
By Kevin Nikkhoo | Article Rating: |
|
October 5, 2012 11:00 AM EDT | Reads: |
962 |

No, this isn't 7th grade English...I promise.
With all the important decisions IT departments make, what’s the big deal whether cloud security means from the cloud, in the cloud, of the cloud or for the cloud. Well, a lot. Among the various media, blogs, professional chatter, webinars, conferences and the like, the concept of cloud security is getting a significant amount of airplay. However, the difference in the application of a simple preposition completely alters the scope and meaning of these conversations to that of a problem or a solution.
Security IN the cloud frames the overarching issue. It is the problems often discussed by IT professionals today. They range from questions about the safety of data held within a virtualized environment to that of cyber hactivism or why do my users keep insisting on using their smartphones to access the network? These issues often point to the cloud as some wide open Wild, Wild West situation. Sorry, but I disagree. I think the cloud as a platform has matured to the point where it is a viable, protective and proactive choice. These issues would exist on any enterprise’s on-premise set up. Companies like ADP, salesforce.com, Office365, Azure have taken great pains to ensure the data processed or stored on or via their servers have a degree of security equal to or exceeding that of any on premise set-up.
But what about Yahoo? What about LinkedIn? All those passwords breached. But before you set your hair on fire and scream the “cloud is falling,” - for every cloud-centric breach, there are just as many (or more) on-premise breaches. Poor or porous security knows no platform. It favors no deployment scenario and creates no safe haven for users. Security, like any other element of an enterprise is built on smart process, consistent monitoring and effective tools. A substandard, half-hearted approach to any of these three and those unsettling headlines we read about every few months might feature a familiar company name.
In stark contrast, security FROM the cloud is the means to protect IT assets without having the heavy investments in servers, software and a variety of other related costs. But it is much more than cost savings and democratizing access to protection. For some it is the holistic application of best practices, real time visibility and best of breed solutions. “From” the cloud is providing a scalable layer of security that was typically reserved for trillion dollar companies easily deployed for any company of any size. For others it is the ability to link all the independent silos of information including transactions, proprietary data, applications (legacy and in the cloud) and manage them centrally with a greater degree of focus and accuracy.
Security FROM the cloud answers the questions posed by security IN the cloud. Who has access? Who controls that access? Can we report activity to maintain compliance? What is harmless traffic and what needs to be remediated in real time? Do I have the resources to monitor and react to issues 24/7/365? How do I centralize security analysis so I don’t have to repeat processes system after system? How do I control all those applications the sales team accesses from beyond the so-called network perimeter? What happens when an employee leaves the company or a vendor’s contract expires? Who controls all the passwords? How is data aggregated, stored/destroyed, transited and digested? Is my data safe? So many issues, so little bandwidth…until you apply an answer FROM the cloud.
Now of course, security-as-a-service (aka security FROM the cloud) or cloud-based security is not a panacea. It still depends on workflow process and the expertise to define and apply that process. But the issues surrounding scope, scale, control, capability, centralization, correlation, fast-to-market and cost are answered. The important thing to remember is that FROM the cloud is a holistic (and sometimes automated) set of enterprise controls designed to protect assets. The fact that it is managed and controlled from the cloud is simply a value added advantage. It provides a cost-effective means and accelerated degree of flexibility that can be translated into a redirection of core competency priorities. Simply put…you can worry about one less things and get to work on IT issues that drive your company forward. Of the many hats we often force our IT professionals to wear, here is one they can take off with the confidence that the goals of the enterprise are being met and its assets are properly protected.
So a preposition can make all the difference. Now the next time a blogger or industry pundit explains the wonders or the perils of the cloud…you just have to remember FROM where real solutions come.
Published October 5, 2012 Reads 962
Copyright © 2012 SYS-CON Media, Inc. — All Rights Reserved.
Syndicated stories and blog feeds, all rights reserved by the author.
More Stories By Kevin Nikkhoo
With more than 32 years of experience in information technology, and an extensive and successful entrepreneurial background, Kevin Nikkhoo is the CEO of the dynamic security-as-a-service startup Cloud Access. CloudAccess is at the forefront of the latest evolution of IT asset protection--the cloud.
Kevin holds a Bachelor of Science in Computer Engineering from McGill University, Master of Computer Engineering at California State University, Los Angeles, and an MBA from the University of Southern California with emphasis in entrepreneurial studies.
![]() Oct. 5, 2012 05:08 PM EDT Reads: 623 |
By Liz McMillan Oct. 5, 2012 03:06 PM EDT Reads: 649 |
By Pat Romanski ![]() Oct. 5, 2012 03:00 PM EDT Reads: 942 |
By Pat Romanski ![]() Oct. 5, 2012 01:26 PM EDT Reads: 687 |
By Liz McMillan ![]() Oct. 5, 2012 12:15 PM EDT Reads: 808 |
By Elizabeth White ![]() Oct. 5, 2012 11:15 AM EDT Reads: 1,103 |
By Elizabeth White Oct. 5, 2012 11:03 AM EDT Reads: 746 |
By Elizabeth White ![]() Oct. 5, 2012 11:00 AM EDT Reads: 1,073 |
By Liz McMillan ![]() Oct. 5, 2012 11:00 AM EDT Reads: 1,031 |
By Liz McMillan ![]() Oct. 5, 2012 10:00 AM EDT Reads: 1,023 |
- Cloud People: A Who's Who of Cloud Computing
- Twelve New Programming Languages: Is Cloud Responsible?
- Cloud Expo Silicon Valley Speaker Profile: James Weir – UShareSoft
- Cloud Expo Silicon Valley Speaker Profile: George Gerchow – VMware
- Cloud Expo Silicon Valley Speaker Profile: Mark Skilton – Capgemini
- Cloud Expo Silicon Valley Speaker Profile: Rich Wolski – Eucalyptus Systems
- Rackspace Hosting “Platinum Plus Sponsor” Cloud Expo Silicon Valley
- Gartner Hype Cycle 2011 - Emerging Technologies
- Big Data: The ‘Perfect Storm’ Syndrome
- Examining the True Cost of Big Data
- BigDataExpo Silicon Valley Speaker Profile: Cory Isaacson – CodeFutures
- System Center Virtual Machine Manager 2012 as Private Cloud Enabler
- Cloud People: A Who's Who of Cloud Computing
- Twelve New Programming Languages: Is Cloud Responsible?
- Cloud Expo Silicon Valley Speaker Profile: James Weir – UShareSoft
- Cloud Expo Silicon Valley Speaker Profile: George Gerchow – VMware
- Cloud Expo Silicon Valley Speaker Profile: Mark Skilton – Capgemini
- Big Data – A Sea Change of Capabilities in IT
- Cloud Expo Silicon Valley Speaker Profile: Rich Wolski – Eucalyptus Systems
- Rackspace Hosting “Platinum Plus Sponsor” Cloud Expo Silicon Valley
- Gartner Hype Cycle 2011 - Emerging Technologies
- Big Data: The ‘Perfect Storm’ Syndrome
- Safeguarding Management and Security in the Cloud
- Big Data: Information Spawns Innovation
- The Top 150 Players in Cloud Computing
- What is Cloud Computing?
- Six Benefits of Cloud Computing
- What's the Difference Between Cloud Computing and SaaS?
- Virtualization Conference Keynote Webcast Live on SYS-CON.TV
- Twenty-One Experts Define Cloud Computing
- The Top 250 Players in the Cloud Computing Ecosystem
- The Future of Cloud Computing
- GDS International: Global Warming Scam?
- A Brief History of Cloud Computing: Is the Cloud There Yet?
- Cloud Expo Europe 2009 in Prague: Themes & Topics
- SOA 2 Point Oh No!