It is said that successful cloud implementation depends on the vendor. On the same note, how effective a vendor proves in the long run is largely determined by how much attention is given to cloud security. But despite what most vendors think, the topic of security in the cloud is not so easily tamed.
Here’s a discussion on how security plays out differently when we’re talking about building cloud-based architectures.
Mobile is different
The power of network
When we talk about the cloud, the network is everything. It can be used to generate big data analytic s and every node in the network becomes just as important. That means the points of protection are not servers and routers anymore, but the entire network. Understanding this fine distinction will go a long way in setting up the right security policies and evolving an effective strategy.