What kind of security protections and controls can an enterprise expect from a cloud service provider?
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
While there are certain elements of the cloud, such as virtualization and multitenancy, which require special attention with respect to security, generally speaking, enterprises should expect the same level of security protections and controls from a cloud provider as they get from a traditional hosting service.
Do you have a question for Amy?
Submit your question directly to our editors at email@example.com.
This includes such services as access management controls, intrusion detection and intrusion prevention, unified threat management, content filtering and data leakage prevention. Some classes of data and applications will require more extensive controls, including multifactor authentication and encryption. Enterprises might also have some specific compliance and governance requirements that need to be addressed around data transparency and location. Cloud service providers can help meet these requirements by providing audit trails to the client as well as offering guarantees that cover a particular hosting center's location and certification standards.
With respect to cloud-specific security, providers should also be able to offer hypervisor security as well as data isolation to prevent commingling.
Dig Deeper on Cloud Networking
Related Q&A from Amy Larsen DeCarlo
With attacks soaring, how should IT organizations mount an effective defense and boost ransomware security awareness?continue reading
What's the best way to focus on outcomes and construct a network SLA that reflects end-to-end service performance?continue reading
When data center admins are flooded with new technology, they must first prioritize their business objectives before deciding which tools to deploy.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.