• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Elisa Lippincott
    • Mark Nunnikhoven
    • Jon Clay
  • Research
Home   »   Industry News   »   Cloud Computing   »   Cloud helping to improve security policies

Cloud helping to improve security policies

  • Posted on:March 4, 2013
  • Posted in:Cloud Computing, Cybercrime, Privacy & Policy
  • Posted by:
    Trend Micro
0

Although there are still concerns expressed by companies and individuals regarding cloud security, there is a great deal of variability in their legitimacy. Paul Rubens wrote on eSecurity Planet that the cloud, while it has not eliminated cyber threats, has given businesses a powerful new weapon for effectively fighting it, even when they may not have the biggest IT department in the world.

:But has cloud security technology lived up to this hype? The answer is that while it hasn't got every cybercriminal on the run, it certainly provides formidable weapons for organizations to use in the constant struggle against them," he wrote on the website. "The most visible use of cloud security technology is for endpoint protection – in the anti-virus clients that run (or should run) on every desktop and laptop computer. Most of the major anti-virus security vendors now offer a cloud-based component to their products, and these can certainly make life more difficult for cybercriminals."

In fact, many companies are already starting to use a cloud-based approach to security. Rubens wrote on eSecurity that this can help reduce the amount of money companies spend on software licenses and security appliances, as the cloud is much less expensive than buying new hardware and software, and also helps reduce the administrative burden companies would otherwise have. With a security system in place that would be running on-premise, there would potentially be a number of small, nagging costs and tasks, but with cloud-based security, the service provider can do the lion's share of the company's security work.

With anti-malware scanning, web filtering, data loss prevention and more in the cloud, companies may be able to feel even more safe with their data in the cloud than simply on their services. Rubens said the cloud can also help to play a role in lessening the impact distributed denial-of-service attacks can have on an organization.

"By their nature DDoS attacks involve massive amounts of traffic which overwhelm Internet-facing servers in a corporate data center or hosting provider's facilities," he wrote. "Companies … operate cloud-based DDoS-mitigation platforms and a network of global scrubbing centers."

Robert Scheier wrote on CSO Online that comparing cloud security to internally run IT infrastructures can give a lot more attention to network firewalls, load balancing, network address translations and other areas where on-premise security may fall short. With a cloud solution in place, companies gain access to automated security tools which are likely more efficient and reliable than most legacy alternatives.

Cloud Security News from SimplySecurity.com by Trend Micro.

Related posts:

  1. Amazon tries to improve security for cloud
  2. US government policies show cloud adoption is worth challenges
  3. New cloud means new policies, changes
  4. Medical offices using mobile need security policies

Security Intelligence Blog

  • XLoader Android Spyware and Banking Trojan Distributed via DNS Spoofing
  • XTRAT and DUNIHI Backdoors Bundled with Adwind in Spam Mails
  • Ransomware XIAOBA Repurposed as File Infector and Cryptocurrency Miner

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • The Role That IT Security Teams Need to Play in Connected Hospitals
Elisa Lippincott (TippingPoint Global Product Marketing)
Elisa Lippincott (TippingPoint Global Product Marketing)
  • TippingPoint Threat Intelligence and Zero-Day Coverage – Week of April 16, 2018
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Warnings and WannaCry
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Drupal Latest Platform To Be Hit With Critical Vulnerability
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • Today’s Predictions for Tomorrow’s Internet
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • GDPR vs Blockchain: Technology vs the Law

Follow Us

Trend Micro in the News

  • The connected workforce: The importance of protecting home and corporate networks
  • NIST Cybersecurity Framework Series Part 5: Recover
  • NIST Cybersecurity Framework Series Part 4: Respond

Trend Micro Blogs

  • Internet Safety for Kids
  • Countermeasures
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.