Cloud security will be the most important

Source: Internet
Author: User
Keywords Security cloud security cloud security
Tags access access to data applications based block broadband broadband operators cloud

Cloud security has so far focused on securing the data at the host site, as well as the security of the data across the corporate WAN. This may be sufficient for enterprises that use cloud services from the office, but this protection is not sufficient for users who have access to data stored in the cloud from unsecured public networks. As more and more broadband operators provide global connectivity, it is easier for users to access Enterprise Services from any Wi-Fi connection. Companies should pay attention to this potential threat. You can't secure every public network, but you can train users and prevent them from accessing cloud services or corporate data from an unknown network.

Dell: Cloud Computing-many companies are currently using cloud computing, which poses an unknown security threat and leads to targeted attacks on enterprise data and applications. The findings show that these hidden threats are highly risky. 73% of respondents said their companies were using cloud computing (90% in the US). Nearly half (49%) of respondents put cloud computing as an important security risk for the next five years, reflecting concerns about the future, and only 22% per cent said that data transfer to the cloud was a major security risk at the moment. Think of security as the main priority for next year's business, 86% is using the cloud. 21% of respondents believe that using cloud applications or services is the root cause of their security breaches.

McAfee: The deployment of cloud based enterprise applications will create new "attack surfaces" available to cyber criminals. Cyber criminals will seek more ways to attack the ubiquitous hypervisor in all data centers, the multi-tenant access and communication infrastructure implied in cloud services, and the management infrastructure for configuring and monitoring large cloud services. Because of the lack of adequate means to implement security measures to meet the needs of the enterprise, small businesses that purchase cloud-based services will continue to face security risks that cannot be addressed through the cloud service provider's user protocols and operating procedures.

Websense: Compared to data stored in the corporate network, cyber criminals focus their attacks on data stored in the cloud. This tactical shift follows the transfer of critical business data to cloud-based solutions such as Google, Microsoft Office 365, and confluence. They will find it easier and more profitable to invade a cloud that stores a vast amount of verse than an impregnable intranet.

There is no doubt that attackers will still invade the corporate network, targeting users, stealing information and hacking into the system. However, such attacks will serve as an intermediate step to gain access to the third cloud service rather than the internal data store.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.