{"id":4239,"date":"2012-10-18T11:30:00","date_gmt":"2012-10-18T11:30:00","guid":{"rendered":"https:\/\/cloudcomputing.sys-con.com\/node\/2402550"},"modified":"2012-10-18T11:30:00","modified_gmt":"2012-10-18T11:30:00","slug":"security-and-control-in-the-cloud-2","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/security-and-control-in-the-cloud-2\/","title":{"rendered":"Security and Control in the Cloud"},"content":{"rendered":"<p>Cloud computing is so alluring. The public cloud economizes infrastructure resources and creates a scalable, on-demand source for compute capacity. Additionally, the cloud can be a strategic asset for enterprises that know how to migrate, integrate and govern deployments securely.<br \/>\nApple co-founder, Steve Wozniak recently said, &#8220;A lot of people feel &#8216;Oh, everything is really on my computer,&#8217; but I say the more we transfer everything onto the web, onto the cloud, the less we&#8217;re going to have control over it.&#8221;<br \/>\nIn fact, over 70% of IT professionals worry about security according to an IDG Enterprise Cloud Computing Study.<br \/>\nBoiled down, security, access and connectivity are really issues of control.<br \/>\nAs any prudent cloud user, the application has its own unique security features, such as disk encryption and port filtering. But do these layers of security features overlap or conflict? What happens to ownership after migration? Do solutions really have to be architected before and after deployment? <\/p>\n<p><a href=\"https:\/\/cloudcomputing.sys-con.com\/node\/2402550\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cloud computing is so alluring. The public cloud economizes infrastructure resources and creates a scalable, on-demand source for compute capacity. Additionally, the cloud can be a strategic asset for enterprises that know how to migrate, integrate and&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-4239","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/4239","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=4239"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/4239\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=4239"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=4239"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=4239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}