Cloud computing, as a new concept, has been applied to many areas of the Internet. In the area of Internet security, the choice and use of enterprise cloud computing is still controversial. To understand the security of enterprise cloud computing, we first need to know what is cloud computing, and understanding of cloud computing, we seem to be able to from the hundred years ago in the history of Ford car found common ground. From Ford to why we were using cloud Henry Ford and 11 other partners in 1903, when we founded the company, we were determined to get the car into the home of ordinary consumers, and five years later, the idea of the Ford T-Car came into being, and Henry Ford's vision came true. The popularity of automobiles has also added to America's nickname, "The country on the wheel". Before that, cars had been manufactured in a manual fashion, with low productivity and high costs, making it possible for cars to serve only the most affluent sectors of society. After that, Ford introduced the concept of pipelining, with the assembly line standardization of large-scale manufacturing process to replace the traditional manual production process, revolutionary changes in the efficiency of the car to make a leap in the cost of an astonishing decline, after the 1920s, Ford further promote standardization, no longer production of car parts, All parts and components are procured, the cost is further reduced. Ford's program has been recognized globally and has become a standard framework for the modern automotive industry. Back to it, we can see some similarities. In the existing mode, the needs of all aspects of the enterprise need to be implemented through hardware and software, and hardware and software need to buy their own to maintain, no doubt, this is a heavy burden for the enterprise. In the era of cloud computing, everything is simple, all the hardware and software no longer need to buy and maintain enterprises, enterprises need to do is only in the cloud to buy services, enterprises only have data. In the cloud computing environment, the enterprise not only reduces the cost and maintenance of hardware and software, but also can enjoy the services that many of the original enterprises in the cloud do not have enough financial resources to set up. As a business, why not? This is the change that cloud computing brings to our world, and we can better understand the concept of cloud computing that Matthew Gardiner shared with us: "Packaging academic, technological and business models to make it capacity to become an on demand, scale-expanding, and flexible service. "Is the cloud 100% perfect?" The answer to the question in this little headline is obviously negative! The reason is based on a very obvious fact: if the cloud computing has been 100% perfect, then the enterprise has not hesitate to all the embrace of cloud computing, why still rocking it? What makes businesses and organisations hesitant? Zhou Haoliang and Matthew Gardiner told us the answer is: security, the answer is now most people in the industry agree. The data presented to us by CA Technologies shows that 50% of companies believe that identity authentication and management is a cloudThe biggest security issues for the generation, transactional coherence and post-disaster reconstruction, electronic search procedures and compliance are also concerns about cloud computing security. As for who is responsible for the security of cloud computing, but also diverging, in the CA Technologies Survey Report, 69% of the enterprises think that the end user is responsible for security, while 64% of the enterprises to emphasize the management of trading units, 59% of the enterprises in the information technology sector to support, and even 25% Enterprises do not find a suitable responsible unit, more than 11% of the enterprises to the compliance and legitimacy of the perfect. What is the focus of cloud computing security? Matthew Gardiner that the answer to the previous question is identity authentication management and data security, only to achieve a sound identity authentication management will be possible to further ensure the security of the cloud; the latter problem, Matthew, is that it's security must be back in control, and cloud service providers and users of the cloud need to work together to be responsible for security.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.