Cloud-based Computing Security Requires Adapting

A recent survey by the IT research and advisory firm Gartner reveals that there's more potential for cloud-based computing to be safe compared to whatever companies in general are able to provide. Gartner published this on December 16, 2010.

Actually 'safety' broadly comprises infrastructure security, application security, content security, identity along with access supervision, and vulnerability supervision. And as conventional anti-malware get more and more dated, it becomes increasingly important that security software developers adjust the security within offerings of the cloud for making sure they're able to tackle an ever-increasing number of fresh threats.

Notably, Gartner's survey recognizes the top problem related to security as the absence of self-assurance within the security abilities of the suppliers of cloud. The firm used database from December 2009-December 2010.

Says Neil MacDonald blogger for Gartner, signature-based anti-malware safeguards are fast becoming ineffective since today's malicious programs exploit weaknesses in signatures and a growing number of personalized assaults that are motivated with financial reasons. One Stop Click published this on December 24, 2010.

MacDonald further stated that while the above didn't mean that anti-virus software was no longer useful, it merely implied that anti-malware safeguards required becoming something that had multiple strands.

According to him, all that it implied was that end-points couldn't any longer be safeguarded with just signature-based technologies, but be also done so with an amalgamation of techniques like behavioral-based solutions, blacklisting and white-listing, functioning together like one single system. Gartner published this on December 23, 2010.

Moreover, it's for the above reason that researchers put together individual research streams related to consumer anti-viruses, firewalls and anti-spyware inside Endpoint Protection Platform as Garnet named it.

Eventually, MacDonald stated that more-and-more updates and patches were required during vulnerability supervision that could be easily managed within the cloud.

Additionally, specialists stated that unaltered malicious software could be efficiently detected with signature-based solutions, but as many new variants of malicious programs emerged, signatures weren't any longer sufficient for maintaining end-users' systems safeguarded. Today behavior-based smart AVs were required; however, several anti-virus providers were already beginning to introduce behavior-based detection keeping in mind the requirement of desktops.

Related article: Child Porn Lands Man in Jail

» SPAMfighter News - 04-01-2011

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Exchange Anti Spam Filter
Go back to previous page
Next