Lead Image © Tomasz Pacyna, 123RF.com

Lead Image © Tomasz Pacyna, 123RF.com

Into the Cloud for Security


Article from ADMIN 49/2019
I still remember the day in the not too distant past when someone told me that Linux wasn't allowed on the network.

I still remember the day in the not too distant past when someone told me that Linux wasn't allowed on the network. I can remember the day when someone told me that he didn't want Windows 95 on his network because he thought it was "too chatty," and so he stuck with Windows 3.11 for probably two or three more years. In the very recent past, someone – actually multiple someones – told me that to put anything in the cloud was "just asking for trouble." My, oh my, how times have changed. It isn't that I love being right. OK, so maybe I do love being right – about technology. (Apologies to my wife for believing that I'm actually right about anything else.) I do, however, love being right about certain things: Linux, Windows operating systems that evolved beyond Windows 3.11, and the cloud.

You see, multiple years ago I embarked on a dangerous journey stating that someday all computing would be in the cloud. That's right. Our servers, or workloads as they would be called (right about that one), our workstations (Chromebooks come pretty close – I'm counting it), and yes, even the most ridiculous of all my prognostications, security would be in the freaking cloud! It doesn't sound radical now, but in 2012, it could get you physically abused to utter such a preposterous notion out loud. I dared to utter it, and now, it has come to pass.

Do you realize that it's actually better now to have your security in the cloud than on premises? It's true. If you don't believe me, google it. You know how to google, don't you? Just put your paws on the keyboard and type S-E-C-A-A-S. Security as a Service (SECaaS) is an actual thing. Companies are heading to the cloud for security in huge numbers. Whether you call it SECaaS or Software as a Service (SaaS) security, the result is the same: Real-time data analytics finding and blocking threats from your very vulnerable network has made traditional perimeter-based security and signature-based

Use Express-Checkout link below to read the full article (PDF).

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy ADMIN Magazine

Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • Fathoming the cloud
    Much spoken of but little understood, "the cloud" poses new security problems that need to be defined and debated and their solutions facilitated.
  • Kaspersky Releases PURE 2.0 Total Security
  • Insider Threats
    In the sys admin chagrin basket, users are the greatest source of our collective distress.
  • First Malware for macOS in 2018
  • Welcome to ADMIN
    Woe unto us who try to hang on too dearly to the past for we shall experience the darkness that is to come. OK, so a great prophet I'm not, but my prophetic words ring true when we tarry too long in the complacence of our old, tired operating systems. But, know this: Even if you do hang onto your old operating systems for a bit too long, there's no impending apocalypse awaiting you – at least not in the short term.
comments powered by Disqus