2014 Cloud Security 10 major development directions

Source: Internet
Author: User
Keywords Cloud security cloud computing security

1. Businesses will find the importance of BYOS to the public cloud. As a result of recent government visits to the cloud service provider network, we will see companies invest further in key management systems, enabling businesses to control their own encryption keys or delegate deployment of key security vendors To save its data.

2. Cloud computing security automation will increase. Businesses will look for greater automation and security in cloud computing and find suppliers that can protect their private and public cloud environments.

3. Policy will be the main focus. Automated security based on embedded workload policies will be crucial to the next phase of cloud computing deployment.

4. No longer a single private cloud or public cloud. Businesses will deploy a mix of private and public cloud strategies to give businesses the freedom to choose. While data security and management are important factors in doing so, encrypting all workloads in the cloud will become the default requirement. 5. Integration will continue. Businesses will buy more solutions from a single vendor, hoping to achieve some degree of consolidation between solutions to increase automation security. In addition, there is a big difference between protecting the cloud environment and protecting the traditional physical environment, which will promote the large-scale integration of the cloud computing market.

Private cloud will develop into two camps. There are two different types of buyers to private cloud infrastructure: one is out-of-the-box customers who will buy a pre-integrated solution pre-built on a converged infrastructure platform and another will take advantage of Open source components to build their own private cloud.

7. Businesses turn their attention to automated cloud management. The in-house management process is often complex and involves multiple evaluations of different teams, weakening the flexibility that cloud computing provides and agility will drive the process of automating internal management in 2014.

8. Internal staff will be the number one threat to corporate data breaches. Access control, role control, and "dual governance" will effectively prevent major data breaches in cloud computing and data center failures.

9. Data center consolidation will be a key factor in making private cloud computing more efficient and cost-effective. Next-generation data center architectures will require logical infrastructure separation (rather than physical air separation) to enable multi-tenant private clouds.

10. Enterprises will begin testing and deploying software-defined networking as a next step in their virtualization process. The software-defined infrastructure's management focus will cause businesses to pay more attention to risks and potential catastrophic failures.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.