Access and Feeds

Public Cloud: Exploding the Myth of Weak Security

By Dick Weisinger

Historically, a major impediment businesses have had to overcome before deciding to adopt and migrate to the public cloud has been security. Outside the corporate firewall it seems only natural that the public cloud which is more visible and accessible would also be more vulnerable to hacking and data breaches.

The public cloud has evolved to counter the perception of being a security risk. A study by security assessment vendor Coalfire recently found that the infrastructure provided by major cloud providers is less than half as likely to experience a data breach.

It may seem less intuitive that public clouds would provide better security than on-premise infrastructure, but some of the reasons for why this appears to be true are as follows:

Hardened by continual hacking. Public clouds are under constant attack and have years of experience in fending off attacks.

Trained security personnel. The best security people are typically attracted to or recruited by the large cloud providers.

Economies of scale. Large providers have so many customers that they are able to cost effectively apply best security practices to their customers.

State of the art security tools. Major cloud providers are up to speed on security and invest in the best security tools.

David Linthicum, Chief Cloud Strategist at Deloitte, wrote that “cloud providers have better security mechanisms in place and are more paranoid — and attentive — to security risks throughout their entire stack. The cloud providers are much better at systemic security services, such as looking out for attacks using pattern matching technology and even AI systems. This combination means they have very secure systems.”

Digg This
Reddit This
Stumble Now!
Buzz This
Vote on DZone
Share on Facebook
Bookmark this on Delicious
Kick It on
Shout it
Share on LinkedIn
Bookmark this on Technorati
Post on Twitter
Google Buzz (aka. Google Reader)

Leave a Reply

Your email address will not be published. Required fields are marked *