NEW CLOUD ARCHITECTURE TO ENSURE SECURITY
The Cloud Security Platform secures all materials and information traffic or data transfer between cloud network infrastructure and an organization. It includes the web, the identity traffic, and the electronic mail in its provision of security. It safeguards the incoming and outgoing communication traffic using a built-in solution that is modular.
The modules of McAfee perform the following: Web Security, Mobile Security, Cloud Access Control, Email Security, and Web Services Security.
The Web Security gives protection that is bi-directional and intent-based via a reputation that is proactive for inbound and outbound web traffic.
Cloud Access Control, particularly the Intel Expressway Cloud Access360, via enterprise identities offers control of access to cloud applications.
Email Security includes incoming threat protection and outgoing prevention for data loss.
Mobile Security can be forwarded via a web gateway that utilizes regular device management. This can be produced by tablets and smart phones. Security of mobile devices is guaranteed through policies dealing with corporate web filtering and a progressive anti-malware protection.
Web Services security occurs when an API (Application Programming Interface) security in an application level, mediation from REST to SOAP, transformation of data, and exchange of identity token are offloaded to a gateway in the cloud via, in McAfee, the Intel Expressway Service Gateway.
Cloud architecture helps its customers in preventing the movement of critical data to an external network or a network outside the organization. It even determines what data should be transferred or not transferred to the cloud.
In this way, companies can initially comprehend where data is stored, categorize the significance and critical factors of the data, generate policies and procedures that concern the data, and strictly implement the policies and procedures generated even as data traffic to the cloud is in place.
Data in a variety of formats and layout, and in various sites in a network are detected by the data loss prevention feature of the cloud architecture. It provides the company with data searching mechanisms to bring a protection that is effective, and the generation of more policies that are consistently effective. Through inclusion in the McAfee ePolicy Orchestration platform, consolidated reporting and management are also offered.
To obtain the coverage to protect company headquarters, regional office sites, and mobile devices used by remote employees, the deployment of modules for security purposes can be utilized through either of the following: a software-as-a-service solution, on-premise appliance, or a combination of the two.
The SaaS Control Console or the ePolicy Orchestration can vitally manage the above solutions. It can even power the cloud around the world with countless sensors and threat researchers to bring about real time, and even a proactive threat intelligence, against all threats, known and emerging, through the Global Threat Intelligence.
IBM has launched a new cloud security that is concentrated on providing more safety measures on cloud computing. Its objective is to assist both providers and users of cloud architecture to traverse more simply and effortlessly the challenges posed by the security through a more novel way of cloud planning and evaluation.
According to them, factors should be considered in implementing cloud protection. The work that a company does as well as the mechanisms involved should be included in the planning. As an example, an organization with collaboration and email traffic in the clouds should be provided with policy control and access. An organization that is involved in healthcard in the cloud should be provided with encryption and isolation of data feature.
Among IBM’s new cloud security architecture are the Cloud Security Strategy Roadmap, Cloud Security Assessment, and Application Security Services for Cloud.
The Cloud Security Strategy Roadmap includes goals and initiatives, concerns on privacy and security, strategies on adequate vulnerability mitigation, and generates a high strategy on security roadmap to attain the purposes of obtaining cloud security.
The Cloud Security Assessment correlates the security program’s cloud solution versus the best practices of the industry, and the corporate’s objectives.
The Application Security Services for Cloud provides the information as to the how and the where data that are considered critical will flow in the cloud. It can help the organization establish the right internal control and autonomy of service provider that is needed to sustain effectivity prior to the implementation of a cloud solution.
Credit:ivythesis.typepad.com
0 comments:
Post a Comment