SHARE
Facebook X Pinterest WhatsApp

Securing the Cloud: How Safe Is that Data?

As more and more companies embrace cloud computing for their IT business needs, the question becomes how secure is the data that in some cases may reside thousands of miles away? A company using SAAS (software as a service) CRM, ERP or data backup applications not only wants to be sure the data outside its […]

Written By: Pedro Pereira
Dec 4, 2008
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

As more and more companies embrace cloud computing for their IT
business needs, the question becomes how secure is the data that in
some cases may reside thousands of miles away?

A company using SAAS (software as a service) CRM, ERP or data backup
applications not only wants to be sure the data outside its network
perimeter is secure but also that the myriad access points to the
information are well-guarded and resistant to tampering or intrusion.
The same goes for environments where applications are hosted in the
cloud but modified at a customer’s location for specific uses.

"As with anything Web-based, there are many challenges with securing IT
environments operating within, or as part of, a cloud computing
infrastructure," says Gunter Ollman, chief security strategist at IBM
Internet Security Systems.


Is all this talk about cloud computing just a lot of condensed air? Read about it here.


The challenges, Ollman adds, include making sure that security follows
"workloads," or data, as they move around the cloud; securing domains
at the network, server and storage levels; and identifying and managing
users and administrators of the cloud infrastructure to put the right
controls in place.

Doug Howard, chief strategy officer at Perimeter eSecurity, a provider
of security-in-the cloud services, says the cloud security challenge
arises from the multi-tenant environments built by technology providers
to meet customer requirements that differ from company to company.

Providers rely on public application program interfaces (APIs) to
integrate with customer systems. "This creates a situation where the
bad guys now have an easy way of exploiting vulnerabilities within the
service that will apply across the entire platform and against all
customers," he says.


Handling the complexity

There is plenty of complexity to contend with, as data moves between
various access points. Transmissions take place between data centers
where applications reside, or information is stored and backed up, and
the corporate users who are accessing data from within firewalls or
through VPNs. A variety of third parties, such as suppliers, partners
and customers, have access to some of that information.

"The security challenge with cloud computing is the massive amount of
variables introduced," says Chris Squier, a tech support engineer at IT
distributor Ingram Micro. "Liken it to sci-fi, and the first astronaut
who lands on an uncharted alien planet. What’s out there? How can we
use our very limited knowns to protect against massive unknowns, like
being eaten by the foliage? Can we protect that astronaut?"

Recommended for you...

Keepit Achieves SOC 2 Type 1 & Canadian Ingram Micro Deal
Jordan Smith
Aug 20, 2025
AI Customer Service Fails to Satisfy Consumer Needs: Verizon
Franklin Okeke
Aug 19, 2025
GoTo Pulse Survey Shows AI Promise, Highlights Gaps to Fill
Victoria Durgin
Aug 19, 2025
Deepgram Teams With AWS on Voice AI Deployment
Jordan Smith
Aug 19, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.