The Wayback Machine - https://web.archive.org/web/20120629035510/http://cloudcomputing.sys-con.com:80/node/2302791

Welcome!

Cloud Expo Authors: Konstantin Polukhin, Nicos Vekiarides, Charles McColgan, Maureen O'Gara, Elizabeth White

Related Topics: Cloud Expo, SOA & WOA, Virtualization, Web 2.0

Cloud Expo: Blog Feed Post

Drama in the Cloud: Coming to a Security Theatre Near You

Conflicting messages from various trends are confusing … should you care about the client end-point or not?

Conflicting messages from various trends are confusing … should you care about the client end-point or not?

drama in the cloudOn the one hand, cloud:

quotes"Another key enabling factor for enterprise mobility is the cloud based delivery model for applications. With applications stored and delivered from the cloud, the endpoint device is largely irrelevant, with access allowed through smartphones, tablet devices or laptops. ”

-- Enterprise Mobility ranks highly for IT investment, 25% of businesses rate mobility as a priority in 2012, finds Frost & Sullivan

On the other hand, security:

quotes"If you want to secure the cloud, you need to secure your mobile devices," he explained. "They are the access points to the cloud -- and from an end-user perspective, the difference between the cloud and the mobile phone is lost."

-- BYOD: if you can't beat 'em, secure 'em

What’s a data center to do? Lock them all out, let them all in. There doesn’t seem to be a happy medium. This is comedy meets tragedy without the Greek mythology to make it a satisfying action film.

The conflicting messages are the result of security colliding with productivity, which is probably a lot like security colliding with performance. In other words, we know who all too often wins that confrontation, whether we like it or not. The problem is that many are approaching the conflict with an either/or perspective. They’re trying to answer the question with an allow or deny policy based on the end-point, but ignoring the other end of the equation: the application or resource.

SOLVE for X to DETERMINE ACCESS RIGHTS

Like the two halves of drama, comedy and tragedy, the client and the resource (whether application or file or otherwise), go together. Settling on a BYOD strategy should necessarily not be based solely on the answer to “do we allow X on the network” but on the answer to “do we allow X to access this resource”. For example, in the case of many SaaS-styled applications, i.e. data is always stored in the database or on the server and never on the client, is there some other reason to deny an iPad or other mobile device access over any network?

Probably not.

However, attempting to download that confidential presentation with the latest roadmap of your product line … that may be something you don’t want leaving the building on a mobile device, especially those over which you have no control and cannot wipe in the event of loss or theft. Perhaps even if you do have control, you don’t want certain sensitive documents or data leaving the perimeter of the data center.

The thing is that a BYOD policy can be as complex or simple as you need it to be. You can solve only for X. You can add Y (the network) to the equation. You can add Z (the user) to the equation. You can even add A, B and C to the equation, if desired, where each represents different user, network, or device characteristics, i.e. is the end-point secured and accessing the resource via a VPN?

But it doesn’t have to be the source of more drama than a Greek tragedy starring Oedipus and his ill-fated daughter, Antigone, that’s so tragic it’s nearly comedic (to those watching, of course).

With the proper tools and the right integration, you can implement a BYOD policy that works in the data center and in the cloud, without compromising security or productivity. Context-aware mobile mediation, in addition to providing developers with consistent identification of mobile devices, can also provide the means by which access rights to applications or resources can be determined. Context-awareness encompasses more than just device-type, it can provide network, user, and environmental variables that can be plugged in to your BYOD/Cloud policies and alleviate the frustrating one-off add-on rules that would otherwise overload operations.

If the context-aware mobile mediation is enabled via an intelligent intermediary, like an application delivery controller, operations is further empowered not just to deny access, but to explain why, in simple HTML, to the end-user so they aren’t just frustrated by a failure to connect or a generic “403 Forbidden” status message. Give them an answer; explain to the end-user why they can’t download that confidential, highly sensitive document to their personal iPad. Offer some rationale into the policy behind the allow or deny and it might engender understanding from the end-users (or at least eliminate some dramatic tech support calls asking Why oh WHY can’t they get that file!?).

Right now the conflict between unfettered access to cloud-based and corporate resources and reality is causing a lot of unnecessary drama. The right tools can enable operations and security to implement more flexible, reasonable access policies that may reduce that drama and return some sanity to the data center.

Read the original blog entry...

More Stories By Lori MacVittie

Lori MacVittie is responsible for education and evangelism of application services available across F5’s entire product suite. Her role includes authorship of technical materials and participation in a number of community-based forums and industry standards organizations, among other efforts. MacVittie has extensive programming experience as an application architect, as well as network and systems development and administration expertise. Prior to joining F5, MacVittie was an award-winning Senior Technology Editor at Network Computing Magazine, where she conducted product research and evaluation focused on integration with application and network architectures, and authored articles on a variety of topics aimed at IT professionals. Her most recent area of focus included SOA-related products and architectures. She holds a B.S. in Information and Computing Science from the University of Wisconsin at Green Bay, and an M.S. in Computer Science from Nova Southeastern University.

Cloud Expo Breaking News
SYS-CON Events announced today that CloudTimes has been named “Media Sponsor” of SYS-CON's 11th International Cloud Expo, which will take place on November 5–8, 2012, at the Santa Clara Convention Center in Santa Clara, CA. CloudTimes is a leading technology media property, dedicated to providing in-depth research and breaking news on Cloud Computing and related topics. Apart from its well-known news section, CloudTimes hosts the largest research database on the web, featuring free whitepapers,...
Want to understand in just hours what experts have spent many hundreds of days deciphering? The "super-sized" four-day Cloud Computing Bootcamp is a brief introduction to cloud computing carefully created and devised to help you keep up with evolving trends like Big Data, PaaS, APIs, Mobile, Social and Data Analytics. Solutions built around these topics require a sound cloud computing infrastructure to be successful while helping customers harvest real benefits from this transformational change...
SYS-CON Events announced today that Cloud Spectator has been named “Media Sponsor” of SYS-CON's 11th International Cloud Expo, which will take place on November 5–8, 2012, at the Santa Clara Convention Center in Santa Clara, CA. Cloud Spectator offers cloud computing education to an enterprise audience; constantly analyzing this dynamic industry to keep information up-to-date, as well as providing custom reports to cloud providers.Cloud Expo 2012 Silicon Valley, November 5–8, at the Santa Clara...
A recent survey revealed user attitudes and adoption plans for cloud storage. Nearly three-quarters of cloud storage users estimated they could recover their data within 24 hours One out of every eight organizations that do not use cloud storage responded that it would take “more than a week” to recover their data Respondents were attendees at the recent Cloud Expo at the Javits Center in New York June 11-14, an audience expected to offer more sophisticated insight into the use of cloud compu...
SYS-CON Events announced today that ActiveState, whose software enables developers and enterprises to innovate from code to cloud, has been named “Bronze Sponsor” of SYS-CON's 11th International Cloud Expo, which will take place on November 5–8, 2012, at the Santa Clara Convention Center in Santa Clara, CA. ActiveState empowers innovation from code to cloud smarter, safer, and faster. ActiveState’s cutting-edge solutions give developers and enterprises the power and flexibility to develop in Ja...
SYS-CON Events announced today that BoogarLists has been named “Media Sponsor” of SYS-CON's 11th International Cloud Expo, which will take place on November 5–8, 2012, at the Santa Clara Convention Center in Santa Clara, CA. With a qualified directory of more than 2,000 Venture Capital and Mid-Market/LBO private equity firms, BoogarLists is an excellent place for entrepreneurs to begin their search for investment capital. Whether starting a new company or striving to take an early stage company...
SYS-CON Events announced today that Cloud Security Alliance has been named “Association Sponsor” of SYS-CON's 11th International Cloud Expo, which will take place on November 5–8, 2012, at the Santa Clara Convention Center in Santa Clara, CA. The Cloud Security Alliance (CSA) is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other...
“Big Data is not simply code for lots of information,” observed Victoria Kouyoumjian, Sr. Business and Technologies Strategist at Esri, in this exclusive Q&A; with Cloud Expo Conference Chair Jeremy Geelan. “Instead,” Kouyoumjian noted, “Big Data refers to information in myriad different formats from varying sources – and many of these digital formats and streams haven’t existed until recently.” Cloud Computing Journal: Agree or disagree? – "While the IT savings aspect is compelling, the stronge...
“We are embarking on a critical journey where identity information becomes the key asset of the digital age,” declared Andy Land, Vice President of Marketing at UnboundID, in this exclusive Q&A; with Cloud Expo Conference Chair Jeremy Geelan. Land noted that “Facebook and Google make tremendous amounts of money just by accumulating and selling identity information.” Cloud Computing Journal: Agree or disagree? – "While the IT savings aspect is compelling, the strongest benefit of cloud computing ...
“The definition of cloud and cloud services continues to evolve,” observed Robert Crespi, VP, CIO at Cervalis, in this exclusive Q&A; with Cloud Expo Conference Chair Jeremy Geelan. “As such it is difficult to predict the growth,” Crespi continued, “we see more and more customers migrating to a cloud model with virtualization as it core.” Cloud Computing Journal: Agree or disagree? – "While the IT savings aspect is compelling, the strongest benefit of cloud computing is how it enhances business ...