Think beyond securing the edge of the enterprise. It's time to secure the "edge of the Cloud"
Blog Article Published: 07/09/2012
By Ed King, VP Product Marketing, Vordel Everyone is familiar with the notion of securing the edge of the enterprise. With the growing adoption of cloud technologies, IT must now also think about securing the "edge of the Cloud". The edge of the Cloud is the perimeter around any Cloud environment where it touches the open Internet. In this post we examine just what security at the edge of the Cloud means and how enterprises can achieve a Cloud security strategy that is consistent with their existing on-premise strategy. How an enterprise chooses to secure the edge of the Cloud has a direct impact on what Cloud strategy it adopts. The various flavors of SaaS, IaaS, PaaS, private, public and hybrid Cloud solutions all have individual security requirements that we will examine. Edge of the enterprise security includes what gets deployed in the demilitarized zone (DMZ) and beyond, and can be divided into the three following areas of network, application and data security.
- Network security focuses on keeping the bad guys out and securing communication channels. Technologies include network firewalls, intrusion prevention and detection systems (IDS/IPS) and virtual private networks (VPN).
- Application security is about giving good guys access to approved resources under the right context, by securing application access points. Technologies include web application firewalls (WAF), application/XML/SOA gateways and identity management.
- Data security is about maintaining the data on the inside, as well as securing any data going out. Technologies include leakage prevention (DLP), encryption and tokenization.
Share this content on your favorite social network today!