Access your Pro+ Content below.
Cloud security concerns shift beyond shared-responsibility model
This article is part of the Modern Infrastructure issue of March 2017, Vol. 6, No. 3
Questions about the underlying security of the public cloud have largely subsided as adoption continues at a torrid pace. Still, IT shops struggle with the work to be done on top of the hyperscale platforms to fortify workloads. Steps to improve transparency and familiarity with the public cloud have helped to allay fears about production workloads on the likes of Amazon Web Services (AWS), Microsoft Azure and Google Cloud Platform. But the shared-responsibility model still requires vigilance, especially as security experts work to understand how to handle emerging strategies around higher-level services and managing multiple cloud environments. For the majority of the first decade of the infrastructure-as-a-service market, there was a constant refrain in IT circles that questioned whether the public cloud was production-ready. Somewhere along the way, that drumbeat quieted. "I don't think I've had that question or challenge in the last 18 months," said Mark Nunnikhoven, vice president of cloud research at Trend Micro, a ...
Access this PRO+ Content for Free!
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Features in this issue
Cloud security concerns may be less prominent in the enterprise, but users and vendors still need to work to ensure data stays safe, especially in higher-level services.
New IT developments converge storage and memory into a hybrid approach. Consequently, the idea of software-defined memory starts to become more of a reality.
Flash storage improves performance for some users, but a flash upgrade won't help if storage isn't your bottleneck.
Columns in this issue
IoT adoption continues to grow, but can public cloud keep up? Data gravity will affect how enterprises process data, prompting some cloud providers to rethink their strategy.
Securing IoT data should become a priority as more companies manipulate the volumes produced by these devices. Seemingly innocuous information could allow privacy invasions.