Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor

Clavister advice on cloud computing security

Clavister : 01 May, 2009  (Technical Article)
Clavister explains why security in cloud computing environments need not be so difficult with the right approach
Cloud computing has the potential to be one of the biggest trends in IT due to the convenience of a single provider delivering a variety of IT enabled resources as a service over the Internet. However, many businesses have unnecessary concerns surrounding security and privacy in the cloud according to network security experts Clavister.

Andreas Asander, VP product management at Clavister explains: 'Cloud computing is simple; at the front end are the client computers and the application required to access the Cloud Computing system. At the back end are the various computers, servers and data storage systems that create the 'cloud' of computing services.

'Because these resources are provided 'as a service', the idea is that users need not have any knowledge or expertise in the systems that support them, or indeed any control over those systems. They just need to have confidence in the ability to send data to the cloud and to receive data back.'

Industry experts have claimed that in five years, cloud technology will have a footprint in every business that has IT, changing the entire computer industry. Asander continues: 'However, many businesses have grave concerns over the privacy and security of their data and the idea of handing over important company information to another organization worries them. They are hesitant to take advantage of Cloud Computing because they believe they can no longer keep their data under lock and key.'

Of course there are specific security issues businesses must consider when adopting cloud computing, including maintaining control over security policy of applications and services, that customer service level agreements can be met and that compliance with data security rules and regulations are maintained.

Clavister recommends that businesses take the following steps to ensure adequate protection in the cloud:

* It is essential to replicate their normal security policies inside the cloud and ensure that they can maintain control of them via visibility of logs and compliance reporting and such like
* Check business continuity and disaster recovery arrangements
* Check that the virtualization platform used by the Cloud Computing provider enables you to import and export data freely
* It is important to get advise from an independent security specialist so that nothing is left to chance

For more information on the subject of securing the cloud, please visit to download a copy of a whitepaper and to listen to a podcast with advice from Clavister's VP product management, Andreas Asander.
Bookmark and Share
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo