Solved

Cloud and security

Posted on 2014-04-01
1
351 Views
Last Modified: 2014-04-02
In typical configurations, hwo are Clouds secured (for example: VMWare based with popular software)

Are there generally DMZ's on these systems,

Are there proxy's and tunneling services

In other words, is there a difference in how Clouds are configured


How are they actually configured, vs how they should be
0
Comment
Question by:Anthony Lucia
1 Comment
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 500 total points
ID: 39969965
The "cloud" (ohh how I hate that word) is simply hosting. It is nothing more than hosting that is elastic, and charges by the resource. If your load grows beyond what you expect, the resources can grow too, and so will your bill. It used to be hosting was mostly flat fee's, then "the cloud" came along and charged by the resource.
There is nothing different in cloud services vs hosted services, there are just bigger names in the game now than before. "Cloud" companies rely on Virtual Machines for everything, and some hardware obviously to run the VM's.
Anything you could imagine doing on a hosted service you can do on a Cloud service.
If you want to run a proxy, you can. The Cloud providers take the same precautions that hosting companies do and prevent you from accessing other peoples resources.
The only thing "the cloud" has different is it's payment billing/model.
-rich
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
mysql disables rename 4 93
reverse email lookup 8 66
Home security 15 41
EmsisoftAntiMalware is it trusted reliable 4 24
Data breaches are on the rise, and companies are preparing by boosting their cybersecurity budgets. According to the Cybersecurity Market Report (http://www.cybersecurityventures.com/cybersecurity-market-report), worldwide spending on cybersecurity …
In this increasingly digital world, security hacks are no longer just a threat, but a reality. As we've witnessed with Target's big identity hack 2013, Heartbleed in 2015, and now Cloudbleed, companies and their leaders need to prepare for the unthi…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question