SlideShare une entreprise Scribd logo
1  sur  13
CAN CLOUD
SOLUTIONS
TRANSFORM
NETWORK
SECURITY?
When cloud computing was first
introduced to the world, it received
a lot of scepticism in terms of
reliability and security. It even
produced a notable meme saying
the cloud is just someone else’s
computer, which is technically
true. But cloud computing today
has become an integral part of
network security. In fact, cloud
computing has benefited
businesses in many ways:
The Cloud is having a Measurable
Impact on Business
Average reduction
in operational costs
Average reduction
in IT spencing
Average reduction in
IT maintenance costs
16.18%
15.07%
16.76%
20.66%
19.63%
18.80%
Average improvement
in time to market
Average increase in
process efficiency
Average increase in
company growth
7 Ways Cloud Computing
Transforms Network
Security
Cloud computing brings many network security advantages to any
organization, big or small. Technically speaking, since the cloud is
“someone else’s computer”, there’s an inherent transference of risk
for many organizations to the Cloud Service Provider (CSP).
If an organization is transferring a good amount of its IT operations,
security, and storage to a CSP, there need to be certified network
defenders on site. They are the ones that will make sure the CSP will
deliver these advantages to each client.
1. Protection against DDoS
Attacks
While no CSP is immune to DDoS attacks, there
are some that can absorb and disperse these
attacks to help minimize the impact.
2. Regulatory
Compliance
Since many CSPs can have a variety of customers,
they often opt to become compliant with many
national and international regulations so they are
ready should a potential client be in the market of
a CSP.
3. Flexibility
It’s more than likely that whatever service level you choose with
the CSP, expandability will be included. For example, if you
have a surge in storage or processing needs, it will
automatically become available to you. Granted, you might get
charged for that extra use, but at least you wouldn’t have any
crashed servers or downtime.
4. Patches and Updates
Again, depending on which service level you choose, the CSP
can manage software/hardware patches and updates for you.
Even if you managed it yourself, it would still be a much more
efficient process.
5. Physical Security
Since CSPs host many clients’ data, their physical security needs to be
very strong. So much to the degree that a small to medium business
most likely wouldn’t be able to have that amount of security. Plus, they
would be breaking the basic security principle of having “just enough”
security. Essentially, the CSP physical security costs are split between
all the tenants.
6. Data Security
Just like with physical security, the costs of strong data security are
essentially shared between the tenants of a CSP. A great perk of this is
implementing multi-factor authentication. A small- to medium-sized
business might not have the resources to implement this on-site, so
they can certainly take advantage of this via their CSP.
7. High Availability and
Support
Again, a small- to medium-sized business won’t be able to
provide the level of availability that can be offered through a
CSP.
Difference between
Cloud Security and Network
Security
Cloud Security
Cloud security is evolving, and it forms part of
network security and information security.
Fundamentally, the cloud security refers to a
broad set of technologies, controls, and
policies. These are used to secure and protect
data, applications, and cloud infrastructure.
Cloud security covers a broad range of security
practices from end-user and cloud service
provider (CSP) perspective. Though the end-
users are primarily concerned of the security
policy of CSP, they are equally concerned of
data storage and the access to the data on
cloud.
Network Security
Network security is a broader perspective
when compared to cloud security. It
encompasses policies, technologies,
controls, and procedures enforced by the
network security team. Moreover, the
objective of network security is to track
and control unauthorized access to the
network and its components. Basically, a
well-implemented network security can
block cyber attackers to intrude network
with malware, viruses, etc.
EC-Council’s Certified Network Defender (CND) trains network
administrators on protecting, detecting and responding to the
threats on the network. Since a network administrator already
has networking knowledge, the CND training course provides
the candidate with network defense fundamentals, the
application of network security controls, protocols, perimeter
appliances, secure IDS, VPN and firewall configuration,
intricacies of network traffic signature, analysis, and
vulnerability scanning.
Thank You for
Watching!
Want to learn Network Security
Join our next batch for
Network Security Certification
at EC-Council

Contenu connexe

Tendances

Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefing
technext1
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
Jimmy Saigon
 
Cloud security training, certified cloud security professional
Cloud security training, certified cloud security professionalCloud security training, certified cloud security professional
Cloud security training, certified cloud security professional
Bryan Len
 

Tendances (20)

secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfsecureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
 
Data Center Security Challenges
Data Center Security ChallengesData Center Security Challenges
Data Center Security Challenges
 
3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
cloud Resilience
cloud Resilience cloud Resilience
cloud Resilience
 
Cloud Security Governance
Cloud Security GovernanceCloud Security Governance
Cloud Security Governance
 
Top reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeTop reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | Sysfore
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefing
 
Midsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: Cybersecurity
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
User Behavior based Anomaly Detection for Cyber Network Security
User Behavior based Anomaly Detection for Cyber Network SecurityUser Behavior based Anomaly Detection for Cyber Network Security
User Behavior based Anomaly Detection for Cyber Network Security
 
Cloud security training, certified cloud security professional
Cloud security training, certified cloud security professionalCloud security training, certified cloud security professional
Cloud security training, certified cloud security professional
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
 
Msft cloud architecture_security_commonattacks
Msft cloud architecture_security_commonattacksMsft cloud architecture_security_commonattacks
Msft cloud architecture_security_commonattacks
 
Software Security
Software SecuritySoftware Security
Software Security
 
Disaster recovery
Disaster recoveryDisaster recovery
Disaster recovery
 
Practice case legal for data professional
Practice case legal for data professionalPractice case legal for data professional
Practice case legal for data professional
 

Similaire à Can Cloud Solutions Transform Network Security

An approach for secured data transmission at client end in cloud computing
An approach for secured data transmission at client end in cloud computingAn approach for secured data transmission at client end in cloud computing
An approach for secured data transmission at client end in cloud computing
IAEME Publication
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
David Spinks
 
10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT
Idan Hershkovich
 

Similaire à Can Cloud Solutions Transform Network Security (20)

Cloud Computing Security - Cloud Controls Security
Cloud Computing Security - Cloud Controls SecurityCloud Computing Security - Cloud Controls Security
Cloud Computing Security - Cloud Controls Security
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
 
Why Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business WorldWhy Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business World
 
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...
Research Report on Preserving Data Confidentiality & Data Integrity in ...
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
 
What is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptxWhat is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptx
 
Data Security and Privacy in Cloud Computing
Data Security and Privacy in Cloud ComputingData Security and Privacy in Cloud Computing
Data Security and Privacy in Cloud Computing
 
An approach for secured data transmission at client end in cloud computing
An approach for secured data transmission at client end in cloud computingAn approach for secured data transmission at client end in cloud computing
An approach for secured data transmission at client end in cloud computing
 
Cloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary TechnologyCloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary Technology
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
Facing the Future - Is the cloud right for you?
Facing the Future - Is the cloud right for you?Facing the Future - Is the cloud right for you?
Facing the Future - Is the cloud right for you?
 
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
 
What is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptxWhat is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptx
 
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdfTop Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
Pros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxPros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptx
 
10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT
 
Ccsw
CcswCcsw
Ccsw
 

Plus de EC-Council

Plus de EC-Council (20)

Skills that make network security training easy
Skills that make network security training easySkills that make network security training easy
Skills that make network security training easy
 
6 Most Popular Threat Modeling Methodologies
 6 Most Popular Threat Modeling Methodologies 6 Most Popular Threat Modeling Methodologies
6 Most Popular Threat Modeling Methodologies
 
Red Team vs. Blue Team
Red Team vs. Blue TeamRed Team vs. Blue Team
Red Team vs. Blue Team
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
Why Threat Intelligence Is a Must for Every Organization?
Why Threat Intelligence Is a Must for Every Organization?Why Threat Intelligence Is a Must for Every Organization?
Why Threat Intelligence Is a Must for Every Organization?
 
Why Digital Forensics as a Career?
Why Digital Forensics as a Career? Why Digital Forensics as a Career?
Why Digital Forensics as a Career?
 
Cryptography in Blockchain
Cryptography in BlockchainCryptography in Blockchain
Cryptography in Blockchain
 
A Brief Introduction to Penetration Testing
A Brief Introduction to Penetration TestingA Brief Introduction to Penetration Testing
A Brief Introduction to Penetration Testing
 
Computer Hacking Forensic Investigator - CHFI
Computer Hacking Forensic Investigator - CHFIComputer Hacking Forensic Investigator - CHFI
Computer Hacking Forensic Investigator - CHFI
 
Pasta Threat Modeling
Pasta Threat ModelingPasta Threat Modeling
Pasta Threat Modeling
 
Blockchain: Fundamentals & Opportunities​
Blockchain: Fundamentals & Opportunities​Blockchain: Fundamentals & Opportunities​
Blockchain: Fundamentals & Opportunities​
 
Cybersecurity Audit
Cybersecurity AuditCybersecurity Audit
Cybersecurity Audit
 
Third Party Risk Management
Third Party Risk ManagementThird Party Risk Management
Third Party Risk Management
 
Types of malware threats
Types of malware threatsTypes of malware threats
Types of malware threats
 
What's new in​ CEHv11?
What's new in​  CEHv11?What's new in​  CEHv11?
What's new in​ CEHv11?
 
Business Continuity & Disaster Recovery
Business Continuity & Disaster RecoveryBusiness Continuity & Disaster Recovery
Business Continuity & Disaster Recovery
 
Threat Intelligence Data Collection & Acquisition
Threat Intelligence Data Collection & AcquisitionThreat Intelligence Data Collection & Acquisition
Threat Intelligence Data Collection & Acquisition
 
Most Common Application Level Attacks
Most Common Application Level AttacksMost Common Application Level Attacks
Most Common Application Level Attacks
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security Management
 
Cyber Threat Modeling
Cyber Threat ModelingCyber Threat Modeling
Cyber Threat Modeling
 

Dernier

Dernier (20)

NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 

Can Cloud Solutions Transform Network Security

  • 2. When cloud computing was first introduced to the world, it received a lot of scepticism in terms of reliability and security. It even produced a notable meme saying the cloud is just someone else’s computer, which is technically true. But cloud computing today has become an integral part of network security. In fact, cloud computing has benefited businesses in many ways: The Cloud is having a Measurable Impact on Business Average reduction in operational costs Average reduction in IT spencing Average reduction in IT maintenance costs 16.18% 15.07% 16.76% 20.66% 19.63% 18.80% Average improvement in time to market Average increase in process efficiency Average increase in company growth
  • 3. 7 Ways Cloud Computing Transforms Network Security Cloud computing brings many network security advantages to any organization, big or small. Technically speaking, since the cloud is “someone else’s computer”, there’s an inherent transference of risk for many organizations to the Cloud Service Provider (CSP). If an organization is transferring a good amount of its IT operations, security, and storage to a CSP, there need to be certified network defenders on site. They are the ones that will make sure the CSP will deliver these advantages to each client.
  • 4. 1. Protection against DDoS Attacks While no CSP is immune to DDoS attacks, there are some that can absorb and disperse these attacks to help minimize the impact.
  • 5. 2. Regulatory Compliance Since many CSPs can have a variety of customers, they often opt to become compliant with many national and international regulations so they are ready should a potential client be in the market of a CSP.
  • 6. 3. Flexibility It’s more than likely that whatever service level you choose with the CSP, expandability will be included. For example, if you have a surge in storage or processing needs, it will automatically become available to you. Granted, you might get charged for that extra use, but at least you wouldn’t have any crashed servers or downtime.
  • 7. 4. Patches and Updates Again, depending on which service level you choose, the CSP can manage software/hardware patches and updates for you. Even if you managed it yourself, it would still be a much more efficient process.
  • 8. 5. Physical Security Since CSPs host many clients’ data, their physical security needs to be very strong. So much to the degree that a small to medium business most likely wouldn’t be able to have that amount of security. Plus, they would be breaking the basic security principle of having “just enough” security. Essentially, the CSP physical security costs are split between all the tenants.
  • 9. 6. Data Security Just like with physical security, the costs of strong data security are essentially shared between the tenants of a CSP. A great perk of this is implementing multi-factor authentication. A small- to medium-sized business might not have the resources to implement this on-site, so they can certainly take advantage of this via their CSP.
  • 10. 7. High Availability and Support Again, a small- to medium-sized business won’t be able to provide the level of availability that can be offered through a CSP.
  • 11. Difference between Cloud Security and Network Security Cloud Security Cloud security is evolving, and it forms part of network security and information security. Fundamentally, the cloud security refers to a broad set of technologies, controls, and policies. These are used to secure and protect data, applications, and cloud infrastructure. Cloud security covers a broad range of security practices from end-user and cloud service provider (CSP) perspective. Though the end- users are primarily concerned of the security policy of CSP, they are equally concerned of data storage and the access to the data on cloud. Network Security Network security is a broader perspective when compared to cloud security. It encompasses policies, technologies, controls, and procedures enforced by the network security team. Moreover, the objective of network security is to track and control unauthorized access to the network and its components. Basically, a well-implemented network security can block cyber attackers to intrude network with malware, viruses, etc.
  • 12. EC-Council’s Certified Network Defender (CND) trains network administrators on protecting, detecting and responding to the threats on the network. Since a network administrator already has networking knowledge, the CND training course provides the candidate with network defense fundamentals, the application of network security controls, protocols, perimeter appliances, secure IDS, VPN and firewall configuration, intricacies of network traffic signature, analysis, and vulnerability scanning.
  • 13. Thank You for Watching! Want to learn Network Security Join our next batch for Network Security Certification at EC-Council