ResearchMoz

Cloud Security 2013: Companies and Solutions

Mind Commerce Publishing
Published Date » 2013-11-14
No. Of Pages » 44
 Cloud security is the set of security protocols and technologies that protect the cloud resources and the integrity of data stored in a cloud computing environment. Cloud security differs from traditional computer security in that it is not focused on preventing access to specific machines. 
   
 This report provides information about cloud computing environment including types of cloud computing models, challenges facing cloud computing, best practices for cloud security, and analysis of key players in cloud security industry. The report provides an overview of key security components of popular cloud security solutions including architecture and capabilities. The report also provides a market outlook and view into the future of cloud security. 
   
  Report...
Table of Contents:
 
OVERVIEW 6

CLOUD COMPUTING 6

CLOUD COMPUTING MODELS 6
Storage-as-a-service 6
Database-as-a-service  7
Information-as-a-service 7
Business-Process-as-a-Service  7
Application-as-a-service 7
Platform-as-a-service 7
Integration-as-a-service 7
Security-as-a-service 7
Management-as-a-service 8
Testing-as-a-service 8
Infrastructure-as-a-service 8
CLOUD COMPUTING BENEFITS 8
Expand scalability 8
Lower infrastructure costs 8
Increase utilization 8
Improve end-user productivity 9
Improve reliability 9
Increase security 9
Saving Effort for IT Tasks 9
Gain access to more sophisticated applications 9
Save energy 9
CHALLENGES OF CLOUD COMPUTING 10
SENSITIVE DATA LEAKAGE OVER INSECURE CHANNELS  10
A LACK OF INTEROPERABILITY 10
APPLICATION COMPATIBILITY 10
DIFFICULTY IN MEETING COMPLIANCE REGULATIONS 10
INADEQUATE SECURITY  10
CLOUD SECURITY BEST PRACTICES  11
CLOUD PROVIDER  11
Isolation of networks 11
Isolation of management networks 11
Isolation of customer data networks 11
Secure customer access to cloud-based resources 12
Secure, consistent backups and restoration of cloud-based resources 12
Strong authentication, authorization and auditing mechanisms 12
A library of secure and up-to-date templates of base OS and applications 12
CUSTOMER SECURITY BEST PRACTICES  12
Follow standard best practices for securing operating systems  12
Encrypt critical data 13
CLOUD SECURITY PROVIDERS 14
BARRACUDA 14
Barracuda Web Security  14
CARPATHIA  15
Cloud Security Solution - InstantOn  16
CISCO 17
Cisco Cloud Security Solution 17
CITRIX  19
Citrix Cloud infrastructure solutions 19
EXPEDIENT 20
Expedient cloud computing solutions 20
HYTRUST 21
HyTrust Appliance 21
MCAFEE 23
Mcafee Cloud Security Platform  24
OPSOURCE 24
OpSource Cloud Hosting 25
SAFENET 26
TRAPEZOID 27
VIRTUSTREAM 29
CLOUD SECURITY FUTURE OUTLOOK 32
PROACTIVE APPLICATION MONITORING 32
ENHANCED DATA CENTER PHYSICAL SECURITY  32
ENHANCED DATA TRANSFER PROTECTION 32
DISASTER RECOVER AND THE CLOUD 32
APPENDIX: UNDERSTANDING THE CLOUD AND SECURITY 33
Cloud Computing 33
Beyond Computing: Content, Apps, Commerce, and Communications 33
Content 34
Applications 34
Commerce 35
Communications 37
Cloud Solution types 38
Private Clouds  38
Community Clouds 39
Public Cloud 39
Hybrid Cloud 39
General Security Concerns in the Cloud 40
Dos Attack 40
Bounce Attack  41
Personalization 41
Media specific Attack 41
Malicious Code Injection 41
Case Examples: Security Applications and Content as a Service  42
App Store Security 42
Security Management: 42
Identification management 43
Authentication and Authorization  43
Individual Privacy:  43
Data storage 43

List of Tables


List of Figures

Upcoming Reports:

Plastic Surgery & Integumentary System Procedures Market - Global Industry Analysis, Size, Share, Growth, Trends and Forecast, 2013 - 2019
By - Transparency Market Research
Plastic surgery is a medical procedure to alter, correct or restore skin or underlying tissues on any part of the body. Basically, a plastic surgery is performed as a reconstructive procedure or cosmetic procedure. A reconstructive plastic surgery is carried outfor correction of functional impairments resulting from traumatic injuries, burns, congenital abnormalities such as cleft palates or lips, developmental abnormalities, infections, disease and cancer. On contrary, cosmetic surgeries involve invasive procedures (such as breast augmentation, eyelid surgery, etc.) as well...
Poland: market of plastic doors and frames
By - Williams and Marshal Strategy
This report presents a comprehensive overview of the plastic doors and frames market in Poland and its state as of January 2014. It provides detailed analysis of the industry, its dynamics and structure. The purpose of the report is to describe the state of the plastic doors and frames market in Poland, to present actual and retrospective information about the volumes and dynamics of production, imports, exports and consumption, the characteristics of the market for the period 2008-2012 and to build a forecast for the market development until 2018. In the same way, the report presents an...
Flow Cytometry Products Market - Global Industry Analysis, Size, Share, Growth, Trends and Forecast, 2012 - 2018
By - Transparency Market Research
Flow cytometry is a technique used to examine microscopic particles, with the help of fluids, by passing them through an electronic detection apparatus. This technology has a number of applications like molecular biology and immunology but has its major applications in medicine, especially in areas like genetics and chemotherapy. Based on the applications, flow cytometry products are used for monitoring and examining patients. Advancements in the technology and the development of new analysis techniques in combination with medical diagnostics have created favorable conditions...

Research Assistance

We will be happy to help you find what you need.
Please call us or write us:

866-997-4948 (Us-Canada Toll Free)
Tel: +1-518-618-1030
Email: sales@researchmoz.us
Select License type:

Share this report

Related News

Under Armour Makes US$475 Million Deal for MyFitnessPal
Feb 26, 2015  
Baltimore based Under Armour has made earnest attempts in becoming one of the largest players in the fitness apparel market. In their latest venture, the company bought out MyFitnessPal for US$475 million on February 4, 2015. The company also purchased a smaller running app Endomondo for US$85 million. MyFitnessPal is a free fitness app that allows a user to keep a track of his/her...
Hanesbrands Buys Out Knights Apparel
Feb 26, 2015  
Hanesbrands Inc., a leading apparel retailer, has signed an agreement that will allow it to take over Knights Apparel for US$200 million in cash. The latter is a collegiate logo apparel seller. Analysts believe that the acquisition is a strategic one that will provide the right fit to the parent company. White Knights Apparel sells sweatshirts, T-shirts, and other sports apparel with...
Smartphone Market in India on Decline while Samsung Holds Top Spot
Feb 26, 2015  
Korean consumer electronics giant Samsung maintained its leadership in the India smartphone market. The company recorded a 22 per cent share in Q4 of 2014. The overall market has however, shrunk for the first time in history. Most manufacturers of smartphones have had a pileup of inventories in the October to December period, as said by IDC, a market research firm. The firm said that...
Apple to Face over $500 million Payout on iTunes Patent
Feb 26, 2015  
Recently, Apple was accused of using inventions knowingly which were owned by another business in iTunes. The tech giant suffered a patent loss which involved some of these technologies that were used by the iTunes store. As a result the company has been ordered to pay a fine of US$533 million to the company Smartfish. Smartfish is a company which is based in British Virgin Islands and...
Record Connection Speed Achieved by 5G Researchers
Feb 26, 2015  
A record breaking speed has been managed during the test of 5G data connection, according to scientists. The scientists at the University of Surrey’s for 5G Innovation Center or 5GIC were able to achieve a connection speed of 1 tera bit per second, which is thousands of times faster than current data connections. The head of the center at 5GIC stated that he hoped to...