RSS feed Get our RSS feed

News by Topic

Securing the Cloud

F5 Networks Inc

While companies certainly see a business benefit to a pay-as-you-go model for computing resources, security concerns seem always to appear at the top of surveys regarding cloud computing. These concerns include authentication, authorization, accounting (AAA) services; encryption; storage; security breaches; regulatory compliance; location of data and users; and other risks associated with isolating sensitive corporate data. Add to this array of concerns the potential loss of control over your data, and the cloud model starts to get a little scary.

No matter where your applications live in the cloud or how they are being served, one theme is consistent: You are hosting and delivering your critical data at a third-party location, not within your four walls, and keeping that data safe is a top priority. This paper explores strategies and solutions to make your cloud infrastructure or deployment more secure, reliable, and resilient. Secure remote access technology provides contextual, secure access to cloud-based applications; web application firewalls provide the means to centralize application security; network-side scripting offers an agile, immediate method of addressing security vulnerabilities on an on-demand basis, all helping to keep the cloud dynamic, fluid and secure.

Learn how IT administrators can isolate configuration and management for fine-grained control over access to cloud computing infrastructure and can isolate application traffic for improved security of application data that uses shared resources.

Tags : cloud computing, cloud security, protection data in the cloud, cloud data protection, cloud deployment, application protection in the cloud, authentication, aaa
 Email this page
Published:  Apr 18, 2012
Length:  8
Type:  White Paper