UPDATED 09:36 EDT / JULY 06 2011

Empowering Cyber Security with Smart Cloud based Solutions

The cloud provides us the Cloud Paradigm; the proficiency to execute and leverage hardware and network technological revolutions. With today’s cloud technologies, businesses are running data centers, storage, communications, e-services, mobile platforms, back up and archive solutions, management etc. Using cloud services, software can be virtualized as a platform, with trends emerging around SaaS, PasS and IaaS.

But as more and more applications move to the cloud, there is a need and challenge for IT people to virtualize these applications and make them more secure. It brings business savings for overall IT costs, saving in local infrastructure needs, replaces bulky desktop clients to thin clients, and eliminates system patching and IT device remediation.

With cloud virtualization comes the increase risk of loss of control of data, and an increase cyber security threats. Non-secure APIs, not-so-robust and fragmented security models on authorization and access to cloud services, use of network switches, data confidentiality, physical security as well as security of data in the cloud are some of the things that could results in security vulnerabilities.

But business can adapt to the changing needs of the environment, in many cases leveraging the cloud for security as well.   Some of the methods businesses can look at include the following: force authentication in e-services, better control over identity management and encryption, stronger and better data protection mechanism, use of thin clients, enabling secure and enhanced API’s and interfaces, encrypted data stores procedures, and enhanced security in physical hardware.  There’s also emerging options to leverage SSL for web sites, maintaining confidentiality of storage data in cloud with no access to third party providers, providing physical security for cloud data centers and the logical isolation of cloud servers from cloud users, all ensuing a common, uniformed approach to cloud security.

Dr. Satwant Kaur, a management consultant and a leader in the IT industry, recently demonstrated a solution called LTE advanced (LTE-A) technologies for wireless devices. It works on six technologies: carrier aggregation to facilitate wide frequency bandwidth, multi-antenna technology to enable multiplexing, relays to assist extension of coverage and capacity, heterogeneous networks and orthogonal FDM.

Kaur believes this technology could transform cloud security to the next level, applied to several industries as well.  There’s vehicle positioning and crash prevention, wireless sensors for office management to reduce energy consumption, medical instruments to monitor exercise, heart rate and food are some practical applications that will empower and transform our lives in very near future.


Since you’re here …

… We’d like to tell you about our mission and how you can help us fulfill it. SiliconANGLE Media Inc.’s business model is based on the intrinsic value of the content, not advertising. Unlike many online publications, we don’t have a paywall or run banner advertising, because we want to keep our journalism open, without influence or the need to chase traffic.The journalism, reporting and commentary on SiliconANGLE — along with live, unscripted video from our Silicon Valley studio and globe-trotting video teams at theCUBE — take a lot of hard work, time and money. Keeping the quality high requires the support of sponsors who are aligned with our vision of ad-free journalism content.

If you like the reporting, video interviews and other ad-free content here, please take a moment to check out a sample of the video content supported by our sponsors, tweet your support, and keep coming back to SiliconANGLE.