Cloud Security 2014: Companies and Solutions

Cloud Security 2014: Companies and Solutions

Overview:

Cloud security is the set of security protocols and technologies that protect the cloud resources and the integrity of data stored in a cloud computing environment. Cloud security differs from traditional computer security in that it is not focused on preventing access to specific machines.

This research provides an evaluation of security in cloud computing environment including different types of cloud computing models and security challenges facing cloud computing companies/solutions. The report provides analysis of key security components of popular cloud security solutions. The report includes an evaluation of key players in cloud security industry. The report also provides a cloud security future outlook.

All report purchases include telephone time with an expert analyst who will help you link key findings in the report to the business issues you're addressing. This needs to be used within three months of purchasing the report.

Target Audience:

Cloud services companies
Mobile network operators
Wireless handset manufactures
Telecom infrastructure providers
Content and application developers
Cloud and telecom security companies
Content Delivery Network (CDN) providers
Cloud Computing and Cloud Security 7
Cloud Computing 7
Cloud Computing Models 8
Storage-as-a-service 8
Database-as-a-service 8
Information-as-a-service 8
Business-Process-as-a-Service 8
Application-as-a-service 8
Platform-as-a-service 8
Integration-as-a-service 8
Security-as-a-service 9
Management-as-a-service 9
Testing-as-a-service 9
Infrastructure-as-a-service 9
Types of Cloud Services 9
Public Cloud 9
Private Cloud 9
On-premise Private Cloud 10
Externally hosted Private Cloud 10
Hybrid Cloud 10
Community cloud 10
Heterogeneous cloud 10
Cloud Computing Benefits 11
Expand scalability 11
Lower infrastructure costs 11
Increase utilization 11
Improve end-user productivity 11
Improve reliability 11
Increase security 12
Saving Effort for IT Tasks 12
Gain access to more sophisticated applications 12
Save energy 12
Elements of Cloud Protection: Policy, Identity, Information, and Infrastructure 12
Policy 12
Identity 12
Information 13
Infrastructure 13
Cloud Security (Categories, Challenges, and Service Providers) 14
Overview 14
Identity and Access Management (IAM) 14
Functionalities 15
Provisioning/de-provisioning of accounts: 15
Authentication 15
Directory services 15
Web SSO 15
Fraud Prevention 16
Authorization 16
User profile Management 16
Threats Addressed 16
Security Challenges 17
Solutions Providers 17
Novell Cloud Security Services 17
Gemalto 18
Protiva Cloud Confirm 19
SafeNet 19
SafeNet certificate-based authenticators 19
SafeNet Hardware Security Module 20
Data Loss Prevention 20
Functionalities 20
Identification of Sensitive Data 20
SQL regular expression detection 20
Real Time User Awareness 21
Threats Addressed 21
Challenges 21
Solutions Providers 21
Websense 21
Websense Cloud Web Security 21
Web Security 22
Functionalities 22
Web Filtering 22
Instant Messaging Scanning 22
Email Security 23
Bandwidth Control 23
Threats Addressed 23
Challenges 23
Solutions Providers 23
TrendMicro 23
Deep Security Solution 24
zScaler 24
Cloud Application Security 24
Email Security 25
Functionalities 25
Accurate filtering to block spam and phishing 25
Virus Protection 25
Threats Addressed 25
Challenges 25
Solutions Providers 26
Symantic.Cloud 26
Email Encryption.cloud 26
Email Security.cloud 26
Web Security.cloud 26
Instant Messaging Security.cloud 26
Security Assessments 26
Functionalities 26
Risk Management 26
Application Security Assessments 26
Vulnerability Assessments 27
Threats Addressed 27
Challenges 27
Solutions Providers 27
VeraCode 27
Intrusion Management 28
Functionalities 28
Identification of intrusions and policy violations 28
Deep Packet Inspection 28
Threats Addressed 29
Challenges 29
Solutions Providers 30
Redware 30
DefensePro 30
Security Information and Event Management 30
Functionalities 31
Real-time event correlation 31
Forensics support 31
Threats Addressed 31
Challenges 32
Solutions Providers 32
Loglogic 32
LogLogic Cloud Security 32
SenSage 32
SenSage 4.6 33
Encryption 33
Functionalities 34
Protection of data in transit 34
Protection of data at rest 34
Key and policy management 34
Protection of cached data 35
Threats Addressed 35
Challenges 35
Solutions Providers 35
Cypher Cloud 35
CypherCloud for Office 365 36
Business Continuity and Disaster Recovery 36
Functionalities 36
Secure backup 36
Replicated infrastructure component 37
Threats Addressed 37
Challenges 38
Solutions Providers 38
Atmos 38
EMC Atmos 38
Network Security 38
Functionalities 39
Data Threats 39
Hackers 39
Malware 39
Virus 39
Worms 39
Trojan Horses 39
Spyware 40
Adware 40
Crimeware 40
SPAM 40
Phishing 40
Access Control Threats 41
Unauthorized/accidental disclosure 41
Unauthorized changes 41
Unauthorized Access 41
Threats Addressed 41
Challenges 42
Solutions Providers 42
Rackspace 42
Rackspace Cloud Security 42
Cloud Security Future Outlook 44
Proactive Application Monitoring 44
Enhanced Data center physical security 44
Enhanced Data Transfer Protection 44
Disaster Recover and the Cloud 44