Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    stock investing and data analytics
    How Data Analytics Supports Smarter Stock Trading Strategies
    4 Min Read
    predictive analytics risk management
    How Predictive Analytics Is Redefining Risk Management Across Industries
    7 Min Read
    data analytics and gold trading
    Data Analytics and the New Era of Gold Trading
    9 Min Read
    composable analytics
    How Composable Analytics Unlocks Modular Agility for Data Teams
    9 Min Read
    data mining to find the right poly bag makers
    Using Data Analytics to Choose the Best Poly Mailer Bags
    12 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Myths and Realities of Cloud Security
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Cloud Computing > Myths and Realities of Cloud Security
Cloud ComputingSecurity

Myths and Realities of Cloud Security

AlexOlesker
AlexOlesker
3 Min Read
SHARE

Whenever the topic of cloud computing comes up, cloud security isn’t far behind. Survey after survey has shown it to be a top CIO concern, but how much of that concern is legitimate?   CTOvision’s Bob Gourley and Tom Reilly, Vice President and General Manger of Enterprise Security at HP separated myth from reality on cloud security in an interview with IDG’s Bill Laberis at the HP Protect 2011 conference on Monday, September 12, 2011.

More Read

Big Data Analytics and Cloud Analytics: Embracing the Cloud and the Big Data Grid
Tactics to Protect Against Most Common Cyber Attacks
7 Ways Online Businesses Can Stop Data Breaches Through Social Media
How Cybersecurity Is Creating Opportunities For Young People
Where is the Cloud?

While concerns over cybersecurity are well founded especially if an organization makes a hasty transition to cloud computing, it’s a myth that the cloud must be less secure than conventional computing. If you architect and design for the cloud, your enterprise can be more secure than ever, even when your data is going out to mobile devices.

Tom noted that current trends like cloud and mobile are major IT transformations and such transformations always bring new risks, just like the transitions from mainframe to client servers, then from client servers to IP addresses, and finally web applications.  Each shift has come with increasing risk, but due to the tremendous business benefits the IT industry has adapted and faced the new challenges. With cloud computing, we’re doing even better by designing security into the new platforms rather than waiting for threats and reactively adding in security measures. This helps the IT industry overcome its concerns by designing cloud to be inherently safer than current platforms.

To achieve this, CIOs and CISOs must change the way they think. Bob Gourley advocated treating security as a discipline so that designers can think it through fully when switching platforms and creating cloud and mobile solutions. Tom Reilly reiterated designing security into the cloud, so that organizations adopt the cloud because of, not despite, security.  Some examples of this are making the cloud transparent so that you have visibility into a multi-tenant environment to see how your operation is being conducted.  Applications for the cloud should have their vulnerabilities designed out before they even reach production, and there needs to be research into possible attacks on a cloud environment. The key, Reilly notes, is that, as a multi-tenant environment shared by several divisions or corporations, the cloud can have more invested into security than any single division or corporation has in its current platform.

TAGGED:Bob Gourleycloudcloud security
Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

stock investing and data analytics
How Data Analytics Supports Smarter Stock Trading Strategies
Analytics Exclusive
qr codes for data-driven marketing
Role of QR Codes in Data-Driven Marketing
Big Data Exclusive
microsoft 365 data migration
Why Data-Driven Businesses Consider Microsoft 365 Migration
Big Data Exclusive
real time data activation
How to Choose a CDP for Real-Time Data Activation
Big Data Exclusive

Stay Connected

1.2KFollowersLike
33.7KFollowersFollow
222FollowersPin

You Might also Like

Alteryx 8.5 and the Data Artisan: Focusing on the User Experience of the “New Boss”

8 Min Read

Cloud ERP – Efficient, Innovative, or Both?

7 Min Read
cloud customer support
Business IntelligenceCloud ComputingExclusive

How Cloud Customer Support Helps Your Business Grow

9 Min Read

Top Financial Risks of Doing Business in the Cloud

5 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

data-driven web design
5 Great Tips for Using Data Analytics for Website UX
Big Data
AI and chatbots
Chatbots and SEO: How Can Chatbots Improve Your SEO Ranking?
Artificial Intelligence Chatbots Exclusive

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?