The benefits of cloud computing are many, since utmost, some of the benefits are related to saving money, so at this time is quite attractive. To list several items, you can list: You can get computing resources without large investments, reduce data center infrastructure and power consumption, reduce PC energy consumption and cost, faster and faster completion of projects, and use IT staff where needed, without having to worry about maintaining infrastructure or software version upgrades. There are many benefits.
This computing model is supported by virtual machines, dynamically creating more application instances to meet computing needs, and improving business processes, such as in user-oriented Web applications, where cloud computing can rapidly expand processing power when the peak of application surges.
Of course, the shortcomings are inevitable, the choice of cloud computing enterprises have to give up the operation of the cloud in the direct control of the enterprise assets. In the cloud data and applications can not be like the enterprise's own data center as everything in the palm, physical security, identity authentication, authorization, intrusion detection, firewall, virus prevention and other security measures have to entrust others.
In other words, improper cloud security, the consequences are very serious. May lose the enterprise's intellectual property rights not to say, once sensitive personal data is leaked or stolen, then the enterprise's reputation will also Shiti.
Cloud-computing vendors are clearly aware of these risks, and are also working on security efforts to address their customers ' concerns. Strictly speaking, these efforts should be carried out in accordance with the standards. When deploying cloud computing strategies, you need to consider how to use cloud computing and how to safely use cloud computing.
There are also questions to be taken into account when employing outside enterprises to deal with the cloud-based infrastructure security of their enterprise customers: how efficient are these enterprises and whether they are safe themselves? Customers must understand this.
Cloud services are already quite prevalent. Some even say that once the problem of reliability and security is solved, it will become the mainstream model of network infrastructure in the future.
This article just wants to raise these questions to help businesses understand the basics of cloud security. The goal is to provide readers with valuable cloud security information.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.