Cloud security comes from the details

Source: Internet
Author: User
Keywords Cloud computing cloud security cloud security

  

In recent years, whether the public cloud or private cloud, regardless of enterprise applications or personal applications, cloud computing has been "splendid" infiltration of all aspects of our work and life. A few years ago, employees also rely on enterprise FTP to share information, and now have been all kinds of cloud plate took over. In addition, collaborative Office, Sales progress Management, ERP system and other core applications have been a large number of enterprises to migrate to the cloud. According to a Gartner study in 2013, more than 19% companies have moved most of their management models to the cloud.

However, everything has two sides, in the enjoyment of the convenient and relatively controllable cost of cloud computing at the same time, security is not controllable, also become the enterprise CIOs have to face the problem. It has been reported that 51% of CIOs take security as a decision to migrate to the cloud, most in need of consideration. And the recent "Hollywood Actress" photo leakage incident, but also the cloud security issues to the forefront. Admittedly, many experts point out that the main reason for this event is the unnecessary cloud backup and password protection measures are not tight. However, the warning significance is that the cloud era before the neglect of the details, often become the cloud era of fatal security risks.

Most enterprise CIOs have come to realize that cloud security is less secure than traditional data centers, or that there are no outstanding solutions to deal specifically with security issues such as cloud-specific, such as data disclosure. F5 security experts believe that the traditional data center, network security Thinking Planning cloud security, to some extent, is incomplete. Because cloud computing has more layers of security than traditional data centers, how to control it better from every detail, so that global control is one of the core solutions to cloud security. This, too, is the strength of the F5 application security solutions. F5 that the so-called application delivery network is a safe, fast, and highly available way to deliver applications to the right users. The F5 IP Application Delivery Controller (ADC), F5 IP Application Security Manager (ASM), and the F5 IP Access Policy Manager (APM), and other joint solutions are the starting point for solving problems that traditional firewalls cannot solve. Traditional security solutions try to put together products such as network firewalls, DDoS devices, DNS devices, network application firewalls, and basic ADC. This deployment approach not only increases network complexity, but also fails to address new challenges under the cloud computing architecture. F5, however, focuses on protecting its applications and infrastructure in a centralized manner, as well as controlling application access and policy. In addition, the F5 solution supports the Secure assertion language SAML (Security assertion Markup Language), which enables the exchange of authentication and authorization data between the parties in the application delivery process to help the enterprise consolidate security and access policies at the application level. This enables CIOs to consistently implement policies and ensure that critical applications are always available to customers in a variety of environments, making the deployment of the cloud simpler and more secure.

Finally, on how to ensure the application of security in the cloud environment, F5 security experts also put forward some of their own suggestions: first of all to ensure the availability of applications, the key to the application of security and protection applications, if the application is not available, then the cloud will not talk about the whole. Secondly, to ensure the user experience, users are the user of the application, if they can not quickly, simple, effective use of these applications, then Shanyun security is meaningless. Thirdly, when we talk about security, we suggest that enterprises should strengthen the training of technicians, some network facilities are less efficient or security problems may be caused by users when they use or deploy related equipment, but not from external attacks. Finally, to focus on the future, to avoid building complex infrastructure, security problems are not generated overnight, in the face of increasing problems, forward-looking deployment is very important. Users need to consider the network and security requirements for the next 1-2 years or more, deploying agile, scalable infrastructure. With the rapid increase of IT applications and the rapid development of mobile Internet, users will become extremely passive if they only deploy corresponding solutions based on current requirements.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.