Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Cloud-based security services poised for rapid growth

John P. Mello Jr. | Jan. 2, 2014
Compelling business propositions and BYOD driving security exodus to the nimbus.

Nunnikhoven warned, however, that, despite the enthusiastic claims of cloud providers, savings may be elusive."A lot of the time when people think of savings they're thinking they were paying $100 before, and they're paying $50 now," he said. "What you're likely to see is a better use of your resources. You may spend the same amount of money, but you get more bang for your buck."

Despite the velocity to move security services to the cloud, some businesses will remain skeptical of the practice. Observes Nirav Mehta, director of product management at RSA, the security division of EMC: "It's not that the business is less secure by using the cloud. It's that the business may not have visibility into how secure it is when it loses control of its security services."

Moreover, in recent times, the cloud's vulnerability to actors endowed with large resources has tarnished the security reputation of the nimbus. "The assumption that these cloud providers are to big to be insecure has proven to be false," flyingpenguin's Ottenheimer said.

Nowhere has that been more evident than in the recent revelations of snooping on large cloud services providers by the National Security Agency. Nevertheless, there are those that believe that not even the NSA can slow the momentum behind the migration of security services to the cloud.

"The cloud is such a compelling option these days that there's not much that's going to slow that down," e-terntiy's Onoprijenkom said. "There's lots of examples of breaches in the Amazon cloud, and people are still flocking to Amazon daily."

"What that says is no matter who you are or how much money you spend, there are still vulnerabilities and you still have to be aware of threats," he added. "It's naive to think that nobody's IT environment will ever get penetrated. You have to deal with it and make sure people are as protected as possible."


Previous Page  1  2  3  4 

Sign up for CIO Asia eNewsletters.