• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Industry News   »   Cloud Computing   »   Combating trust issues in the cloud

Combating trust issues in the cloud

  • Posted on:October 5, 2011
  • Posted in:Cloud Computing, Current News
  • Posted by:
    Trend Micro
0

Trusting third-party vendors with sensitive IT tasks is a scary proposition for many businesses managers, and this anxiety has significantly inhibited cloud computing adoption rates. In an effort to remedy this issue, vendors are finding new ways to assure clients that cloud security is reaching maturity.

Technology vendors have been aware of cloud security skepticism for several years now. But according to Infosecurity, strategies have traditionally relied on the premise that cloud providers can and should be trusted to protect client data.

Some vendors have chosen to make their security efforts as transparent as possible by publicizing certfications gained, documenting platform architecture and offering add-on features such as encryption and enhanced authentication. Meanwhile, others have boldly implied or stated that their trusted experts are at least as capable, if not more capable, than their customers' in-house staff when it comes to managing business data.

In either case, the rhetoric seems to have exceeded its utility.

"As enterprises look to leverage cloud technologies for mission-critical applications, the talk has now shifted toward the private cloud because the 'trust me' approach has reached its limit," said Infosecurity contributor Ed King.

In fact, cloud providers may be wise to concede the fact that they may never fully gain the trust needed to inspire complete migration to the cloud. According to the source, companies may begin to take data security into their own hands by utilizing cloud redundancy, shifting security controls back toward the home office and finding ways to integrate with current enterprise security platforms.

According to recent analysis from Forrester Research, vendors may soon flood the private cloud marketplace with a range of new offerings by the end of the year. The increased competition will likely drive down prices and provide consumers with a host of effective cloud security options to choose from.

Related posts:

  1. Is “trust us” good enough for private data in the public cloud?
  2. In the Cloud We Trust
  3. Trust issues persist in BYOD workplaces
  4. Study: Cloud security issues taking a backseat

Security Intelligence Blog

  • Obfuscation Tools Found in the Capesand Exploit Kit Possibly Used in “KurdishCoder” Campaign
  • Mobile Cyberespionage Campaign Distributed Through CallerSpy Mounts Initial Phase of a Targeted Attack
  • Operation ENDTRADE: Finding Multi-Stage Backdoors that TICK

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Answering IoT Security Questions for CISOs
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • How To Be An Informed Skeptic About Security Predictions
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Trend Micro Selected as Launch Partner for AWS Ingress Routing Service and Stalkerware on the Rise
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • The Shared Responsibility Model
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • What Worries CISOs Most In 2019

Follow Us

Trend Micro In The News

  • Trend Micro Takes On Palo Alto Networks With Cloud Conformity Buy
  • Trend Micro Partners with Snyk to Fix Vulnerabilities for DevOps
  • Trend Micro Partners With Snyk To Advance DevSecOps
  • Hackers to stress-test Facebook Portal at hacking contest
  • NEW TECH: Trend Micro inserts 'X' factor into 'EDR' - endpoint detection response
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.