SlideShare uma empresa Scribd logo
1 de 14
Baixar para ler offline
Cloud Security: Myths Vs.
Facts
Cloud Security:
VS.MYTHS FACTS
Intro
Cloud computing is becoming one of the most talked-about trends in IT today, which
also means it’s one of the most misunderstood. Although there are numerous benefits
for businesses to switch from hosting their own servers to using a cloud platform, many
of them have refused to pull the trigger, even though it could save them millions. Cloud-
based computing solutions have the potential to give businesses greater flexibility, reduce
the need for expensive equipment, and streamline IT requirements. However, many
businesses won’t take advantage for one simple reason: They fear that cloud computing is
not as secure for their data as maintaining servers on site.
TipNo.2:EatRight
The belief that cloud computing is not as secure as on-site servers stems from a number
of myths that have been floating around since the first cloud-based solutions were
introduced. Businesses fear that by handing the keys to their information kingdom to a
third-party provider, they would open themselves to all manner of risk — from greater
vulnerability to hackers to untrustworthy providers selling their information without their
knowledge. Even though IT security should be at top of mind for businesses for good
reason, many of the fears they have about cloud computing are based in myth. Some of
the most common myths about cloud security are presented on the following slides —
along with the facts that dispel these myths.
The cloud is inherently less secure than physical servers.
One of the most common misconceptions about cloud security is that there’s no such
thing as cloud security. Many businesses believe that cloud computing relies on dumping
all of their data to an outside source, making the cloud inherently less secure than
keeping all of it on site in their own servers.
MYTH 1
Cloud computing doesn’t have to be completely external.
Although the perception is that cloud computing happens completely off site in all
circumstances, the truth is that cloud computing can take many forms:
•	 Public — all services are provided by the third-party cloud provider
•	 Private — all services are managed internally by the organization
•	 Hybrid — a mixture of public and private cloud solutions are utilized
More than half of all businesses using the cloud utilize a hybrid approach.
FACT 1
Securing the cloud is the provider’s sole responsibility.
The myth that cloud computing involves pushing all data off site also gives rise to the
myth that securing that data is completely the responsibility of the cloud provider. This
idea makes many businesses squeamish about trusting cloud providers because they
believe their own security protocols won’t be a factor.
MYTH 2
You need to continue to focus on security internally.
Businesses using the cloud still have control over the security of their data on the cloud.
Backing up data, establishing password policies and determining data management
policies are among the many responsibilities still in the hands of the customer when using
cloud computing solutions.
FACT 2
Cloud breaches are more frequent.
Of course, because cloud computing is perceived by many businesses to be less secure
than on-site servers, they also believe that there are far more breaches with cloud
computing. This belief just feeds into the rationale that cloud computing is less secure,
and so on and so on.
MYTH 3
On-premise servers are more vulnerable to certain types of attacks.
Having all of your data on servers in your own building might feel more secure, but the truth
is that it doesn’t matter where the server is physically. The level of security is what counts. In
fact, studies have shown that on-site servers are more susceptible to certain types of cyber
attacks, such as malware, that are far more common than other types of attacks.
FACT 3
Cloud security is too difficult for anyone to maintain.
The idea that cloud security isn’t effective or even possible often drives companies to
avoid using it in situations where they’d receive the most benefit from it. It also can lead to
businesses operating with insufficient security on cloud applications, because they believe
the proper level of security will hamper their business operations.
MYTH 4
Cloud security is no more challenging than any other type of network security.
Even though the cloud is seen as something different from a typical network, the truth is
that protecting the cloud is no more difficult than protecting a typical network — because
in the end, that’s what the cloud really is. Cloud computing is little more than using a
network that’s not maintained on site. The security issues facing the cloud are no more
challenging than those facing on-site networks.
FACT 4
You can’t find out what cloud providers are doing with your data.
Turning the management of data over to a third-party provider can be difficult for many
businesses to do; they have fears about what will happen to their data or who will be able
to access it. Because some businesses don’t believe the cloud provider can ensure their
systems will be secure, they choose not to take what they perceive to be an extreme risk.
MYTH 5
Cloud providers are still accountable for protecting data.
Businesses may feel that trusting the cloud means they are handing the keys to the
kingdom to someone who can let just anyone in, but this is not necessarily true. Reputable
cloud providers will be able to provide customers with audit logs that will identify everyone
who has or had access to their data and provide proof of background checks, if requested.
FACT 5
www.OpaqNetworks.com

Mais conteúdo relacionado

Mais procurados

Ciso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data ExposedCiso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data Exposed
Elastica Inc.
 

Mais procurados (20)

Ciso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data ExposedCiso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data Exposed
 
Security in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataSecurity in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your Data
 
Cloud Security - Kloudlearn
Cloud Security - KloudlearnCloud Security - Kloudlearn
Cloud Security - Kloudlearn
 
The Top Cloud Security Issues
The Top Cloud Security IssuesThe Top Cloud Security Issues
The Top Cloud Security Issues
 
Can Cloud Solutions Transform Network Security
Can Cloud Solutions Transform Network SecurityCan Cloud Solutions Transform Network Security
Can Cloud Solutions Transform Network Security
 
How to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within BoxHow to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within Box
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure Sentinel
 
Protecting Your Data In Office 365
Protecting Your Data In Office 365Protecting Your Data In Office 365
Protecting Your Data In Office 365
 
Protecting your Data in Google Apps
Protecting your Data in Google AppsProtecting your Data in Google Apps
Protecting your Data in Google Apps
 
Shadow Data Exposed
Shadow Data ExposedShadow Data Exposed
Shadow Data Exposed
 
Reasoning About Enterprise Application Security in a Cloudy World
Reasoning About Enterprise Application Security in a Cloudy WorldReasoning About Enterprise Application Security in a Cloudy World
Reasoning About Enterprise Application Security in a Cloudy World
 
Cloud Computing Risks by Ravi Namboori Cisco Evangelist
Cloud Computing Risks by Ravi Namboori Cisco EvangelistCloud Computing Risks by Ravi Namboori Cisco Evangelist
Cloud Computing Risks by Ravi Namboori Cisco Evangelist
 
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesForrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
 
Cloud Security Demo
Cloud Security DemoCloud Security Demo
Cloud Security Demo
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud Security
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Enabling Dropbox for Business
Enabling Dropbox for BusinessEnabling Dropbox for Business
Enabling Dropbox for Business
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate Brochure
 
Cloud Security Myths vs Facts
Cloud Security Myths vs FactsCloud Security Myths vs Facts
Cloud Security Myths vs Facts
 
Security automation in virtual and cloud environments v2
Security automation in virtual and cloud environments v2Security automation in virtual and cloud environments v2
Security automation in virtual and cloud environments v2
 

Semelhante a Cloud Security Myths Vs Facts

Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
Er. rahul abhishek
 
Please read the below discussion post and provide response in 75 to .docx
Please read the below discussion post and provide response in 75 to .docxPlease read the below discussion post and provide response in 75 to .docx
Please read the below discussion post and provide response in 75 to .docx
christalgrieg
 
Iirdem a novel approach for enhancing security in multi cloud environment
Iirdem a novel approach for enhancing security in multi  cloud environmentIirdem a novel approach for enhancing security in multi  cloud environment
Iirdem a novel approach for enhancing security in multi cloud environment
Iaetsd Iaetsd
 
Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!
centralohioissa
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Atul Pant
 

Semelhante a Cloud Security Myths Vs Facts (20)

The Myths of the Cloud are Holding Businesses Back
The Myths of the Cloud are Holding Businesses BackThe Myths of the Cloud are Holding Businesses Back
The Myths of the Cloud are Holding Businesses Back
 
Debunking common cloud hosting myths
Debunking common cloud hosting mythsDebunking common cloud hosting myths
Debunking common cloud hosting myths
 
5 Mysteries of the Cloud Revealed
5 Mysteries of the Cloud Revealed5 Mysteries of the Cloud Revealed
5 Mysteries of the Cloud Revealed
 
Security threat in cloud computing
Security threat in cloud computingSecurity threat in cloud computing
Security threat in cloud computing
 
5 Mysteries of the Cloud Revealed
5 Mysteries of the Cloud Revealed5 Mysteries of the Cloud Revealed
5 Mysteries of the Cloud Revealed
 
Facing the Future - Is the cloud right for you?
Facing the Future - Is the cloud right for you?Facing the Future - Is the cloud right for you?
Facing the Future - Is the cloud right for you?
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
 
Please read the below discussion post and provide response in 75 to .docx
Please read the below discussion post and provide response in 75 to .docxPlease read the below discussion post and provide response in 75 to .docx
Please read the below discussion post and provide response in 75 to .docx
 
Iirdem a novel approach for enhancing security in multi cloud environment
Iirdem a novel approach for enhancing security in multi  cloud environmentIirdem a novel approach for enhancing security in multi  cloud environment
Iirdem a novel approach for enhancing security in multi cloud environment
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issues
 
Secure Computing in Enterprise Cloud Environments
Secure Computing in Enterprise Cloud EnvironmentsSecure Computing in Enterprise Cloud Environments
Secure Computing in Enterprise Cloud Environments
 
Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!
 
B018211016
B018211016B018211016
B018211016
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Myths About Cloud Computing
Myths About Cloud ComputingMyths About Cloud Computing
Myths About Cloud Computing
 
Data Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdfData Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdf
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Cloud Security Myths Vs Facts

  • 1. Cloud Security: Myths Vs. Facts Cloud Security: VS.MYTHS FACTS
  • 2. Intro Cloud computing is becoming one of the most talked-about trends in IT today, which also means it’s one of the most misunderstood. Although there are numerous benefits for businesses to switch from hosting their own servers to using a cloud platform, many of them have refused to pull the trigger, even though it could save them millions. Cloud- based computing solutions have the potential to give businesses greater flexibility, reduce the need for expensive equipment, and streamline IT requirements. However, many businesses won’t take advantage for one simple reason: They fear that cloud computing is not as secure for their data as maintaining servers on site.
  • 3. TipNo.2:EatRight The belief that cloud computing is not as secure as on-site servers stems from a number of myths that have been floating around since the first cloud-based solutions were introduced. Businesses fear that by handing the keys to their information kingdom to a third-party provider, they would open themselves to all manner of risk — from greater vulnerability to hackers to untrustworthy providers selling their information without their knowledge. Even though IT security should be at top of mind for businesses for good reason, many of the fears they have about cloud computing are based in myth. Some of the most common myths about cloud security are presented on the following slides — along with the facts that dispel these myths.
  • 4. The cloud is inherently less secure than physical servers. One of the most common misconceptions about cloud security is that there’s no such thing as cloud security. Many businesses believe that cloud computing relies on dumping all of their data to an outside source, making the cloud inherently less secure than keeping all of it on site in their own servers. MYTH 1
  • 5. Cloud computing doesn’t have to be completely external. Although the perception is that cloud computing happens completely off site in all circumstances, the truth is that cloud computing can take many forms: • Public — all services are provided by the third-party cloud provider • Private — all services are managed internally by the organization • Hybrid — a mixture of public and private cloud solutions are utilized More than half of all businesses using the cloud utilize a hybrid approach. FACT 1
  • 6. Securing the cloud is the provider’s sole responsibility. The myth that cloud computing involves pushing all data off site also gives rise to the myth that securing that data is completely the responsibility of the cloud provider. This idea makes many businesses squeamish about trusting cloud providers because they believe their own security protocols won’t be a factor. MYTH 2
  • 7. You need to continue to focus on security internally. Businesses using the cloud still have control over the security of their data on the cloud. Backing up data, establishing password policies and determining data management policies are among the many responsibilities still in the hands of the customer when using cloud computing solutions. FACT 2
  • 8. Cloud breaches are more frequent. Of course, because cloud computing is perceived by many businesses to be less secure than on-site servers, they also believe that there are far more breaches with cloud computing. This belief just feeds into the rationale that cloud computing is less secure, and so on and so on. MYTH 3
  • 9. On-premise servers are more vulnerable to certain types of attacks. Having all of your data on servers in your own building might feel more secure, but the truth is that it doesn’t matter where the server is physically. The level of security is what counts. In fact, studies have shown that on-site servers are more susceptible to certain types of cyber attacks, such as malware, that are far more common than other types of attacks. FACT 3
  • 10. Cloud security is too difficult for anyone to maintain. The idea that cloud security isn’t effective or even possible often drives companies to avoid using it in situations where they’d receive the most benefit from it. It also can lead to businesses operating with insufficient security on cloud applications, because they believe the proper level of security will hamper their business operations. MYTH 4
  • 11. Cloud security is no more challenging than any other type of network security. Even though the cloud is seen as something different from a typical network, the truth is that protecting the cloud is no more difficult than protecting a typical network — because in the end, that’s what the cloud really is. Cloud computing is little more than using a network that’s not maintained on site. The security issues facing the cloud are no more challenging than those facing on-site networks. FACT 4
  • 12. You can’t find out what cloud providers are doing with your data. Turning the management of data over to a third-party provider can be difficult for many businesses to do; they have fears about what will happen to their data or who will be able to access it. Because some businesses don’t believe the cloud provider can ensure their systems will be secure, they choose not to take what they perceive to be an extreme risk. MYTH 5
  • 13. Cloud providers are still accountable for protecting data. Businesses may feel that trusting the cloud means they are handing the keys to the kingdom to someone who can let just anyone in, but this is not necessarily true. Reputable cloud providers will be able to provide customers with audit logs that will identify everyone who has or had access to their data and provide proof of background checks, if requested. FACT 5