud Computing in the Midmarket: Assessing the Options
Cloud Computing in the Midmarket: Assessing the Options
 
Advanced Applications & Networks
Advanced Applications & NetworksAdvanced Applications & Networks
Advanced Applications & Networks
 
IT Security for Oil and Gas Companies
IT Security for Oil and Gas CompaniesIT Security for Oil and Gas Companies
IT Security for Oil and Gas Companies
 
IDC MarketScape Worldwide Scale-Out File-Based Storage 2012 Vendor Analysis Dell
IDC MarketScape Worldwide Scale-Out File-Based Storage 2012 Vendor Analysis DellIDC MarketScape Worldwide Scale-Out File-Based Storage 2012 Vendor Analysis Dell
IDC MarketScape Worldwide Scale-Out File-Based Storage 2012 Vendor Analysis Dell
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMware
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
 
2012 security services clientprex
2012 security services clientprex2012 security services clientprex
2012 security services clientprex
 
An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
Tech trendnotes
Tech trendnotesTech trendnotes
Tech trendnotes
 
Belden Total Enterprise Network White Paper
Belden Total Enterprise Network White PaperBelden Total Enterprise Network White Paper
Belden Total Enterprise Network White Paper
 
Removing the Cloud of Insecurity
Removing the Cloud of InsecurityRemoving the Cloud of Insecurity
Removing the Cloud of Insecurity
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS Compliance
 
CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 Watson
 
Day 3 p2 - security
Day 3   p2 - securityDay 3   p2 - security
Day 3 p2 - security
 
A View From the CIO's Driver Seat
A View From the CIO's Driver SeatA View From the CIO's Driver Seat
A View From the CIO's Driver Seat
 

Semelhante a Reaching For The Cloud Wp101366

IBM Tivoli - Security Solutions for the Cloud
IBM Tivoli - Security Solutions for the CloudIBM Tivoli - Security Solutions for the Cloud
IBM Tivoli - Security Solutions for the CloudVincent Kwon
 
Sondaggio smart meter
Sondaggio smart meterSondaggio smart meter
Sondaggio smart metercanaleenergia
 
2019 Enterprise Cloud Index Report
2019 Enterprise Cloud Index Report2019 Enterprise Cloud Index Report
2019 Enterprise Cloud Index ReportAndrew James
 
Infographic: Bringing Your Cloud Visibility Back Into Focus
Infographic: Bringing Your Cloud Visibility Back Into FocusInfographic: Bringing Your Cloud Visibility Back Into Focus
Infographic: Bringing Your Cloud Visibility Back Into FocusFortinet
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
 
Cloud Security Survey Peer Research Summary
Cloud Security Survey Peer Research SummaryCloud Security Survey Peer Research Summary
Cloud Security Survey Peer Research SummaryIntel IT Center
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Samir Kotarwar
 
Assurance of Security and Privacy Requirements for Cloud Deployment Model
Assurance of Security and Privacy Requirements for Cloud Deployment ModelAssurance of Security and Privacy Requirements for Cloud Deployment Model
Assurance of Security and Privacy Requirements for Cloud Deployment ModelIJMTST Journal
 
Why Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business WorldWhy Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business WorldCiente
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715Jim Romeo
 
Windstream Managed Network Security Infographic
Windstream Managed Network Security InfographicWindstream Managed Network Security Infographic
Windstream Managed Network Security InfographicIdeba
 
IDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud StrategiesIDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud StrategiesEMC
 
Evolution security controls towards Cloud Services
Evolution security controls towards Cloud ServicesEvolution security controls towards Cloud Services
Evolution security controls towards Cloud ServicesHugo Rodrigues
 
What is the future of cloud security linked in
What is the future of cloud security linked inWhat is the future of cloud security linked in
What is the future of cloud security linked inJonathan Spindel
 

Semelhante a Reaching For The Cloud Wp101366 (20)

IBM Tivoli - Security Solutions for the Cloud
IBM Tivoli - Security Solutions for the CloudIBM Tivoli - Security Solutions for the Cloud
IBM Tivoli - Security Solutions for the Cloud
 
Ccsw
CcswCcsw
Ccsw
 
Sondaggio smart meter
Sondaggio smart meterSondaggio smart meter
Sondaggio smart meter
 
2019 Enterprise Cloud Index Report
2019 Enterprise Cloud Index Report2019 Enterprise Cloud Index Report
2019 Enterprise Cloud Index Report
 
Infographic: Bringing Your Cloud Visibility Back Into Focus
Infographic: Bringing Your Cloud Visibility Back Into FocusInfographic: Bringing Your Cloud Visibility Back Into Focus
Infographic: Bringing Your Cloud Visibility Back Into Focus
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
Cloud Security Survey Peer Research Summary
Cloud Security Survey Peer Research SummaryCloud Security Survey Peer Research Summary
Cloud Security Survey Peer Research Summary
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016
 
Resilience in the Cyber Era
Resilience in the Cyber EraResilience in the Cyber Era
Resilience in the Cyber Era
 
The cloud
The cloudThe cloud
The cloud
 
Assurance of Security and Privacy Requirements for Cloud Deployment Model
Assurance of Security and Privacy Requirements for Cloud Deployment ModelAssurance of Security and Privacy Requirements for Cloud Deployment Model
Assurance of Security and Privacy Requirements for Cloud Deployment Model
 
Why Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business WorldWhy Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business World
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
Windstream Managed Network Security Infographic
Windstream Managed Network Security InfographicWindstream Managed Network Security Infographic
Windstream Managed Network Security Infographic
 
J3602068071
J3602068071J3602068071
J3602068071
 
IDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud StrategiesIDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud Strategies
 
Cloudrisks
CloudrisksCloudrisks
Cloudrisks
 
Evolution security controls towards Cloud Services
Evolution security controls towards Cloud ServicesEvolution security controls towards Cloud Services
Evolution security controls towards Cloud Services
 
What is the future of cloud security linked in
What is the future of cloud security linked inWhat is the future of cloud security linked in
What is the future of cloud security linked in
 

Mais de Erik Ginalick

Unleashing The Power Of Customer Data Wp091047
Unleashing The Power Of Customer Data Wp091047Unleashing The Power Of Customer Data Wp091047
Unleashing The Power Of Customer Data Wp091047Erik Ginalick
 
Understand Benefits Of Electronic Health Records Wp091005
Understand Benefits Of Electronic Health Records Wp091005Understand Benefits Of Electronic Health Records Wp091005
Understand Benefits Of Electronic Health Records Wp091005Erik Ginalick
 
Qmoe For Manufacturing Wp090862
Qmoe For Manufacturing Wp090862Qmoe For Manufacturing Wp090862
Qmoe For Manufacturing Wp090862Erik Ginalick
 
Qmoe For Public Sector Wp090863
Qmoe For Public Sector Wp090863Qmoe For Public Sector Wp090863
Qmoe For Public Sector Wp090863Erik Ginalick
 
Sip Trunk Services The Cornerstone Of Unified Communications Wp101194
Sip Trunk Services The Cornerstone Of Unified Communications Wp101194Sip Trunk Services The Cornerstone Of Unified Communications Wp101194
Sip Trunk Services The Cornerstone Of Unified Communications Wp101194Erik Ginalick
 
The Worry Free Network Wp091050
The Worry Free Network Wp091050The Worry Free Network Wp091050
The Worry Free Network Wp091050Erik Ginalick
 
Qmoe For Financial Services Wp090860
Qmoe For Financial Services Wp090860Qmoe For Financial Services Wp090860
Qmoe For Financial Services Wp090860Erik Ginalick
 
Qmoe For Healthcare Wp090861
Qmoe For Healthcare Wp090861Qmoe For Healthcare Wp090861
Qmoe For Healthcare Wp090861Erik Ginalick
 
Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010Erik Ginalick
 
Planning For Disaster And Everyday Threats Wp111438
Planning For Disaster And Everyday Threats Wp111438Planning For Disaster And Everyday Threats Wp111438
Planning For Disaster And Everyday Threats Wp111438Erik Ginalick
 
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094Erik Ginalick
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Erik Ginalick
 
Plan For Success White Paper
Plan For Success White PaperPlan For Success White Paper
Plan For Success White PaperErik Ginalick
 
Optimizing Your Communications In A Recession Wp090993
Optimizing Your Communications In A Recession Wp090993Optimizing Your Communications In A Recession Wp090993
Optimizing Your Communications In A Recession Wp090993Erik Ginalick
 
Is Cloud Computing Right For You Wp101305
Is Cloud Computing Right For You Wp101305Is Cloud Computing Right For You Wp101305
Is Cloud Computing Right For You Wp101305Erik Ginalick
 
Ipv Technical White Paper Wp111504
Ipv Technical White Paper Wp111504Ipv Technical White Paper Wp111504
Ipv Technical White Paper Wp111504Erik Ginalick
 
Ipv6 Technical White Paper Wp111504
Ipv6 Technical White Paper Wp111504Ipv6 Technical White Paper Wp111504
Ipv6 Technical White Paper Wp111504Erik Ginalick
 
Infrastructures For Innovation Wp090974
Infrastructures For Innovation Wp090974Infrastructures For Innovation Wp090974
Infrastructures For Innovation Wp090974Erik Ginalick
 
Healthcare It Security Necessity Wp101118
Healthcare It Security Necessity Wp101118Healthcare It Security Necessity Wp101118
Healthcare It Security Necessity Wp101118Erik Ginalick
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 

Mais de Erik Ginalick (20)

Unleashing The Power Of Customer Data Wp091047
Unleashing The Power Of Customer Data Wp091047Unleashing The Power Of Customer Data Wp091047
Unleashing The Power Of Customer Data Wp091047
 
Understand Benefits Of Electronic Health Records Wp091005
Understand Benefits Of Electronic Health Records Wp091005Understand Benefits Of Electronic Health Records Wp091005
Understand Benefits Of Electronic Health Records Wp091005
 
Qmoe For Manufacturing Wp090862
Qmoe For Manufacturing Wp090862Qmoe For Manufacturing Wp090862
Qmoe For Manufacturing Wp090862
 
Qmoe For Public Sector Wp090863
Qmoe For Public Sector Wp090863Qmoe For Public Sector Wp090863
Qmoe For Public Sector Wp090863
 
Sip Trunk Services The Cornerstone Of Unified Communications Wp101194
Sip Trunk Services The Cornerstone Of Unified Communications Wp101194Sip Trunk Services The Cornerstone Of Unified Communications Wp101194
Sip Trunk Services The Cornerstone Of Unified Communications Wp101194
 
The Worry Free Network Wp091050
The Worry Free Network Wp091050The Worry Free Network Wp091050
The Worry Free Network Wp091050
 
Qmoe For Financial Services Wp090860
Qmoe For Financial Services Wp090860Qmoe For Financial Services Wp090860
Qmoe For Financial Services Wp090860
 
Qmoe For Healthcare Wp090861
Qmoe For Healthcare Wp090861Qmoe For Healthcare Wp090861
Qmoe For Healthcare Wp090861
 
Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010
 
Planning For Disaster And Everyday Threats Wp111438
Planning For Disaster And Everyday Threats Wp111438Planning For Disaster And Everyday Threats Wp111438
Planning For Disaster And Everyday Threats Wp111438
 
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991
 
Plan For Success White Paper
Plan For Success White PaperPlan For Success White Paper
Plan For Success White Paper
 
Optimizing Your Communications In A Recession Wp090993
Optimizing Your Communications In A Recession Wp090993Optimizing Your Communications In A Recession Wp090993
Optimizing Your Communications In A Recession Wp090993
 
Is Cloud Computing Right For You Wp101305
Is Cloud Computing Right For You Wp101305Is Cloud Computing Right For You Wp101305
Is Cloud Computing Right For You Wp101305
 
Ipv Technical White Paper Wp111504
Ipv Technical White Paper Wp111504Ipv Technical White Paper Wp111504
Ipv Technical White Paper Wp111504
 
Ipv6 Technical White Paper Wp111504
Ipv6 Technical White Paper Wp111504Ipv6 Technical White Paper Wp111504
Ipv6 Technical White Paper Wp111504
 
Infrastructures For Innovation Wp090974
Infrastructures For Innovation Wp090974Infrastructures For Innovation Wp090974
Infrastructures For Innovation Wp090974
 
Healthcare It Security Necessity Wp101118
Healthcare It Security Necessity Wp101118Healthcare It Security Necessity Wp101118
Healthcare It Security Necessity Wp101118
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 

Reaching For The Cloud Wp101366

  • 1. Market Pulse reaching for the Cloud It leaders cite benefits, downplay security as they move applications to the cloud. Will security worries be the undoing of cloud adoption? Not likely, given other, more pressing threats like device theft, mobility and IT consumerization. And with new technologies able to mitigate the real and perceived risks inherent in hybrid clouds—the combination of internal and external services—IT leaders say they see opportunities to up the ante on security for greater end-to-end protection. “It’s possible to do as good a job securing the cloud With advantages to both approaches, a hybrid cloud as the local infrastructure, but it is more likely that strategy is increasingly becoming the preferred option. someone else has better economies of scale and In fact, 47 percent of those surveyed by IDG are using the specialization needed to help do it better than at least one application and/or a portion of their com- you ever could,” says Chris Shull, director of informa- puting infrastructure via a hybrid cloud model, while tion technology for the Jewish Federation of Greater another 53 percent plan to do so in the future. Philadelphia. Those users confidently point to the top-line gains IDG Research Services recently conducted an online from hybrid cloud deployment, including greater survey of 122 business and technology leaders across market flexibility, improved business continuity and a range of industries to gain a better understanding of innovation, superior customer service, a stronger cloud security trends. Among its conclusions: competitive edge and expanded revenue opportunities. n Security for the cloud is a concern, but it is not as They also cite bottom-line efficiencies such as reduced troubling as other data threats. resource waste and savings on the CapEx front (see figure 1).“My executives are thrilled to have more n Nearly half of those surveyed use or plan to use features and capabilities, greater accessibility and bet- a hybrid approach to managing security for cloud ter security, all at a fraction of any reasonable cost one environments. could put on in-house systems,” Shull says. n A number of technologies are being deployed to ad- Still, many IT professionals are reluctant to relinquish dress security concerns, including integrating the exist- management responsibility to outside parties. “Hybrid ing security infrastructure into cloud environments. cloud implementations effectively straddle internal and public infrastructures, and can introduce complexi- Embracing the Cloud ties,” says Martin Capurro, director of Applications and IT service models are evolving at record speed, though none faster than cloud computing. CIOs everywhere say they are considering the merits of the cloud com- pared to traditional on-premise delivery. Specifically, they say, cloud models enable enterprises to leverage third-party expertise and more attractive economics, while on-premise services offer greater control. WP101366 12/10
  • 2. Market Pulse Benefits of a Hybrid Cloud Approach survey respondents considering cloud security to be a significant risk. Seventy- Greater flexibility to react to changing market conditions 51% five percent consider lost or stolen devices Reducing resource waste 48% to be a significant security risk, 65 percent fret about IT consumerization, and 56 Enabling business continuity 47% percent worry about mobility. Savings on CAPEX 43% All said, only 40 percent of the technol- Enabling innovation 37% ogy and business leaders surveyed are Improving customer support or services 34% extremely or very confident that their Gaining a competitive/ 25% security infrastructure is prepared to pro- information edge tect data in the cloud. And that has them Expanding revenue opportunities 19% weighing their cloud security options: Is it Other 8% better to own all aspects of security or to Don’t know 3% Source: IDG Research, October 2010 outsource the whole function? On-premise implementations offer a single security au- thority, more control over data protection, full visibility into one’s risk and compliance Infrastructure Solutions for Qwest, a network services posture, and less complexity. Managed services, on the provider based in Denver. Working with two separate other hand, release CIOs from the financial and man- infrastructures, CIOs must coordinate efforts, commu- agement burden of in-house solutions while enabling nicate and even share data with their cloud provider. them to leverage the security resources and expertise What’s more, today’s fluid perimeter—pocked with of a third party. mobile devices and social networking sites—becomes “In biology, hybrids are often bred to gain the best harder to monitor in a hybrid environment. features of multiple breeds,” Shull says. “So is the ad- vantage of combining multiple technologies to ensure Sorting Out Security better security.” Some 45 percent of the survey respon- Those issues eventually give way to the nagging dents agree, indicating they prefer a hybrid or mixed security concerns in the cloud, the greatest of which approach to cloud security. With a mixed security is the protection of sensitive data. Survey respondents model, CIOs can maximize the advantages of managed are most focused on preventing data leaks, setting and security services while maintaining control over their maintaining security policies, managing data access, critical data protection strategy. preventing intrusions and maintaining compliance (see figure 2). And those risks can be compounded by a Outsourcing to a third party can also be an afford- dual environment. “A threat in one environment could able way to add security capabilities when budgets permeate the other,” explains Troy Herrera, enterprise are tight. Of course, there may be challenges in terms marketing director for Juniper Networks, a network of visibility and the ability to enforce security; but, infrastructure provider based in Sunnyvale, Calif. A by working together holistically, communicating, col- hacker who gains access to a cloud application, for ex- laborating and sharing reports, the internal-external ample, could make his way into the enterprise network, partnership can prove very beneficial. while an error in access control rights on the corporate network could affect cloud application security. Integrating Internal with External Yet the security of the cloud does not appear to be “A service provider can complement what you’re doing as pressing as other threats, with only 49 percent of and even enhance protection,” Herrera explains. “The 2
  • 3. Market Pulse Cloud Security Concerns to extend the network into the cloud.” Of course, the networking component is still Preventing data leaks 61% evolving. Today, it’s all Internet-based, but Setting and maintaining security policies 56% eventually the cloud will be delivered on different fabrics, such as Ethernet. That Managing access to data 54% will enable technology leaders to create, Detecting/prevent intrusion 52% deploy and manage their infrastructure as Keeping compliant with data retention 52% they have in the past, and thus maintain laws and regulations the desired level of security, performance Encrypting data 49% and control over operations. Backup and recovery 49% It’s equally important to establish process Detecting/prevent viruses and spam 48% integration. Setting up procedures by Managing patches 36% which partners can share reports and logs is critical, as is agreeing to common Source: IDG Research, October 2010 escalation procedures, security policies and compliance milestones. key is to implement the proper security measures with Still, some level of separation can be advantageous: the goal of achieving end-to-end security, and to be “Keeping the multiple parts of our hybrid and multilay- cognizant not to weaken security along the way.” ered defenses disconnected adds important indepen- dence and resiliency to them,” Shull says. One of the IDG survey respondents concurs, advis- ing that CIOs “start by extending existing capabilities into the cloud.” Security has long been integral to Investing Wisely As for specific technology integrations, CIOs have internal infrastructure, and those investments should zeroed in on the most pressing hybrid cloud security be expanded into the cloud. Some 82 percent of concerns. Most respondents—about 80 percent—say respondents agree, saying interoperability with existing they have already implemented anti-virus, spyware, security solutions is very important. spam filters and VPN technology. Web filtering, intru- Many security solutions can work together, whether sion detection, network access control and firewalls on-premise or in the cloud, Herrera adds. For example, are nearly as popular (see figure 3). “These core tech- an in-house network access control solution can nologies have been part of IT for a while,” Herrera says. identify users by communicating with an outsourced “Now CIOs need to focus on upgrades to accommodate VPN. A Web services application secured in the cloud the changing environment and performance shift that could store underlying data in an internal SAN. And a come with cloud infrastructure.” service provider offering can federate with the internal New technology investments are critical as infra- environment to protect and enforce identities. CIOs structure becomes more complex. The top priority for just need to coordinate with their vendors to ensure 50 percent of respondents going forward is security interoperability. incident and event management (SIEM), which offers Part of that process, Capurro suggests, involves inte- crucial visibility into event anomalies and provides a grating core infrastructure elements with the cloud centralized portal in which to view logs. Data loss pre- environment—including the network. In fact, one vention and identity and access management (IAM)— respondent cautions technology leaders to “make sure which can work in conjunction with one’s NAC solution that the hosting provider has a clear strategy for how to protect data and enhance access control—were also 3
  • 4. Market Pulse cited as likely investments in the coming year. A Few Words from Capurro believes IT professionals should put more Your Peers stock in service level agreements as well. Cloud envi- ronments must provide not just scale and flexibility, but The right approach to securing a hybrid cloud also performance assurance, including speed and avail- infrastructure can quickly dispel any lingering ability. Application performance management solutions doubts about data protection. Some of the IDG can supplement those agreements and give CIOs the survey respondents offer the following advice: visibility they need to monitor platform performance. Do the proper planning. “Understand your Provisions must be made for data portability in terms company’s current needs as well as those for of moving and retrieving data. the next five to 10 years. That will save you time and effort as well as money,” says one respondent. CIOs are advised to take their time The Bottom Line and think holistically. Others suggest engaging Since moving certain critical business applications, in a third-party security audit, site inspec- including e-mail, to the cloud, Shull says he is “enjoying tions, penetration testing and piloting before better security” than he could provide in-house. The deploying any solution. And always read the IDG survey respondents already using cloud services fine print, they say, especially in service level agree: They expect hybrid cloud implementations to agreements. enhance security through improved service perfor- mance, 24/7 support, higher levels of expertise, a reduc- Shop for the right partner. “The cloud is as dan- tion in dedicated security staff resources and lower gerous as posting your data to Facebook if you have not done a security review of the cloud security management costs. vendor,” warns one respondent. CIOs should So can CIOs really trust the cloud with their most criti- make sure they know who they are dealing cal data? “Absolutely,” Herrera says. “You just have to with. Understand not just the vendor’s security be smart in its management.” So go ahead and reach practices and infrastructure capabilities but for that cloud—and its silver lining. also their long-term plans and financials. Partners should be well rounded, with multiple offerings and expertise in transport as well as About Juniper Networks security products. Juniper Networks is in the business of network innova- tion. From devices to data centers and consumers to Choose solutions carefully. “Use only trusted cloud providers, Juniper Networks delivers the software, solutions,” advises a respondent. When it silicon and systems that secure infrastructure and trans- comes to infrastructure, CIOs must evaluate form the economics of networking. For more informa- an offering’s scalability and performance. Establish a “trust zone” for data protection, tion, visit (www.juniper.net). and inspect data center facilities. Technology solutions should be geared toward longevity— About Qwest consider open-standards approaches to Building on unparalleled network services, Qwest helps ensure interoperability with new technolo- businesses leverage existing and emerging technology. gies. Look for manageability and operational In addition to services utilizing over 173,000 network simplicity. And whenever possible, strive to miles, Qwest has technology and expertise that extends consolidate multiple security solutions onto a to broader applications and technologies. For more single platform. information, visit (http://www.qwest.com/business/ solutions/why-qwest/list.html 4