EFY Times  
Sunday, April 20, 2014

 
GO
 
 

Five Steps For A Secure Cloud Transition
 
Home >> Infotech >> Features
 
Five Steps For A Secure Cloud Transition  
 
Before you move to the cloud, you need to make sure your data is safe.   
Rate this news:  (0 Votes)
Monday, July 30, 2012 Almost every type of SMB is examining its current IT infrastructure, determining what data and processes can move to the cloud. Of course, security remains one of the biggest concerns. Here are five steps to make the transition much safer for your data and your company:

cloud, greensql, cloud service, SaaS




1. Understanding my "Attackability Surface": Before considering migrating to the cloud, map every project component, and map all the hazards. Including which operating systems will be used, which applications will be installed, which types of security mechanisms are required for each component and which types of access are required for each service running on this cloud. Many times, after truly understanding the project scope, the risk becomes controllable.

2. Sharing is Not Caring: Many times, using cloud services involves sharing infrastructure and applications with others, which means that the risk factor is multiplied. The lack of security configuration at one customer, of application vulnerabilities by other customers, can lead to data loss in your databases. Make sure which components you share, and which are dedicated to you. Many times when it comes to your customers' or employees' sensitive information, you cannot avoid purchasing a private cloud for most components.

3. Command and Control: Demand your cloud providers give you true control and monitoring of any and all security components. Sometimes, even insist that only you will be able to change the configuration of these components. If it's just a network firewall, if it's a web application firewall, if it's a database firewall or any other element, those elements ensure your level of risk and your business survival on the cloud. Make sure you are aware of any changes in any security element.

4. The Cat in the Hat: The "Cloud" is a beautiful buzzword; every vendor in the entire IT segment is using the word "Cloud" in presentations and sales speeches. But eventually we have to understand, "Cloud" is really only a hosting service; it might be more advanced; it might support "elastic" growth; it might even provide an extremely easy user interface.
Please make sure you understand that eventually the "Cloud" is "smart" shared hosting, which means that many people may have physical access to the servers that host your data and operating systems. You can almost never be sure that if your servers have restarted, it's not because someone copied the hard drive you are using. Encrypt what you can, and make sure that the most sensitive information is not on the "Cloud."

5. Software As A Service (SaaS) can work: Salesforce taught us all that SaaS can actually work, with extremely high business continuity and extremely high levels of security. Many Fortune 1000 companies use Salesforce with some of their most sensitive information. The thing is that Salesforce has invested $100s of millions on infrastructure and security, which more than 90 per cent of other SaaS providers will ever be able to afford. So if you decide to go forward and adopt a SaaS provider, keep in mind that size does matter; the bigger the provider (and we're not talking about boutique providers who cost a fortune), the more secured they are.

David Maman is CTO & Founder of GreenSQL, the database security company (www.greensql.com)




Print Email Post Comment 
(Total Views: 1435)
 
Share
 
 
Infotech News
   
Google Chromecast Now Available In India!
Samsung Galaxy Tab 3 10.1 Tablet Now Listed Online @Rs 36,340
LG Launches Android KitKat Running Lucid 3
8 Of The Best Free Proxy Websites For Anonymous Surfing
10 Useful Places Hosting Informative Podcasts On Linux
 
 
 
     
     
     
Press Release
     
Phoseon Technology Participates In UV ...
Vision Tablet By E-Ceros Sheds New ...
Mecmesin Announces ‘Helixa’ Precision ...
Unicon Enlisted By The Fashion ...
New 3.5-Inch LCD Module For Handheld ...
New ETA Cabling Connection ...
IGBT-Based Power Module Market To Grow ...
Agent 18 Introduces Fresh Line Of ...
Cyber Security Market Worth $155.74 ...
High Throughput Screening (HTS) Market ...
Altec Team Up With Sage On The “Inspire ...
Slovenian Teacher Reports MetaMoJi’s ...
Cell Analysis Market (Flow Cytometer, ...
Paragon Software Launches “Pure ...
CollabRx And Affymetrix Partner To ...
Larson Electronics Releases A 10 Watt ...
New Report Highlights Slates, Tablets ...
Text Analytics Market Worth $4.90 ...
New Kickstarter Launched For World’s ...
Elliptic Technologies Announces The ...
InterDev Awarded Managed IT Services ...
Telematics Update Asks Telematics ...
Western Europe MVNO Market Business ...
LCD TV Growth Improving, As Plasma And ...
Wireless Bridge Collection From The ...
 
Connecticut Expands Simplifile ...
Cheap 5 M Active USB 3.0 Repeater ...
Amara Taps Capsule Tech As Exclusive ...
pMD Charge Capture Releases Integrated ...
Continuum Advisors Partners With ...
iPatientCare Updates iPad EHR App, ...
Wearable Technology 2014-2024: ...
Innovative iPhone Data Recovery ...
CoCENTRIX Receives Surescripts 2013 ...
Newly Published China Lead-Acid Battery ...
eDepoze Proudly Announces McCorkle ...
Location Based Services (LBS) Market ...
Altec Gathers With Partners And Vendors ...
Temporary Construction LED String ...
Global Market For Wearable Computing ...
New Release Of MapleSim Toolbox Expands ...
Circuit Breaker & Fuse Market By Type ...
The New H2O/Purity/Decomposition ...
Wireless Gigabit (WiGig) Market Worth ...
Fujitsu And AnythingIT Surpass ...
L-com Offers Keystone Panel Mount ...
Discounted Samsung Galaxy Tab 3 Lite ...
A-Crystal Electronic Technology ...
Research Report On Physical Vapor ...
F&I Express Adds Portfolio To Its ...
     
     
     
     
     
Most popular
 
Features
8 Of The Best Free Proxy Websites For Anonymous Surfing
The following websites are trusted and malware-free as well!...
10 Useful Places Hosting Informative Podcasts On Linux
Tutorials, books, videos and now podcasts, here's yet another way to learn Linux....
12 Cloud Management Tools And Hypervisors
Open Source and Cloud Computing together can be the most lethal combination. It's a mixture of functionality with easy availability!...
Getting The Most Out Of Linux Mint With These Cool Tips And Tricks
Linux Mint has the same look and feel as XP, switching over will in all probability be a breeze for long time XP users....
15 Intrusion Detection Tools For Penetration Testers And Hackers
Network monitoring and intrusion detection are two top priority tasks for ensuring a secure network....
Here Are 10 Cool Android Tools For Hacking!
Go on and hack that Android device, have some fun with these amazing hacking tools that will get the job done. ...
Looking To Bring Out The Best Of OpenGL? Read These 10 Good Books!
Get acquainted with these books to know all that there is in the world of 2D and 3D vector graphics, courtesy OpenGL. ...
13 Linux Emulators That Take You Back In Time!
Bring back the Commodore 64 platform to your desktop, or Atari, even Sinclair. These 13 emulators offer a trip down memory lane....
Smartphone Review: Micromax Canvas Knight A350
We review the much-ambitious Micromax Canvas Knight and find out if it’s really worth all the hype…...
Are You A Developer? Here Are 10 Must-Read 'Free' Books On Software Architecture
Download right away, and get to know every aspect of software architecture......
8 Videos And Play Lists For Your Daily Dose Of Ethical Hacking And Cryptography
These videos will take you on a step-by-step journey into the world of ethical hacking. ...
Are You Into Android Development? Here Are 10 Good Books For You!
Try out these books, know everything there is to know about the fantastic world of Android app development....
Top 7 Source Code Editors That You Can Use
Comfort in the source code editor is very important for a programmer to be productive....
Here Are 10 Awesome Tools (Open Source) For Your Big Data Needs
With just the right tools at hand, you can make even better use of Big Data....
Have You Tried Ubuntu 14.04 LTS Yet? Here's What's New!
Well, Trusty is now here, yes, finally! Have you installed it yet? Well go on and use it, after all its the experience that counts, and it's a pretty ...
 
  View All
Dialogue
 
HTC Is Strong And There Are No Plans Of Sale Now Or In Future, Says HTC's Senior Director-Marketing
Atithya Amaresh from EFYTimes had an exclusive chat with Sirpa H. Ikola, senior director, Marketing, South Asia, HTC about its devices and its plans w...
“Cloud And Hybrid Hosting Are The Way To Go!”
Diksha P Gupta from Open Source For You spoke to Anil Chandaliya, chief network administrator, ESDS, about how customers can play safe while dealing w...
"Linux Interoperability Has Been Enabled Through Work Across Microsoft"
Diksha P Gupta from the OSFY team spoke to Dr K Y Srinivasan, principal architect at Microsoft, about how the company is moving ahead on the open trac...
"For Modern Day Tablets And Smartphones, Android Has Become A Default"
Diksha P Gupta from EFYTimes.com spoke to Indrajit Sabharwal, managing director, Simmtronics Semiconductors Ltd, about the compan...
"Torvalds' Blunt, Harsh Criticism Helps Open Source Grow"
Steve Ballmer called Linux 'cancer, which attached itself... to everything it touches,' in 2001 and oh-so-rightly. ...
   
  View All
Videos
 
First Look: LG Optimus G
The phone sports a high-end display and comes powered by a powerful processor. ...
Create QR-Codes For Free
TEC-IT releases the freeware QR-Code Studio to provide a quick and convenient way of QR code creation for every application scenario....
DoT Secretary Shares Plans For Growth Of Telecom Sector
M.F. Farooqui has recently taken charge as secretary, Department of Telecom....
Hands-On: Sony Xperia Z
Xperia Z is Sony's first entrant model in the big-screen smartphone category. ...
Hands On: Videocon A30 Smartphone
Videocon, the consumer electronics company which is known for its refrigerators, washing machine and air-conditioner has unveiled its Android-based sm...
   
View All
   
 
MWC 2014
 
MWC 2014: Tablet Lets People Feel Textures On Its Screen
Now feel what you see on your tablet, by way of ultrasonic waves....
MWC 2014: 4K Android Tablet Games To Kill Consoles, iPad
Tablet makers like Samsung want to beat the iPad by making 4K tabs. ...
MWC 2014: This Vodafone Backpack Helps Get Network In Disaster Situations
Two engineers of Vodafone New Zealand displayed the "mini" mobile network by Vodafone substructure in a backpack. ...
MWC 2014: Wilocity Chipset To Bring 'Lightening' Speed To Mobile Phones
Wilocity has developed a WiGig chipset for mobile phones that will bring lightning-fast wireless capability ...
MWC 2014: Samsung Introduces Octacore, Hexacore Chipsets
The Korean giant, Samsung unveiled two new octacore and hexacore chipsets at MWC 2014, in Barcelona. The company previously used Exynos 5 Octa 5410 ch...
MWC 2014: Alcatel Unveils PIXI 7 Tablet With Android 4.4
Alcatel arrived at the MWC 2014 with yet another low cost Android tablet, priced at $110 ...
MWC 2014: LG F70 Unveiled With Android 4.4
LG announced the new LTE-enabled Android smartphone, LG F70, at MWC 2014 in Barcelona. ...
   
View All
   
 
Events
 
19th Consumer Electronic Imaging Fair To Be Held On ...

View All
   
   
 
 

home archives contact us advertise with us
           
Magazines Portals Directories Events News Verticals Educational Institute  
Electronics for You
Open Source for You
Facts for You
Electronics Bazaar
electronicsforu.com
efytimes.com
bpotimes.com
linuxforu.com
Electronics Annual Guide
EFY EXPO
EFY Awards
EduTech Expo
OSIDAYS Expo
Electronics
Infotech
Linux & Open Source
Consumer Electronics
Science & Technology
BPO
EFY Techcenter 
 
 
© Copyright 2014 EFY Enterprises Pvt. Ltd.
All rights reserved. Reproduction in whole or in part in any form or medium without written permission is prohibited.
Usage of the content from the web site is subject to Terms and Conditions