Relevant key for good security in the Cloud

Automatique Translation powered by Google Traductor


The Cloud Computing is the new paradigm which will continue to steadily moving IToperations over the next few years. In this sense, the market research firm Gartnersays that by 2014, cloud computing will reach a turnover of 150 billion dollars annually, which represents three times the amount invested in 2009.

The reasons for this phenomenon are various. In markets like North America and Europe, adoption has to do primarily with the emergence of new regulatory frameworks within organizations, which demand greater operational efficiency, reduced resource consumption and availability. But in regions like Latin America, the advancement of Cloud Computing is also explained in part on other grounds that are associated primarily with the cost advantages that this new model.

When implementing a project of Cloud Computing, IT executives are faced with a series of challenges that are, so far unpublished. CIOs, who historically were responsible for ensuring information security, stability of services and compliance with regulations and internal processes, they face a new scenario in which these tasks are demanding an external service provider From this new mode of operation, IT managers become a sort of auditors are responsible for selecting the most appropriate providers and to require compliance with the terms and conditions of contract.

What should demand professionals who lead the field of systems? Essentially, the same as they always sought to obtain for the stability and security in their business: constant visibility to know, at every moment what is happening with the operations of the company.

While many wonder about the safety standards that are handled in the cloud, the truth is that what is changed is not the yardstick by which we measure the strength of the applications, but how to organize operations. Migrating to Cloud Computing requires corporations require exactly the same controls that apply in an internal operation. In fact, when a company moves its infrastructure to the cloud, the expectations in terms of safety need not be lower, however, may even increase.

Migration to the cloud has become a business necessity in which the return on investment, maximizing available resources and reducing the environmental impact of operations are key factors. Today, many organizations choose to move their infrastructure to cloud environments based on these variables. However, at the same time, they must take into account that there are other aspects, such as increased mobility, which also constitute an impetus for the adoption of this new paradigm.

In a world moving increasingly towards a fully mobile operations scheme, managing cloud infrastructure is key to provide high availability and benefit from increased productivity. In this context, the security appears as a recurring question, however, can not be a barrier to stop a development that is necessary. Of course, the increased mobility and, consequently, the flow of information require special attention to real-time monitoring of operations. In this new stage, and no matter what device is both access to information, it is important to properly determine who gets access.

One of the new key, then, must be placed in the proper handling of identities.Another key point is to sue the providers a degree of visibility that would achieve a standard that equates the control can be achieved in internal operations. If organizations put the focus on these issues, without a doubt going to make huge profits from the increased flexibility, dynamism and efficiency offered by the Cloud Computing.