Blog Layout

What is Cloud Computing? Part 8 – Cloud Security

blsrdwdm • Jun 15, 2020

Is the Cloud Secure?

According to the Flexera 2020 State of the Cloud Report, Security remains the top concern of enterprises thinking about moving to the Cloud. This isn’t all that surprising.

Top cloud challenges — Addison, TX — Red One Network Solutions

Intuitively, the idea of storing your company’s data and running mission-critical applications in a location beyond your organization’s physical control seems like a risky proposition. But the truth is, cloud based systems are often more secure than their on-premises counterparts.

The major Cloud Providers hire top security professionals to constantly monitor and improve their security capabilities. Starting with their data centers, these Providers have state-of-the art physical security and develop rigorous security policies for their employees and vendors to follow. They routinely perform 3 rd -party audits and hold themselves to very high standards. For most small and medium sized business, it is difficult to match this level of physical infrastructure security.

Okay, so maybe the data center is really secure. But what about the virtual servers and the applications that run on them?

To appreciate the high level of security for these virtual assets, let’s consider the Amazon Web Services (AWS) concept of “shared responsibility”.

AWS shared responsibility model — Addison, TX — Red One Network Solutions

The shared responsibility model requires AWS and customers to work together towards security objectives. Within this model, AWS provides a secure global infrastructure while the customer is responsible for:

  • Operating Systems
  • Applications
  • Data in Transit
  • Data at Rest
  • Policies and Configuration

These are the same assets and processes that a customer would be responsible for in an on-premises network environment.

Because AWS understands how difficult it is to secure these assets, they’ve created a sophisticated management platform with powerful configuration tools to manage and control which Cloud resources users can access.

AWS also provides tools that customers can use to create virtual private clouds (VPCs) to separate their assets from those of other customers. VPCs can be fortified with firewalls for both virtual servers and applications to protect customer assets from malicious attacks. In addition, VPN services can be used to build encrypted tunnels for secure data transmission between the Customer premises and the Cloud. Finally, AWS provides tools to encrypt all customer data wherever it is stored in the Cloud.

These are just some of the tools that AWS offers to assist its customers in building a secure Cloud environment. When combined with enhanced logging and monitoring tools and a multitude of automated backup options, the AWS Cloud offers one of the most secure computing environments in the World.

Other major Cloud providers have architectures that are similar to AWS. Working with a reputable Cloud integrator who understands how to utilize the available security tools, Customers can be confident that their Cloud environments are safe and secure from external threats.

Network and application security is a major concern for every company connected to the Internet (that pretty much includes all of them). And it is hard to imagine a more secure computing environment than those that are offered by major Cloud Providers like AWS.

Join us for the next installment of our “What is Cloud Computing?” Blog series when we explore Managing the Cost of Cloud Services. Until next time!

By Thomas Torres 13 Oct, 2023
Centralized Analytics in Video Surveillance: Efficiency and Insight
By Thomas Torres 06 Oct, 2023
Video Surveillance Analytics: A Smart Upgrade for Enhanced Security and Efficiency
Body temperature cameras — Addison, TX — Red One Network Solutions
By blsrdwdm 17 Apr, 2020
In a post shutdown world, providing a healthy workplace will be a critical responsibility for employers. One way to achieve this goal is to prevent symptomatic individuals from entering the building. Toward this end, passive body temperature cameras can be used to notify security personnel when individuals with elevated temperatures are attempting to enter the […] The post Body Temperature Cameras appeared first on Red One Network Solutions.
VoIP concept — Addison, TX — Red One Network Solutions
By blsrdwdm 17 Apr, 2020
An SMB Perspective “VoIP” is one of the most commonly used and widely misunderstood acronyms in the IT industry. VoIP stands for “Voice over Internet Protocol”. Self-explanatory, right? Unless you are an IT geek, maybe not so much. So what is VoIP? And how do you know if you have it or need it? Fundamentally, […] The post What is VoIP? appeared first on Red One Network Solutions.
Cat next to a laptop — Addison, TX — Red One Network Solutions
By blsrdwdm 05 Apr, 2020
With the recent developments associated with the COVID-19 virus, many companies are directing their employees to work from home for the next several weeks. As usual, most large companies (500+ employees) have developed this capability for their workforce to a greater or lesser extent. But for small businesses, this may be a bigger challenge. Many […] The post Crossroads–Where Business Continuity and Work From Home Meet appeared first on Red One Network Solutions.
Building after the disaster — Addison, TX — Red One Network Solutions
By blsrdwdm 26 Feb, 2020
Business Continuity So far in this series about Cloud Computing, we have explored exactly what Cloud Computing means for small and medium sized businesses (SMBs) and taken a look at Thin Client/Cloud Services architecture and how it can be a powerful equalizer for these companies. Now we will take a look at an equally important […] The post What is Cloud Computing Part 7 – Business Continuity appeared first on Red One Network Solutions.
The cost of cloud — Addison, TX — Red One Network Solutions
By blsrdwdm 10 Oct, 2019
We continue our discussion of Cloud Computing by taking a look at one of its more universally accepted benefits—scale on demand architecture. Much of the conversation about this aspect of cloud computing focuses on the advantages for application development and hosted applications (if this seems like a theme, that’s because it is). The following article […] The post What is Cloud Computing Part 6 – Scale on Demand Architecture appeared first on Red One Network Solutions.
Cloud computing concept — Addison, TX — Red One Network Solutions
By blsrdwdm 22 Jul, 2019
In the first 4 parts of this series, we defined the Cloud and discussed some of its many advantages. Which brings up an interesting question—“Are there any potential pitfalls of migrating your business to a Cloud Computing environment?” We’ll explore that issue in this post. One issue that has to be addressed when planning a […] The post What is Cloud Computing? Part 5 – Cloud Challenges appeared first on Red One Network Solutions.
Fingerprint scanner with cloud integrated — Addison, TX — Red One Network Solutions
By blsrdwdm 20 Jun, 2019
I suppose if we are going to talk about Cloud Computing, then we need to define the term “Cloud”. The following animation provides a simple and somewhat amusing explanation of the Cloud. However, after watching this video, you might get the impression that the Cloud is simply a good place to store your data. While […] The post What is Cloud Computing? Part 4 – “The Cloud” appeared first on Red One Network Solutions.
Disaster recovery — Addison, TX — Red One Network Solutions
By blsrdwdm 19 Jun, 2019
It probably doesn’t come as a shock that the cost of this “preparedness” is just too high for most SMBs. It isn’t practical to invest the required capital in spares that may never be needed. And the cost of trying to replace an entire network “on the fly” is even more absurd. So most SMBs […] The post Disaster Recovery appeared first on Red One Network Solutions.
More Posts
Share by: