EFY Times  
Sunday, October 26, 2014

 
GO
 
 

Five Steps For A Secure Cloud Transition
 
Home >> Infotech >> Features
 
Five Steps For A Secure Cloud Transition  
 
Before you move to the cloud, you need to make sure your data is safe.   
Rate this news:  (0 Votes)
Monday, July 30, 2012 Almost every type of SMB is examining its current IT infrastructure, determining what data and processes can move to the cloud. Of course, security remains one of the biggest concerns. Here are five steps to make the transition much safer for your data and your company:

cloud, greensql, cloud service, SaaS




1. Understanding my "Attackability Surface": Before considering migrating to the cloud, map every project component, and map all the hazards. Including which operating systems will be used, which applications will be installed, which types of security mechanisms are required for each component and which types of access are required for each service running on this cloud. Many times, after truly understanding the project scope, the risk becomes controllable.

2. Sharing is Not Caring: Many times, using cloud services involves sharing infrastructure and applications with others, which means that the risk factor is multiplied. The lack of security configuration at one customer, of application vulnerabilities by other customers, can lead to data loss in your databases. Make sure which components you share, and which are dedicated to you. Many times when it comes to your customers' or employees' sensitive information, you cannot avoid purchasing a private cloud for most components.

3. Command and Control: Demand your cloud providers give you true control and monitoring of any and all security components. Sometimes, even insist that only you will be able to change the configuration of these components. If it's just a network firewall, if it's a web application firewall, if it's a database firewall or any other element, those elements ensure your level of risk and your business survival on the cloud. Make sure you are aware of any changes in any security element.

4. The Cat in the Hat: The "Cloud" is a beautiful buzzword; every vendor in the entire IT segment is using the word "Cloud" in presentations and sales speeches. But eventually we have to understand, "Cloud" is really only a hosting service; it might be more advanced; it might support "elastic" growth; it might even provide an extremely easy user interface.
Please make sure you understand that eventually the "Cloud" is "smart" shared hosting, which means that many people may have physical access to the servers that host your data and operating systems. You can almost never be sure that if your servers have restarted, it's not because someone copied the hard drive you are using. Encrypt what you can, and make sure that the most sensitive information is not on the "Cloud."

5. Software As A Service (SaaS) can work: Salesforce taught us all that SaaS can actually work, with extremely high business continuity and extremely high levels of security. Many Fortune 1000 companies use Salesforce with some of their most sensitive information. The thing is that Salesforce has invested $100s of millions on infrastructure and security, which more than 90 per cent of other SaaS providers will ever be able to afford. So if you decide to go forward and adopt a SaaS provider, keep in mind that size does matter; the bigger the provider (and we're not talking about boutique providers who cost a fortune), the more secured they are.

David Maman is CTO & Founder of GreenSQL, the database security company (www.greensql.com)




Print Email Post Comment 
(Total Views: 1547)
 
Share

 
 
Infotech News
   
Majority Of DDoS Traffic In 2014 Originated From India: Symantec Research
SBI Launches ‘mPassBook’ Facility In ‘State Bank Anywhere’ Smart Phone Application
Tata Consultancy Services Honored For Outstanding Contribution To The Germany-India Economic Eelationship
Strate, South Africa Selects TCS BaNCS For Multi-Asset Class Depository Operations, Expands Its Relationship With TCS
OptaSense Provides Revenue Assurance To LNG Pipeline By Reducing The Impact Of Third Party Intrusion
 
 
 
     
     
     
     
     
     
Most popular
 

Daily

New White Paper From Boyd Corporation Discusses Noise And Vibration Analysis And Control
ASSET InterTech And Mentor Graphics IJTAG Interoperability Empowers Two-Way Validation Flow Between Chips And Boards
Pixability Announces Industry’s First Programmatic YouTube TrueView Optimization Platform
AEG Power Solutions: Strengthens Team With New Sales VPs
Altium And Aras Partner For Next Generation ECAD/MCAD Collaboration In PLM Environments
SBI Launches ‘mPassBook’ Facility In ‘State Bank Anywhere’ Smart Phone Application
HyperSound Virtual Reality Audio For Retail To Be Showcased At Shopper Marketing Expo 2014
Renesas Electronics Europe Announces Wireless M-Bus Solution That Adds Communications To Metering Applications
DSP Group Introduces ULE For IoT Applications Over Intel(R) Puma(TM) 6-Powered Home Gateways
Global Wearable Electronics And Technology Market Outlook 2020: Adidas, Apple, Sony, Fitbit, Jawbone & Nike Dominate The Market
 
   

Weekly

Drupal Fixes SQL Injection Flaw In Version 7.32
Android 5.0 Lollipop: 10 Most Exciting Features
Top 10 Flaws Of Hadoop That Are Seriously Annoying!
MongoDB Recognized As The Only “Challenger” In The Gartner 2014 Magic Quadrant For Operational Database Management Systems
Intex Aqua Style X And WIIO Wi5 Exclusively Available On ebay.in
Top 8 Books On Hadoop Technology
Top 10 Big Data Technologies Of Present Times
AIC SB122-TO Offers 8Bay NVMe PCIe SSD Server Solution In 1U
OFS CEO Rich Napoli Wins NJTC CEO Of The Year Award
10 Scariest Hacking Incidents In The World!
3D Printing Technology Leads To Innovation Of Prosthetic Hand For Kids
Xiaomi Redmi Note Price Confirmed In India
Apple Issues Fresh Security Warning For iCloud Users
10 Technologies Transforming Developers' World!
Truecaller v4.2 Version To Be Exclusively Available On Windows 8.1 Phones
Asia's Largest Convention On Open Source Is Back
 
   

Overall

Agility Systems Deals in:

Document Management System for law firms
Features
Top 8 Books On Hadoop Technology
Let's discuss 8 best books to learn Hadoop and how to get started with it....
20 Tools And Resources For Building And Testing Regular Expressions
Here we'll provide a list of 20 best tools and resources which will help you in writing regular expressions in a more streamlined way....
10 Scariest Hacking Incidents In The World!
A detailed report about the scariest side of hacking was recently released by WebHostingBuzz which gives us a list 10 scariest hacks and also possibi...
8 Best SVG Tools For Web Developers
There are some useful SVG tools which will of great help for any aspiring SVG developer. Take a look at the 8 best ones....
Top 8 Resources To Get Started With Go Programming Language
Go is a very well-structured language which has a syntax like the C language and it's very easy to learn....
Top 10 Big Data Technologies Of Present Times
Over last few years Big Data technologies are getting due attention and there are several trends and innovations in this space in recent times....
Top 10 Unexplored Areas In Java Programming Language
Here we will give you a list of 10 most unexplored areas of Java....
10 Best Practices An Independent Developer Should Follow!
Being an independent developer means you have to think beyond coding, about all partnerships and business prospective too....
10 Necessities For Modern Cloud Storage System
Here we will present a list of 10 requirements in the new generation cloud storage system of the 21st century....
10 Technologies Transforming Developers' World!
Here we'll discuss top ten technologies which are changing the nature of programming....
Ubuntu Turns 10! Here's All You Should Know!
On the occasion of 10th anniversary of Ubuntu, let's take a look at brief history of this renowned desktop distribution....
Android 5.0 Lollipop: 10 Most Exciting Features
Since the preview, Google has added lots of new features to the final release of the latest Android version. Here we will discuss top 10 features of m...
GPS Technology: Know The Basic Facts
Let's take a look how this GPS technology is operated in our daily uses....
10 Best Open Source Web Application Security Scanning Tools
Here we'll provide you with a list of 10 open source tools which are used to detect security vulnerabilities in web applications....
5 Ways In Which NFC Can Transform Your World!
Let’s have a look at 10 ways how NFC can actually rock your world in the near future....
 
  View All
Dialogue
 
10 Questions That Google Never Asks While Hiring!
Here is a list of 10 questions that Google just banned from their interviews....
For Enjay, Open Source Technology Is A Way Of Life
An entirely open source-based company, Enjay IT Solutions, has built itself a reputation in the OSS domain....
Switching To Tizen Doesn’t Mean We Are Abandoning Android: Samsung
The company has worked to build Tizen up from scratch and has now introduced it to developers and the general public with its latest range of wearable...
Venturing Into The Cloud? Develop A Customised Cloud Strategy First!
Diksha P Gupta speaks to Rushikesh Jadhav, cloud evangelist, ESDS Software Solution Pvt Ltd, on how the cloud has changed the way compan...
HTC Is Strong And There Are No Plans Of Sale Now Or In Future, Says HTC's Senior Director-Marketing
Atithya Amaresh from EFYTimes had an exclusive chat with Sirpa H. Ikola, senior director, Marketing, South Asia, HTC about its devices and its plans w...
   
  View All
Videos
 
First Look: LG Optimus G
The phone sports a high-end display and comes powered by a powerful processor. ...
Create QR-Codes For Free
TEC-IT releases the freeware QR-Code Studio to provide a quick and convenient way of QR code creation for every application scenario....
DoT Secretary Shares Plans For Growth Of Telecom Sector
M.F. Farooqui has recently taken charge as secretary, Department of Telecom....
Hands-On: Sony Xperia Z
Xperia Z is Sony's first entrant model in the big-screen smartphone category. ...
Hands On: Videocon A30 Smartphone
Videocon, the consumer electronics company which is known for its refrigerators, washing machine and air-conditioner has unveiled its Android-based sm...
   
View All
   
 
IFA 2014
 
IFA 2014: LG Launches 34-Inches Curved Monitor
The company is yet to confirm price and availability of the device....
IFA 2014: Intel Launches First Core M Range Of Processors
This range of processors is tailor-made for 2-in-1 devices which include a tablet and a laptop....
MWC 2014: Tablet Lets People Feel Textures On Its Screen
Now feel what you see on your tablet, by way of ultrasonic waves....
MWC 2014: 4K Android Tablet Games To Kill Consoles, iPad
Tablet makers like Samsung want to beat the iPad by making 4K tabs. ...
MWC 2014: This Vodafone Backpack Helps Get Network In Disaster Situations
Two engineers of Vodafone New Zealand displayed the "mini" mobile network by Vodafone substructure in a backpack. ...
MWC 2014: Wilocity Chipset To Bring 'Lightening' Speed To Mobile Phones
Wilocity has developed a WiGig chipset for mobile phones that will bring lightning-fast wireless capability ...
MWC 2014: Samsung Introduces Octacore, Hexacore Chipsets
The Korean giant, Samsung unveiled two new octacore and hexacore chipsets at MWC 2014, in Barcelona. The company previously used Exynos 5 Octa 5410 ch...
   
View All
   
 
Events
 
19th Consumer Electronic Imaging Fair To Be Held On ...

View All
   
   
 
 

home archives contact us advertise with us
           
Magazines Portals Directories Events News Verticals Educational Institute  
Electronics for You
Open Source for You
Electronics Bazaar
electronicsforu.com
efytimes.com
opensourceforu.com
electronicsb2b.com
Electronics Annual Guide
EFY EXPO INDIA
EFY EXPO WEST
ELECTRONICS ROCKS
EFY Awards
OSIDAYS Expo
Electronics
Infotech
Linux & Open Source
Consumer Electronics
Science & Technology
BPO
EFY Techcenter

Educational Kits
Kitsnspares.com  
 
 
© Copyright 2014 EFY Enterprises Pvt. Ltd.
All rights reserved. Reproduction in whole or in part in any form or medium without written permission is prohibited.
Usage of the content from the web site is subject to Terms and Conditions