10 Categories Of Security Services Offered Over The Cloud
22 Apr. 2013 Cloud Development
Security is often a major concern for companies who have adopted cloud services. However, an association of cloud vendors and users believe that it provides security services for your information on the cloud. They have defined 10 categories for the security services provided that are offered for information over the cloud. Understanding these categories will help cloud users and vendors to easily adopt cloud services and limiting the cost behind security services. Discussed below are the 10 categories of security services provided for information over the cloud:
1. Identity and access
You are provided with control for secured management of identities and access. It includes people, processes and systems used for managing access to your enterprise resources. It is managed by making sure that the identity of the user is verified and the access rights are provided at the correct level.
2. Data loss prevention
This service offers protection of data by providing you with pre-installed data loss prevention software, along with a set of rules deployed.
3. Web security
Web security is provided as an additional protection against malware from entering the enterprise through web browsing and other such activities. This cloud service is provided either by installing a software or an appliance or through the cloud by redirecting your web traffic over to the cloud provider.
4. E-mail security
It provides control over the in-bound and out-bound e-mails to protect your organization from malicious attachments and phishing. This cloud service helps enforce corporate policies such as acceptable use, spam and in providing business continuity options. One of the solution adopted by many cloud e-mail security services is digital signatures, which allows identification and non-repudiation.
5. Security assessment
There are various tools implemented for the users of the SaaS delivery model, such as variant elasticity, low administration overhead, negligible setup time and pay-per use with low investment in the initial stage.
6. Intrusion management
It is the process that uses pattern recognition for detection and reaction to events that are statistically unusual and unexpected.
It may also require reconfiguration of your system components in real time so as to prevent an intrusion.
7. Security information and managing events
Your system gathers information related to log and events. This information is used in correlating and analyzing, to provide you with real time reporting and alerts on events that require intervention.
There are typical algorithms that are computationally difficult or nearly impossible to break.
9. Disaster management
This cloud service helps in continuing your business and managing disasters by providing flexibility and reliable failover for services that are required in case of service interruptions.
10. Network security
The network security services provides you with address security controls, which in a cloud environment is generally provided through virtual devices.