Cloud Computing = More Secure?

Cloud computing offers such profound and clearly identifiable advantages over traditional computing that the topic of security often times ends up being little more than a footnote in many of the articles that discuss the benefits of the cloud.In the Cloud with your PC

Clearly, the advantages pertaining to quick deployment, virtual desktops, mobility, optimized resources, reduced costs, unlimited storage, backup and recovery, yada, yada, yada, represent a disruptive technological paradigm. Nevertheless, security is so incredibly important that the topic deserves to be a prominent part of every discussion concerning the pros and cons of the cloud.

Is Cloud Security a Deal Maker or Breaker?
Arguably, security is as important as all of the other advantages put together because it becomes a deal breaker for any organization that does not have the perceived notion that the cloud is secure. Interestingly, security is actually the selling point that actually clinches the decision to proceed for many organizations, why, it is a stumbling block that prevents others from moving forward. It should be duly noted that there is a significant difference between public and private clouds.

The security of private clouds has really never been in question since outside access can be greatly limited or even completely blocked. It is the security of public clouds that have been under the microscope since the emergence of cloud computing.


Overcoming Public Perception

Although there has been a strong misconception among some people that assume that a public cloud must be inherently insecure, others would argue that just the opposite has been the case. Since the integrity of the cloud largely rests upon security, service providers obviously have security as one of their highest priorities, if not the highest.

The number one core competency of a successful public cloud service provider absolutely has to be security. Their reputation and future success depend upon it. Undoubtedly, many cloud computing services are significantly more secure than many of the traditional internal infrastructures.

The Same Protocols and the Same Vulnerabilities

Many people would be surprised to find out that the majority of any security holes and associated vulnerabilities that are currently being addressed with cloud infrastructure are the same ones that previously existed.

They represent that same technology and related protocols that are used in existing traditional network infrastructure! In other words, many of the same security issues exist whether the cloud is employed or not. In a recent article on Forbes.com Emma Byrne points out that “It’s possible to measure and mitigate these risks, and actually improve upon the levels of data security achieved by traditional, in-house data centers.”

Improving Cloud Security over Traditional In-house Data Centers

Clearly, a properly designed cloud infrastructure can greatly eliminate data privacy concerns. As Byrne says, “…with some forward planning, you can ensure that your Cloud Service Provider is offering you the best possible data stewardship.”

The bottom-line when it comes to reliable security from the cloud is that a company needs to first do their due diligence to make sure they are using the services of a reputable and time tested service provider. But the due diligence does not stop there. The IT department needs to be proactive in working closely with the provider in making sure that all of the potential risks pertaining to the software they use has been measured and mitigated. .

How do you manage cloud security in your business? Share your best practices in the comments.

About the Author:
Jared Jacobs has professional and personal interests in everything technology. As an employee of Dell, he has to stay up to date on the latest trends and breakthroughs in large enterprise solutions and consumer electronics buying trends. In his spare time he is tinkering with sound systems and other awesome gadgets he can get his hands on. He’s also a big Rockets and Texans fan.

dont copy

Speak Your Mind

*