Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    composable analytics
    How Composable Analytics Unlocks Modular Agility for Data Teams
    9 Min Read
    data mining to find the right poly bag makers
    Using Data Analytics to Choose the Best Poly Mailer Bags
    12 Min Read
    data analytics for pharmacy trends
    How Data Analytics Is Tracking Trends in the Pharmacy Industry
    5 Min Read
    car expense data analytics
    Data Analytics for Smarter Vehicle Expense Management
    10 Min Read
    image fx (60)
    Data Analytics Driving the Modern E-commerce Warehouse
    13 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Myths and Realities of Cloud Security
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Cloud Computing > Myths and Realities of Cloud Security
Cloud ComputingSecurity

Myths and Realities of Cloud Security

AlexOlesker
AlexOlesker
3 Min Read
SHARE

Whenever the topic of cloud computing comes up, cloud security isn’t far behind. Survey after survey has shown it to be a top CIO concern, but how much of that concern is legitimate?   CTOvision’s Bob Gourley and Tom Reilly, Vice President and General Manger of Enterprise Security at HP separated myth from reality on cloud security in an interview with IDG’s Bill Laberis at the HP Protect 2011 conference on Monday, September 12, 2011.

More Read

network security credentials to stop data breaches
Ensuring Cloud Vendor Security Transparency in the Age of Data Breaches
Self-Healing Virtual Machines Coming to Datacenter Near You?
Data Shortcuts So You Can Spend More Time Managing Your Business
Facebook’s ThreatExchange to Help Cyber Security Experts Coordinate Their Efforts Against Hackers
PCI-Compliant Supermarket Chain Bashas’ Breached

While concerns over cybersecurity are well founded especially if an organization makes a hasty transition to cloud computing, it’s a myth that the cloud must be less secure than conventional computing. If you architect and design for the cloud, your enterprise can be more secure than ever, even when your data is going out to mobile devices.

Tom noted that current trends like cloud and mobile are major IT transformations and such transformations always bring new risks, just like the transitions from mainframe to client servers, then from client servers to IP addresses, and finally web applications.  Each shift has come with increasing risk, but due to the tremendous business benefits the IT industry has adapted and faced the new challenges. With cloud computing, we’re doing even better by designing security into the new platforms rather than waiting for threats and reactively adding in security measures. This helps the IT industry overcome its concerns by designing cloud to be inherently safer than current platforms.

To achieve this, CIOs and CISOs must change the way they think. Bob Gourley advocated treating security as a discipline so that designers can think it through fully when switching platforms and creating cloud and mobile solutions. Tom Reilly reiterated designing security into the cloud, so that organizations adopt the cloud because of, not despite, security.  Some examples of this are making the cloud transparent so that you have visibility into a multi-tenant environment to see how your operation is being conducted.  Applications for the cloud should have their vulnerabilities designed out before they even reach production, and there needs to be research into possible attacks on a cloud environment. The key, Reilly notes, is that, as a multi-tenant environment shared by several divisions or corporations, the cloud can have more invested into security than any single division or corporation has in its current platform.

TAGGED:Bob Gourleycloudcloud security
Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

composable analytics
How Composable Analytics Unlocks Modular Agility for Data Teams
Analytics Big Data Exclusive
fintech startups
Why Fintech Start-Ups Struggle To Secure The Funding They Need
Infographic News
edge networks in manufacturing
Edge Infrastructure Strategies for Data-Driven Manufacturers
Big Data Exclusive
data mining to find the right poly bag makers
Using Data Analytics to Choose the Best Poly Mailer Bags
Analytics Big Data Exclusive

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

AI and cloud security
Artificial Intelligence

AI Driven Cloud Security Becomes Tremendously Important In 2020

8 Min Read

Cloudy with a Chance of Wrecking Your Business Model

4 Min Read

Intelligence in the Cloud

9 Min Read

Cloud Security: Vetting Applications and Cloud Providers for Compliance and Security

6 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

ai is improving the safety of cars
From Bolts to Bots: How AI Is Fortifying the Automotive Industry
Artificial Intelligence
ai in ecommerce
Artificial Intelligence for eCommerce: A Closer Look
Artificial Intelligence

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?