Solved

Cloud and security

Posted on 2014-04-01
1
356 Views
Last Modified: 2014-04-02
In typical configurations, hwo are Clouds secured (for example: VMWare based with popular software)

Are there generally DMZ's on these systems,

Are there proxy's and tunneling services

In other words, is there a difference in how Clouds are configured


How are they actually configured, vs how they should be
0
Comment
Question by:Anthony Lucia
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 500 total points
ID: 39969965
The "cloud" (ohh how I hate that word) is simply hosting. It is nothing more than hosting that is elastic, and charges by the resource. If your load grows beyond what you expect, the resources can grow too, and so will your bill. It used to be hosting was mostly flat fee's, then "the cloud" came along and charged by the resource.
There is nothing different in cloud services vs hosted services, there are just bigger names in the game now than before. "Cloud" companies rely on Virtual Machines for everything, and some hardware obviously to run the VM's.
Anything you could imagine doing on a hosted service you can do on a Cloud service.
If you want to run a proxy, you can. The Cloud providers take the same precautions that hosting companies do and prevent you from accessing other peoples resources.
The only thing "the cloud" has different is it's payment billing/model.
-rich
0

Featured Post

How our DevOps Teams Maximize Uptime

Our Dev teams are like yours. They’re continually cranking out code for new features/bugs fixes, testing, deploying, responding to production monitoring events and more. It’s complex. So, we thought you’d like to see what’s working for us. Read the use case whitepaper.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many of you may be aware of the recent Google Docs scam emails that have been floating around coming from various people that you know. Here's a guide on identifying How To Identify the Scam Email You will see an email from someone you’ve had co…
This article provides a convenient collection of links to Microsoft provided Security Patches for operating systems that have reached their End of Life support cycle. Included operating systems covered by this article are Windows XP,  Windows Server…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

689 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question