Selecting a Cloud Hosting Provider: 3 Criteria to Consider

November 13, 2013 3 min Read

It sounds simple enough: Secure computing environments remain secure because they limit the number of outside sources that are connected to it.

For this reason, when cloud computing was first being touted as the next big thing in the evolving technological landscape, a lack of security and application control were raised as primary concerns. However, this is no longer the case - as private clouds now allow for company data to be segmented within private environments and SSL encryption methodologies can create a secure connection between the user and the server.

Three Security Concerns to Consider Choosing a Cloud Provider

Even with these improved options, it is important to note that the security within the cloud is only as strong as the provider – and because not all providers deliver the same level of security, finding a cloud hosting provider who highlights the following security features at the forefront of their service offerings is critical:

1) Physical Security

According to Verizon’s 2012 DATA BREACH INVESTIGATIONS REPORT (DBIR), the lack of physical security at the actual data center is a factor in almost one-third of all breaches investigated.1 A way to stem this concern is to choose a service provider that is in total control of the data center from which your cloud is being housed: meaning they control everything, and no outside personnel have access to the facility. This allows for lockdown security, which should include 24x7 monitoring, continued video surveillance and onsite guarded access.

2) Segregation

When selecting a hybrid or public environment, take note that your data and applications may be stored and secured within a shared environment, meaning that the provider controls the location, access and provisioning of the data. This is different from traditional onsite storage solutions, where you control the location of the data and who can access it. In order to ensure your data remains protected, the hosting provider needs to offer data segregation and encryption at every stage of a multiple tenant environment.

3) Overall Security

This includes verifying the existence of up-to-date software upgrades, antivirus and security polices, secure log-in, encryption methodologies, enterprise grade intrusion prevention systems, and hardware based firewalls.

Download our “Security in the Cloud Whitepaper” for more information on what it really takes to ensure cloud security.

References:

1) http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf

Joe Palian Joe Palian

Subscribe to Our Blog

Big Picture
December 12th, 2024 at 1:00 PM ET

Big Picture: Putting 2024 in Perspective

Join us

Big Picture

December 12th, 2024 at 1:00 PM ET

Big Picture: Putting 2024 in Perspective

Join us