ResearchMoz

Cloud Security 2013: Companies and Solutions

Mind Commerce Publishing
Published Date » 2013-11-14
No. Of Pages » 44
 Cloud security is the set of security protocols and technologies that protect the cloud resources and the integrity of data stored in a cloud computing environment. Cloud security differs from traditional computer security in that it is not focused on preventing access to specific machines. 
   
 This report provides information about cloud computing environment including types of cloud computing models, challenges facing cloud computing, best practices for cloud security, and analysis of key players in cloud security industry. The report provides an overview of key security components of popular cloud security solutions including architecture and capabilities. The report also provides a market outlook and view into the future of cloud security. 
   
  Report...
Table of Contents:
 
OVERVIEW 6

CLOUD COMPUTING 6

CLOUD COMPUTING MODELS 6
Storage-as-a-service 6
Database-as-a-service  7
Information-as-a-service 7
Business-Process-as-a-Service  7
Application-as-a-service 7
Platform-as-a-service 7
Integration-as-a-service 7
Security-as-a-service 7
Management-as-a-service 8
Testing-as-a-service 8
Infrastructure-as-a-service 8
CLOUD COMPUTING BENEFITS 8
Expand scalability 8
Lower infrastructure costs 8
Increase utilization 8
Improve end-user productivity 9
Improve reliability 9
Increase security 9
Saving Effort for IT Tasks 9
Gain access to more sophisticated applications 9
Save energy 9
CHALLENGES OF CLOUD COMPUTING 10
SENSITIVE DATA LEAKAGE OVER INSECURE CHANNELS  10
A LACK OF INTEROPERABILITY 10
APPLICATION COMPATIBILITY 10
DIFFICULTY IN MEETING COMPLIANCE REGULATIONS 10
INADEQUATE SECURITY  10
CLOUD SECURITY BEST PRACTICES  11
CLOUD PROVIDER  11
Isolation of networks 11
Isolation of management networks 11
Isolation of customer data networks 11
Secure customer access to cloud-based resources 12
Secure, consistent backups and restoration of cloud-based resources 12
Strong authentication, authorization and auditing mechanisms 12
A library of secure and up-to-date templates of base OS and applications 12
CUSTOMER SECURITY BEST PRACTICES  12
Follow standard best practices for securing operating systems  12
Encrypt critical data 13
CLOUD SECURITY PROVIDERS 14
BARRACUDA 14
Barracuda Web Security  14
CARPATHIA  15
Cloud Security Solution - InstantOn  16
CISCO 17
Cisco Cloud Security Solution 17
CITRIX  19
Citrix Cloud infrastructure solutions 19
EXPEDIENT 20
Expedient cloud computing solutions 20
HYTRUST 21
HyTrust Appliance 21
MCAFEE 23
Mcafee Cloud Security Platform  24
OPSOURCE 24
OpSource Cloud Hosting 25
SAFENET 26
TRAPEZOID 27
VIRTUSTREAM 29
CLOUD SECURITY FUTURE OUTLOOK 32
PROACTIVE APPLICATION MONITORING 32
ENHANCED DATA CENTER PHYSICAL SECURITY  32
ENHANCED DATA TRANSFER PROTECTION 32
DISASTER RECOVER AND THE CLOUD 32
APPENDIX: UNDERSTANDING THE CLOUD AND SECURITY 33
Cloud Computing 33
Beyond Computing: Content, Apps, Commerce, and Communications 33
Content 34
Applications 34
Commerce 35
Communications 37
Cloud Solution types 38
Private Clouds  38
Community Clouds 39
Public Cloud 39
Hybrid Cloud 39
General Security Concerns in the Cloud 40
Dos Attack 40
Bounce Attack  41
Personalization 41
Media specific Attack 41
Malicious Code Injection 41
Case Examples: Security Applications and Content as a Service  42
App Store Security 42
Security Management: 42
Identification management 43
Authentication and Authorization  43
Individual Privacy:  43
Data storage 43

List of Tables


List of Figures

Upcoming Reports:

Inflammatory Bowel Disease Market - Global Industry Analysis, Size, Share, Growth, Trends and Forecast, 2013 - 2019
By - Transparency Market Research
Inflammatory bowel disease (IBD) is an immune-mediated disease in which the body’s own immune system attacks the parts of the digestive system of the human body. Such disease involves inflammation of lower gastrointestinal tract and causes irreversible damage to the bowel. Ulcerative colitis and Crohn’s disease are the two major forms of IBD; both having distinct pathologic and clinical characteristics. IBD is a difficult to manage medical condition with a higher morbidity rate and thus its diagnosis and management is of utmost importance.  The global...
Harvesting Machinery Market - Global Industry Analysis, Size, Share, Growth, Trends and Forecast, 2013 - 2019
By - Transparency Market Research
Harvesting machinery is used to gather mature crops from the farmland. These machines perform various actions such as cutting, winnowing and threshing concurrently. Harvesting machinery is mostly used for agricultural purposes. They can be broadly classified into machines such as tree crop, root crop, row crop, grain & seed crop and hay & silage. Harvesting machines such as crushers, choppers and balers are used to control population of weeds. They are extensively used for the cultivation of silages. Increased demand for rising harvesting machinery in order to improve...
Poland: artificial yarn market
By - Williams and Marshal Strategy
This report presents a comprehensive overview of the artificial yarn market in Poland and its state as of January 2014. It provides detailed analysis of the industry, its dynamics and structure. The purpose of the report is to describe the state of the artificial yarn market in Poland, to present actual and retrospective information about the volumes and dynamics of production, imports, exports and consumption, the characteristics of the market for the period 2008-2012 and to build a forecast for the market development until 2018. In the same way, the report presents an elaborate overview...

Research Assistance

We will be happy to help you find what you need.
Please call us or write us:

866-997-4948 (Us-Canada Toll Free)
Tel: +1-518-618-1030
Email: sales@researchmoz.us
Select License type:

Share this report

Related News

Evereadys Kenya Plant to be Shut Down
Sep 30, 2014  
The largest dry-cell battery manufacturer in the region of East Africa, Eveready East Africa Ltd. intends on shutting down its one and only factory in Kenya on the 1st of October 2014. A real estate business will be started in its place. According to the Managing Director of Eveready East Africa Ltd. the plan of shutting down the plant was initiated by the board members of this company...
Sale of Apples iPhones Remains Unaffected - Supported By Consumer Feedback
Sep 29, 2014  
iPhones have been reintroduced in the global market by Apple Inc. in about 22 countries. Consumer reports and feedback basically show that due to the presence of a problem-free backing and update, these handsets are sturdy and do not bend easily. It has been observed via stress tests conducted on iPhone 6 and 6 Plus, that it requires high force and pressure to cause damage to these...
New Malware Targets Pharma Servers
Sep 29, 2014  
The electronics and communication agency Beldon has reportedly spotted a new cyber threat to the pharmaceutical industry. Called Dragonfly, the malware specifically targets intellectual property of servers in the pharmaceutical industry with the purpose of stealing information. An initial report released by ipprolifesciences.com stated the malware was targeting the energy sector....
Child’s Success Depends on Father’s Education Level: Study
Sep 24, 2014  
A father’s level of education is the strongest attribute that can determine a child’s success in academics, according to a research conducted in Britain. It also says that there is a self-reinforcing cycle of lack of achievement and poverty that is handed down from parent to child. The report was released by the Office for National Statistics and states that children are...
Orange Business Services to Extend into Internet Services
Sep 23, 2014  
Orange Business Services is set to create a business-class Internet service by extending its core VPN Business Service into VPN Business Internet. The move has been made to meet the increasing demand from multinational companies for a heavy-duty, high-performance, and secure access to Cloud and Web services on the Internet. It is the cornerstone Business VPN Internet by the Hybrid...