UPDATED 09:36 EDT / JULY 06 2011

Empowering Cyber Security with Smart Cloud based Solutions

The cloud provides us the Cloud Paradigm; the proficiency to execute and leverage hardware and network technological revolutions. With today’s cloud technologies, businesses are running data centers, storage, communications, e-services, mobile platforms, back up and archive solutions, management etc. Using cloud services, software can be virtualized as a platform, with trends emerging around SaaS, PasS and IaaS.

But as more and more applications move to the cloud, there is a need and challenge for IT people to virtualize these applications and make them more secure. It brings business savings for overall IT costs, saving in local infrastructure needs, replaces bulky desktop clients to thin clients, and eliminates system patching and IT device remediation.

With cloud virtualization comes the increase risk of loss of control of data, and an increase cyber security threats. Non-secure APIs, not-so-robust and fragmented security models on authorization and access to cloud services, use of network switches, data confidentiality, physical security as well as security of data in the cloud are some of the things that could results in security vulnerabilities.

But business can adapt to the changing needs of the environment, in many cases leveraging the cloud for security as well.   Some of the methods businesses can look at include the following: force authentication in e-services, better control over identity management and encryption, stronger and better data protection mechanism, use of thin clients, enabling secure and enhanced API’s and interfaces, encrypted data stores procedures, and enhanced security in physical hardware.  There’s also emerging options to leverage SSL for web sites, maintaining confidentiality of storage data in cloud with no access to third party providers, providing physical security for cloud data centers and the logical isolation of cloud servers from cloud users, all ensuing a common, uniformed approach to cloud security.

Dr. Satwant Kaur, a management consultant and a leader in the IT industry, recently demonstrated a solution called LTE advanced (LTE-A) technologies for wireless devices. It works on six technologies: carrier aggregation to facilitate wide frequency bandwidth, multi-antenna technology to enable multiplexing, relays to assist extension of coverage and capacity, heterogeneous networks and orthogonal FDM.

Kaur believes this technology could transform cloud security to the next level, applied to several industries as well.  There’s vehicle positioning and crash prevention, wireless sensors for office management to reduce energy consumption, medical instruments to monitor exercise, heart rate and food are some practical applications that will empower and transform our lives in very near future.


A message from John Furrier, co-founder of SiliconANGLE:

Your vote of support is important to us and it helps us keep the content FREE.

One click below supports our mission to provide free, deep, and relevant content.  

Join our community on YouTube

Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.

“TheCUBE is an important partner to the industry. You guys really are a part of our events and we really appreciate you coming and I know people appreciate the content you create as well” – Andy Jassy

THANK YOU