Eric Chiu, co-founder and president of HyTrust, predicted the 2014 cloud computing. 1. Companies will find the importance of Byos to the public cloud. In view of the recent disclosure of government visits to cloud service provider network events, we will see that companies will invest further in key management systems, whereby the enterprise can implement its own encryption key, or entrust the relevant vendor that deploys key security measures to save its data. 2. Cloud computing security automation will increase. Companies will seek higher automation and security in cloud computing, looking for suppliers that can protect their private cloud and public cloud environments. 3. Policy will be the main focus. Automated security based on embedded workload policies will be critical to the next phase of cloud computing deployment. 4. No longer a single private cloud or public cloud. Companies will deploy hybrid private cloud and public cloud strategies to provide free choice for businesses. Data security and management are important factors in achieving this, and encrypting all workloads in cloud computing will be the default requirement. 5. Consolidation will continue. The enterprise will purchase more solutions from a single vendor, hoping to achieve a greater degree of consolidation between the solutions to improve automation security. In addition, the protection of the cloud environment and the protection of the traditional physical environment is very different, will promote the cloud computing market to a large degree of integration. 6. Private cloud will develop into two camps. There will be two different buyers for the private cloud infrastructure: A "out-of-the-box" customer who will buy a pre-built solution built on a converged infrastructure platform, while another will use open source components to build their own private cloud. 7. Enterprises will turn their eyes to automated cloud management. Enterprise internal management processes are often very complex and involve multiple evaluations of different teams, which weakens the flexibility of cloud computing, and flexibility will facilitate the process of automating internal management in the 2014. 8. Internal personnel will be the number one threat to corporate data disclosure. Access control, role control, and "two-man rule" will effectively prevent the major data leaks in cloud computing and the failure of data centers. 9. Data center consolidation will be a key factor in achieving greater efficiency and cost savings for private cloud computing. The next-generation data Center architecture will require logical infrastructure separation (rather than physical air intervals) to implement a multi-tenant private cloud. 10. The enterprise will begin testing and deploying the software definition network as the next step in its virtualization process. The focus of the software definition infrastructure on the management level will cause the enterprise to pay more attention to risks and potential catastrophic failures. (邹铮 Compilation) "Editorial recommendations" Gartner: Strong differentiation of cloud security growth still exists Gartner: cloud-based Security Service departs "responsible editor: Blue Rain Tear TEL: (010) 68476606" Original: 2014 Cloud computing Security: Automation and Integration return to network security home
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.