• Twitter
  • FaceBook
Home > White Papers > Dome9 > Five Essential Capabilities for Airtight Cloud Security

Five Essential Capabilities for Airtight Cloud Security

By: Dome9

It is no secret; security and compliance are at the top of the list of concerns tied to cloud adoption. According to a recent 2017 Cloud Security survey to over 350,000 members of the LinkedIn Information Security Community, IT pros have general concerns about security in the cloud (33 percent), in addition to data loss and leakage risks (26 percent) and legal and regulatory compliance (24 percent)1. The number of reported breaches in enterprise datacenter environments still far exceeds the reported exposure from cloud platforms, but as businesses start using public clouds to run their mission-critical workloads, the need for enterprise-grade security in the cloud will increase.

Public cloud environments require a centralized, consolidated platform for security that is built from the ground up for the cloud, and allows administrators to monitor and actively enforce security policies. The tools and techniques that worked to secure datacenter environments fail miserably in the cloud. Server-based controls such as firewall policies, file integrity monitoring (FIM), logging, and strong access controls may have to be applied to each workload, but they should be controlled from a single dashboard. Following is a checklist of the five capabilities enterprise customers need to look for when selecting a platform
to manage infrastructure security in the public cloud.

Email this page
Published:  Apr 25, 2018
Length:  6
Type:  White Paper
Tags : 

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter