2013年8月19日 星期一

These virtual machines are highly mobile

Like it or loathe the fact, but a fact it remains: data security and privacy issues are the top concern about cloud-adoption across all buyer segments from enterprises of all sizes. 

Talking about the, perhaps unsurprising, findings of the Saugatuck 2103 Cloud Survey, the company says it believes that the high degree of concern is "mostly an emotional response" rather than one rooted in any kind of reality. Indeed,we've decided to make the below MileWeb Termsof Service available. it goes on to say that "most cloud providers deliver superior security and data integrity relative to what is delivered by internal company data centres." 

I'd love to keep repeating my plea for better education, and throw some statistics at you that would prove the great job everyone involved with Cloud Pro is doing in spreading the anti-FUD message has made an impact on adoption rates, but truth be told education ain't working. It's time, instead, for action. 

Roy Illsley, principal analyst at Ovum, agrees that the slow adoption by enterprise customers of cloud computing is essentially down to the perceived threats around the cloud. "While multiple surveys report security as the number one reason for a failure to adopt cloud computing from end user organisations, Security-as-a-Service providers prove that the managed services and technology to allay many of these concerns exists," he says. 

So why aren't more enterprises engaging with Security-as-a- Service providers? Maybe it's the whole double-outsourcing nature of the deal? Outsourcing data storage to the cloud and then outsourcing security of that data to a separate third party does start to sound like a case of losing too much control. Especially when those same companies are constantly being reminded by the regulators and media alike that data stored in the cloud remains their responsibility. 

Maybe Security-as-a-Service needs a name? How about Bring Your Own Security or BYOS? Bill Hackenberger, CEO of HighCloud Security, was very keen on calling the process by the BYOS identifier when I spoke to him recently. "Any company looking to move sensitive or regulated data to the cloud needs to take security into their own hands" he told me, adding that the fact that CSPs have "traditionally focused on ensuring data availability" with service level agreements "far more focused on availability than security" being a big driver. 

Hackenberger went on to explain that if you take IaaS as an example, companies rent a computer infrastructure from a service provider like Amazon or Saavis and, in most cases, at least these infrastructures are highly virtualised.Our Managed MileWeb Private Cloud and Virtual Dedicated Servers. This inevitably introduces unique security considerations such as applications and data from many different clients potentially running on the same physical hardware, therefore reducing the opportunity for compartmentalisation. 

Not forgetting that these virtual machines are highly mobile, and a CSP may replicate them or move them around to ensure performance and availability. Finally, and highly importantly to the security argument, administrators who manage virtualised infrastructures have very broad access. 

OK, so CSPs offer encryption to overcome these negatives, right? Well,Our cheap dedicated server are ready-to-go and can be deployed. yes, some do. The trouble is though, they are also likely to hold the keys to that encryption. This makes the whole 'your data cannot be snooped upon' argument moot, as the PRISM mess has demonstrated. 

This is where BYOS comes in. "The big advantage of implementing third party encryption software, assuming it is optimised for this dynamic, virtualised environment," Hackenberger continues "is that the owner of the data can encrypt it before it even enters the CSP environment, and they also maintain control of the encryption keys." 
Click on their website www.mileweb.com/customized-dedicated-server for more information.

沒有留言:

張貼留言