{"id":5950,"date":"2013-02-15T14:00:00","date_gmt":"2013-02-15T14:00:00","guid":{"rendered":"https:\/\/cloudcomputing.sys-con.com\/node\/2535305"},"modified":"2013-02-15T14:00:00","modified_gmt":"2013-02-15T14:00:00","slug":"when-is-a-stack-not-a-stack-when-its-unified-in-the-cloud-3","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/when-is-a-stack-not-a-stack-when-its-unified-in-the-cloud-3\/","title":{"rendered":"When Is a Stack Not a Stack? When It&#8217;s Unified in the Cloud"},"content":{"rendered":"<p>You&#8217;ve got SIEM, you employ log management. You even have access and or identity management. Each performs a specific security function for your enterprise, but unless they are working across all your information silos and collaborating their collective capabilities, you still might have vulnerability gaps&#8230;like a thoroughbred running with blinders.<br \/>\nWhile trawling the blogs, feeds and news I came across an analyst\u2019s article about best security practices in which he kept referring to \u201cthe stack.\u201d And by this, he meant a multitude of various solutions that address certain security needs and capabilities; everything from email filtering, firewalling, authenticating, credentialing, logging and intrusion detection, etc&#8230;<\/p>\n<p>And, if you read my blogs often enough, you know I am a big proponent of unified security. However, unified security is not a stack. It is easy to be confused as both look to utilize best of breed tools to prevent negative impact on IP assets. A stack references a number of technologies where each operates independently from one another. Single sign on by itself is a sufficient tool, but when operating alone in its own silo, important contextual information is lost.<\/p>\n<p><a href=\"https:\/\/cloudcomputing.sys-con.com\/node\/2535305\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>You&#8217;ve got SIEM, you employ log management. You even have access and or identity management. Each performs a specific security function for your enterprise, but unless they are working across all your information silos and collaborating their collectiv&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-5950","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/5950","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=5950"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/5950\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=5950"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=5950"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=5950"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}