Dr. Dobb's is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Channels ▼


Building Trust In The Public Cloud

Cloud Security Alliance member AEP Networks claims that its new Security-as-a-Service offering is an "industry first" approach for cloud service providers looking to secure the inherently shared nature of public cloud services. Aiming to accelerate the adoption of secure cloud services hosted in the public cloud, the company says that it is answering the call for policy protection by removing prohibitive cost barriers with a new pricing model.

Offered on a pay-as-you-go basis, AEP claims that CloudProtect will allow managed service providers to bolster their cloud service models with security that will scale up to hundreds of thousands of users if needed.

The company's market proposition suggests that service providers will be able to offer newly secured services immediately, such as secure remote access to key applications, thanks to the upfront elimination of capital expenditure and licensing costs.

"The reputation of the public cloud has suffered somewhat over the years, and rightly so. Throwing data into an abyss and hoping for the best is no method to securing your data. However, companies are getting smarter and looking to service providers to provide them with the peace of mind that their data is secure," said Mark Darvill, director at AEP Networks.

AEP says that CloudProtect enables every device looking to access applications to be checked for full compliance with security standards. It assigns each device with an authorization fingerprint defining the security posture, ensuring that only safe devices can access an application.

"With stringent endpoint policies, CloudProtect removes the danger of an unauthorised device connecting to the cloud environment. Equally, users will be given the freedom to use their own printing facilities for the first time, in line with company policy," says AEP.

The validity of AEP Networks' "industry first" claim may be somewhat in question with vendors such as Novell also making announcements on product launches in the same area as recently as last week.

According to Novell, "With Novell Cloud Security Service, enterprises can quickly and easily extend their identity infrastructure to any public cloud. Any changes that are made to their users or permissions are immediately replicated in the cloud environment, thus ensuring one consistent identity and security framework for the enterprise, regardless of where the computing is actually taking place."

This public (and private for that matter) cloud security market is clearly in a state of tremendous flux right now with technology vendors all looking to gain as much recognition as possible. The true worth of any single solution will no doubt be borne out in the fullness of time as user adoption and natural selection start to have their full effect.

Related Reading

More Insights

Currently we allow the following HTML tags in comments:

Single tags

These tags can be used alone and don't need an ending tag.

<br> Defines a single line break

<hr> Defines a horizontal line

Matching tags

These require an ending tag - e.g. <i>italic text</i>

<a> Defines an anchor

<b> Defines bold text

<big> Defines big text

<blockquote> Defines a long quotation

<caption> Defines a table caption

<cite> Defines a citation

<code> Defines computer code text

<em> Defines emphasized text

<fieldset> Defines a border around elements in a form

<h1> This is heading 1

<h2> This is heading 2

<h3> This is heading 3

<h4> This is heading 4

<h5> This is heading 5

<h6> This is heading 6

<i> Defines italic text

<p> Defines a paragraph

<pre> Defines preformatted text

<q> Defines a short quotation

<samp> Defines sample computer code text

<small> Defines small text

<span> Defines a section in a document

<s> Defines strikethrough text

<strike> Defines strikethrough text

<strong> Defines strong text

<sub> Defines subscripted text

<sup> Defines superscripted text

<u> Defines underlined text

Dr. Dobb's encourages readers to engage in spirited, healthy debate, including taking us to task. However, Dr. Dobb's moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing or spam. Dr. Dobb's further reserves the right to disable the profile of any commenter participating in said activities.

Disqus Tips To upload an avatar photo, first complete your Disqus profile. | View the list of supported HTML tags you can use to style comments. | Please read our commenting policy.