• News
  • SAN DIEGO
  • Technology

Cloud service providers provide comprehensive security

Related Special Reports

The cloud is the becoming the preferred infrastructure for small and medium-sized businesses to utilize applications and conduct business. Therefore, it makes sense that cloud managed security becomes a key component to safeguarding these businesses from malware attacks, protecting sensitive company data and demonstrating compliance where needed.

The cloud is the best platform to deliver management for a comprehensive security to protect networks, remote users, mobile users, laptops, and desktops under any security threat

Cloud service providers tend to protect their security procedures and guard them as high level trade secrets.

Here are the most common areas of concern when it comes to security and how reputable cloud service companies handle the issues:

Virus protection

All cloud solution providers deploy and array of components and solutions to combat Cyber crimes against their clients, including firewall, VPN, antivirus, anti-spam, IPS, URL filtering, and logging/reporting.

Denial of service

Denial-of-service attacks are likely to continue. Cloud providers must demonstrate that their data centers have four to five different major international communication carriers with redundancies and failover protocols in place so if one carrier suffers an attack it is immediately shut down and failover to a different carrier hence the business will not suffer any down time.

Prevent physical threat

Internal threats of actual security breaches are much higher than outside threats.

In a cloud-based service, businesses do not have to worry about this on the server side — that's the vendor's job. The vendor would implement security protocols and alerts to prevent unauthorized access to their data centers, prevent any data downloads or transfers without the proper credentials.

Secure identity

Look to the vendor to create the level of securing authentication and authorization for all appliances and all programs. Setting the norms and requirements for password strength, password expiration, session expiration, disconnection and termination protocols, prevent automatic log in and more such restrictions. In addition the vendor will handle IP range blacklists/whitelists.

Certification for privacy

Depending on the industry and location of your business, there are many cloud applications which will need to comply with certifications such as PCI, HIPAA, SAAE16 and more. The certification verifies certain procedures have been implemented by the vendor to prevent breach of privacy.

Information loss protection (ILP)

Ideally all stored data on the cloud should be encrypted and the cloud providers handle that end with the backup and storage solutions they deploy. It is critical protection for sensitive business information and to secure personal clients information.

ILP, also known as leakage prevention, is a critical issue for any business -- especially those businesses which store consumer identities. More than 80 million consumer identities are stolen or compromised every year the U.S. Your cloud managed service provider has to demonstrate the security for this issue on two levels – on the virtual server's gateways as well as secure the data delivered by any appliance used by the end users, be it PC or mobile device which process data for your applications in the cloud. The provider has to make certain there is file encryption and auto-erase procedures built in.

"This was a critical element that saved me potential loss of clients' information and could have resulted in tremendous liability," said ST, a partner at a Los Angeles law firm when he lost his iPad and iPhone on a trip. His IT company immediately erased all sensitive data stored on the iPhone and the heavy password protocols prevented any use of the products.

*****

Submitted by Orie Rechtman, CEO of 4Service Cloud Technology, Southern California's leading managed cloud technology services, legal cloud experts, outsourced IT, disaster recovery and backup, and restoration solutions provider. For more information call 818-465-1295 or email sales@4service.com.

Leave Your Comment

Comments are moderated by SDDT, in accordance with the SDDT Comment Policy, and may not appear on this commentary until they have been reviewed and deemed appropriate for posting. Also, due to the volume of comments we receive, not all comments will be posted.

SDDT Comment Policy: SDDT encourages you to add a comment to this discussion. You may not post any unlawful, threatening, defamatory, obscene, pornographic or other material that would violate the law. All comments should be relevant to the topic and remain respectful of other authors and commenters. You are solely responsible for your own comments, the consequences of posting those comments, and the consequences of any reliance by you on the comments of others. By submitting your comment, you hereby give SDDT the right, but not the obligation, to post, air, edit, exhibit, telecast, cablecast, webcast, re-use, publish, reproduce, use, license, print, distribute or otherwise use your comment(s) and accompanying personal identifying and other information you provide via all forms of media now known or hereafter devised, worldwide, in perpetuity. SDDT Privacy Statement.

User Response
0 UserComments

Leave Your Comment

Comments are moderated by SDDT, in accordance with the SDDT Comment Policy, and may not appear on this commentary until they have been reviewed and deemed appropriate for posting. Also, due to the volume of comments we receive, not all comments will be posted.

SDDT Comment Policy: SDDT encourages you to add a comment to this discussion. You may not post any unlawful, threatening, defamatory, obscene, pornographic or other material that would violate the law. All comments should be relevant to the topic and remain respectful of other authors and commenters. You are solely responsible for your own comments, the consequences of posting those comments, and the consequences of any reliance by you on the comments of others. By submitting your comment, you hereby give SDDT the right, but not the obligation, to post, air, edit, exhibit, telecast, cablecast, webcast, re-use, publish, reproduce, use, license, print, distribute or otherwise use your comment(s) and accompanying personal identifying and other information you provide via all forms of media now known or hereafter devised, worldwide, in perpetuity. SDDT Privacy Statement.

Subscribe Today!