What kind of security protections and controls can an enterprise expect from a cloud service provider?
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
While there are certain elements of the cloud, such as virtualization and multitenancy, which require special attention with respect to security, generally speaking, enterprises should expect the same level of security protections and controls from a cloud provider as they get from a traditional hosting service.
Do you have a question for Amy?
Submit your question directly to our editors at email@example.com.
This includes such services as access management controls, intrusion detection and intrusion prevention, unified threat management, content filtering and data leakage prevention. Some classes of data and applications will require more extensive controls, including multifactor authentication and encryption. Enterprises might also have some specific compliance and governance requirements that need to be addressed around data transparency and location. Cloud service providers can help meet these requirements by providing audit trails to the client as well as offering guarantees that cover a particular hosting center's location and certification standards.
With respect to cloud-specific security, providers should also be able to offer hypervisor security as well as data isolation to prevent commingling.
Dig Deeper on Cloud Networking
Related Q&A from Amy Larsen DeCarlo
Hackers target hardware vulnerabilities in networks, but you can take proactive steps to prevent attacks.continue reading
Multivendor security system management can be challenging, but getting it right can help your enterprise reap the benefits these systems offer.continue reading
The bad news: IT teams are deluged by false security and malware alerts with their hybrid clouds. The good news: New tools are here to help.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.