Head to head

Security experts CA Technologies and WatchGuard go head-to-head on the big issues of cloud bursting and securing cloud services

Tags: CA Technologies (www.ca.com/us/default.aspx)WatchGuard Technologies Incorporation
  • E-Mail
Head to head Hishaam AbdulAziz, Information Security Consultant, CA Technologies
More pics ›
By  Georgina Enzer Published  June 8, 2013

Security experts CA Technologies and WatchGuard go head-to-head on the big issues of cloud bursting and securing cloud services.

Hishaam AbdulAziz, Information Security Consultant, CA Technologies

How secure is cloud bursting?

The great thing about cloud bursting is that it’s completely flexible and dynamic. This is the greatest benefit to the Cloud Service Customer’s, but also its biggest security threat. Due to its fluid nature, organisations tend to very rapidly lose a sense of where their data resides, how it’s accessed and by whom.

How do companies secure their business and applications when using public cloud?

According to Gartner, at year-end 2016, more than 50% of Global 1000 will have stored customer-sensitive data in the public cloud. When choosing a cloud service provider, organisations should no longer accept assurances of security practices and should insist on understanding of the company’s use of security.

Do they need both security software and security hardware to protect the network?

In essence cloud enabled identity & access management solutions can help organisations adopt the cloud bursting model more securely! The key to understanding security in cloud environments is to realise that fundamentals of protecting confidentiality, integrity and availability of information have’nt changed.

Haroon Iqbal, Sales Manager, Middle East and Africa, WatchGuard

How secure is cloud bursting?

Cloud bursting is only as secure as the public cloud provider you chose. Cloud bursting means your private applications, and sensitive data stored within the network, moves to public cloud, where its security is out of your control. You have to trust the third party cloud provider is securing their infrastructure.

How do companies secure their business and applications when using public cloud?

I would say the most common way is encryption. There are various solutions that allow you to encrypt your web applications, and the data they store so that there is a level of protection even when they are live on a public cloud. These solutions are not foolproof, but it is possible to largely secure public cloud apps.

Do they need both security software and security hardware to protect the network?

In general, I recommend defence in depth. No single security control—whether software or hardware based—is foolproof. For example, you may use encryption solutions to protect public cloud application, but if someone crack or tricks you out of your credentials, that encryption isn’t enough to protect you.

Add a Comment

Your display name This field is mandatory

Your e-mail address This field is mandatory (Your e-mail address won't be published)

Security code