ResearchMoz

Cloud Security 2013: Companies and Solutions

Mind Commerce Publishing
Published Date » 2013-11-14
No. Of Pages » 44
Cloud security is the set of security protocols and technologies that protect the cloud resources and the integrity of data stored in a cloud computing environment. Cloud security differs from traditional computer security in that it is not focused on preventing access to specific machines.
 
This report provides information about cloud computing environment including types of cloud computing models, challenges facing cloud computing, best practices for cloud security, and analysis of key players in cloud security industry. The report provides an overview of key security components of popular cloud security solutions including architecture and capabilities. The report also provides a market outlook and view into the future of cloud security.
 
Report Benefits: 

  • Understand the basics of cloud computing
  • Evaluation of cloud security companies and their solutions
  • Identify key practices of cloud security vendors and customers
  • Understand cloud computing environment, benefits and challenges
  • Identify the evolution of cloud to content, applications, content, and communications
  • Understand cloud security solutions including components, architecture and capabilities

Target Audience:

  • Telecom service providers
  • Security solutions providers
  • Content and application providers
  • Datacenter and hosting companies
  • Cloud services (SaaS, IaaS, PaaS) companies
  • Companies involved with SDN and virtualization

Companies in Report: 

  • BARRACUDA  
  • CARPATHIA    
  • CISCO 
  • CITRIX 
  • EXPEDIENT     
  • HYTRUST        
  • MCAFEE         
  • OPSOURCE     
  • SAFENET         
  • TRAPEZOID    
  • VIRTUSTREAM 
Table of Contents:
 
OVERVIEW 6

CLOUD COMPUTING 6

CLOUD COMPUTING MODELS 6
Storage-as-a-service 6
Database-as-a-service  7
Information-as-a-service 7
Business-Process-as-a-Service  7
Application-as-a-service 7
Platform-as-a-service 7
Integration-as-a-service 7
Security-as-a-service 7
Management-as-a-service 8
Testing-as-a-service 8
Infrastructure-as-a-service 8
CLOUD COMPUTING BENEFITS 8
Expand scalability 8
Lower infrastructure costs 8
Increase utilization 8
Improve end-user productivity 9
Improve reliability 9
Increase security 9
Saving Effort for IT Tasks 9
Gain access to more sophisticated applications 9
Save energy 9
CHALLENGES OF CLOUD COMPUTING 10
SENSITIVE DATA LEAKAGE OVER INSECURE CHANNELS  10
A LACK OF INTEROPERABILITY 10
APPLICATION COMPATIBILITY 10
DIFFICULTY IN MEETING COMPLIANCE REGULATIONS 10
INADEQUATE SECURITY  10
CLOUD SECURITY BEST PRACTICES  11
CLOUD PROVIDER  11
Isolation of networks 11
Isolation of management networks 11
Isolation of customer data networks 11
Secure customer access to cloud-based resources 12
Secure, consistent backups and restoration of cloud-based resources 12
Strong authentication, authorization and auditing mechanisms 12
A library of secure and up-to-date templates of base OS and applications 12
CUSTOMER SECURITY BEST PRACTICES  12
Follow standard best practices for securing operating systems  12
Encrypt critical data 13
CLOUD SECURITY PROVIDERS 14
BARRACUDA 14
Barracuda Web Security  14
CARPATHIA  15
Cloud Security Solution - InstantOn  16
CISCO 17
Cisco Cloud Security Solution 17
CITRIX  19
Citrix Cloud infrastructure solutions 19
EXPEDIENT 20
Expedient cloud computing solutions 20
HYTRUST 21
HyTrust Appliance 21
MCAFEE 23
Mcafee Cloud Security Platform  24
OPSOURCE 24
OpSource Cloud Hosting 25
SAFENET 26
TRAPEZOID 27
VIRTUSTREAM 29
CLOUD SECURITY FUTURE OUTLOOK 32
PROACTIVE APPLICATION MONITORING 32
ENHANCED DATA CENTER PHYSICAL SECURITY  32
ENHANCED DATA TRANSFER PROTECTION 32
DISASTER RECOVER AND THE CLOUD 32
APPENDIX: UNDERSTANDING THE CLOUD AND SECURITY 33
Cloud Computing 33
Beyond Computing: Content, Apps, Commerce, and Communications 33
Content 34
Applications 34
Commerce 35
Communications 37
Cloud Solution types 38
Private Clouds  38
Community Clouds 39
Public Cloud 39
Hybrid Cloud 39
General Security Concerns in the Cloud 40
Dos Attack 40
Bounce Attack  41
Personalization 41
Media specific Attack 41
Malicious Code Injection 41
Case Examples: Security Applications and Content as a Service  42
App Store Security 42
Security Management: 42
Identification management 43
Authentication and Authorization  43
Individual Privacy:  43
Data storage 43

List of Tables


List of Figures

Upcoming Reports:

Industrial Robotics Market - Global Industry Size, Market Share, Trends, Analysis And Forecasts 2012 - 2018
By - Transparency Market Research
An industrial robot is created so that it can perform regular pre programmed manufacturing and processing tasks in any manufacturing assembly line. Industrial robots perform a huge array of tasks beginning from winding the cords and screws, assembly of various components to finishing the product. With multiple arms, technology industrial robots can perform many tasks at a single point of time. Today robots are given prime importance in large scale manufacturing because robots can replace human labor in performing high risk tasks; thus, their performance is precise and accurate....
Pneumonia Drugs & Vaccines Market - Global Industry Analysis, Size, Share, Growth, Trends and Forecast, 2013 - 2019
By - Transparency Market Research
Pneumonia is a common lung infection caused by a variety of microorganisms such as bacteria, virus, fungi and parasites. In pneumonia the air sacs of lungs that are known as alveoli are filled with fluid or pus causing inflammation. The common symptoms of pneumonia are cough with phlegm, sneezing, sore throat, chills, fever and trouble in breathing. Pneumonia is usually a mild disease but under certain situations can be lethal. Children, elderly people and those with recent viral infections, lung disease and heart disease are at higher risk of developing pneumonia compared to...
Touch Screen Technology Market - Global Industry Analysis, Size, Share, Growth, Trends and Forecast, 2012 - 2018
By - Transparency Market Research
Touch screen technology acts as an interface between users and computers which provide an easy visual experience to the users. The popularity of touch screen technology in smartphones, tablets, PCs, mobile phones, and in many other information devices is gaining momentum. Touch screen technology provides hassle free interactivity and strong control on the device. There are various types of touch screen available in the market such as resistive touchscreen, capacitive touchs creen, surface acoustic wave, optical touchscreen, and infrared.  The touchscreen market is driven...

Research Assistance

We will be happy to help you find what you need.
Please call us or write us:

866-997-4948 (Us-Canada Toll Free)
Tel: +1-518-618-1030
Email: sales@researchmoz.us
Select License type:

Share this report

Related News

Scientists Identify Cure for Dengue
Apr 18, 2014  
In a breakthrough discovery that can change the way dengue is treated, scientists have identified a drug target for the deadly dengue viruses. This discovery may help pave the way for discovery of vaccines that can cure this condition that affects nearly 390 million people throughout the world each year.  Scientists have used a new technique for this discovery to show that a region...
India is Facing a Cancer Crisis
Apr 15, 2014  
India is currently facing a cancer crisis – reports a recent research carried out at the King’s college London, in collaboration with the Tata Memorial Cancer Centre, Mumbai.  The reasons estimated for this crisis comprise of increasing rates of smoking, unequal access to proper treatment and belated diagnosis.  Every year, India witnesses around one...
Microparticle Tags to Check Counterfeit Goods Invented
Apr 14, 2014  
Researchers from the Massachusetts Institute of Technology have invented a new set of microparticles that can easily be read by smartphones and establish the authenticity of currency, electronic items and luxury goods.  This strategy is among those countless measures taken by big brands and companies to label their legitimate products in order to stop illegal copies of the...
USFDA Approves Lupins Generic Diabetic Drug
Apr 10, 2014  
The United States Food and Drugs Administration (USFDA) has finally approved Lupin Pharmaceuticals Inc (LPI), the American subsidiary of Indian drug manufacturers Lupin Ltd, to sell Pioglitazone Tablets in the U.S market. The approval has been granted first for fiscal 2015.  Pioglitazone is a generic medicine used for managing diabetes and is a version of Actos tablets...
Infrared Sensors can Soon Be Used to Develop Night-Vision Lenses - A New Discovery Confirms
Apr 8, 2014  
People who fear the dark may soon have a reason to rejoice – an infrared sensor that can eventually be used for mechanizing night-vision lenses has been developed. This effectively means that one can also see through dark with the help of these lenses.  This technology seems possible all due to graphene, a layer of tightly packed carbon atoms that has allowed the creation of...