Cloud Security

Cloud Security

Cloud computing offers a way to use the storage software and data resources on demand through an online network - known as cloud services. Service providers manage the infrastructure and platforms operating these resources, which are stored remotely accessible multiple users from their desktop. This can help achieve economies of scale and reduce the cost of investing in a company specific IT infrastructure. Cloud computing also allows access to programs, data, and applications that you need and are demanded from anywhere - getting to have more flexibility in how you work.

Benefits of Cloud Security

Full visibility of senior management to assess the effectiveness of its management system in relation to the expectations of the international industry standard and cloud security 
An adapted audit reflect how organizational objectives are aimed at optimizing Cloud services 
An organization to demonstrate the levels of achievement and performance through recognition independently validated by an external certification body 
Organizations can compare your results with your competition 
The STAR give potential clients a better understanding of certified level controls functioning organization and highlight the areas in which an organization may wish to focus.

Characteristics

Cloud computing has the following key features: 

  • Agility: Ability to provide technological resources improves the user by the supplier. 
  • Cost: providers cloud computing argue that the costs are reduced. A model of public provision in the cloud turns capital expenditures on operating expenses. This reduces barriers to entry, as infrastructure is typically provided by a third party and not have to be purchased by a single one-time or infrequent intensive computing tasks. 
  • Scalability and flexibility: sourcing of resources on a self-service basis near real-time, without users needing high-duration loads. 
  • Device and location independence enable users to access systems using a web browser regardless of their location or what device they are using (eg, PC, mobile phone). 
  • Virtualization technology enables server and shared storage devices and increased use. Applications can be easily migrated from one physical server to another. 
  • Yield: cloud systems control and optimize the use of resources automatically, this feature allows for monitoring, control and reporting thereof. This capability provides transparency for the consumer or the service provider. 
  • Security: You can improve due to centralization of data. Security is often as good or better than traditional systems, in part because providers are able to devote resources to solving security issues that many customers can not afford to address. 
  • Maintenance: applications of cloud computing is simpler because it does not need to be installed on each user's computer and can be accessed from different locations.

Disadvantages

  • Centralizing applications and data storage creates an interdependence of service providers. 
  • The application availability is subject to the availability of Internet access. 
  • The "sensitive" business data does not reside on the premises of the companies, which could generate a context of high vulnerability to theft or information theft. 
  • The reliability of the service depends on the technological and financial service providers in cloud "health". Ups or alliances between companies could create an environment conducive to monopoly and overgrowth in servicios.7 
  • The availability of highly specialized services could take months or even years to be feasible to be deployed in the network. 
  • The functional maturity of the applications makes them continually changing their interfaces, so the learning curve is not technology-oriented companies have a significant slopes and their automatic consumption applications. 
  • Security. The company information must travel different nodes to reach its destination, each of them (and channels) are a source of insecurity. If secure protocols, such as HTTPS is used, the total velocity decreases due to the overhead they require. 
  • Long term scalability. As more users start to share the cloud infrastructure, overloading servers providers will increase if the company does not have a scheme of optimal growth can lead to degradation in service or high levels of jitter. 
  • Privacy. The information is exposed to others who may be copied or accessed.

The best free online storage services in the cloud


























































BOX

















CUBBY

















BITCASA















COPY













1 comentario: