About the instructor: Joseph Granneman, MBA, CISSP, is a cloud security technology expert and frequent contributor to SearchCloudSecurity.com.
In this part:
Companies are increasingly trusting their most valuable information assets to the cloud. The lure of paying for only the computing that is used combined with rapid deployment and unlimited scalability is hard to resist. The risks of using cloud-based systems are often overcomplicated and misunderstood. Cloud computing assets still need protection using the same types of security technologies that have been in use for some time to protect internal computing assets. However, the different levels of risk dictate specific mitigation strategies for the internal and cloud computing models. The cloud offers a variety of security technologies to meet the developing needs of these mitigation strategies.
This webcast will address all this, and seek to answer key questions such as:
- How are the cloud-specific risks addressed by these new technologies?
- Will these new cloud-specific technologies offer the same level of assurance currently enjoyed by internally hosted computing assets?
- To what end can existing technologies be used in new ways to secure cloud systems and data?
A variety of cloud server security platforms have emerged to enable enterprises to secure cloud-based server systems. These platforms, which offer managed firewalls, vulnerability scanning, logging and alerting, and more, while promising, represent a new frontier for most organizations. This article will details what it is actually like to implement one of these new cloud-specific security platforms, which features are essential, and how to ensure the platform's effectiveness throughout the entire process, from installation to management and testing.
Fact or Fiction Podcast: Evolution of Cloud-Specific Security Technologies
There are many cloud-specific security products and services available to companies today. These technologies began with services to filter email and have grown to encompass almost all aspects of security technologies. Identity management, firewall configuration, intrusion detection, and disaster recovery are all available to support cloud computing security. Learn more about the new, unique options that are becoming available for securing enterprise assets in the cloud.
Quiz: Understanding cloud-specific security technology
Test your knowledge of cloud-specific security technologies in this five-question quiz.
Sponsored by: HP Enterprise Security
With the growing popularity of cloud computing, it is no surprise that Software-as-a-Service model can also be applied to information security. This eGuide examines the array of new Security-as-a-Service tools available today and the key features that are most important in a cloud server security platform.