Five Burning Security Issues in Cloud Computing

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Five Burning Security Issues in Cloud Computing-7

As companies accelerate their adoption of cloud technologies – like infrastructure as a service (IaaS) or software as a service (SaaS) – the need for solutions that provide secure access and reliable operations in the cloud increases in importance. A top area of concern is defending applications from distributed-denial-of-service (DDoS) attacks. Any plan to move to the cloud should include a plan for dealing with the pervasive and growing threat that DDoS present. In this slideshow, Bill Lowry, director of cloud services at Radware, takes a look at some of the burning issues you should look for when adopting a DDoS mitigation strategy for a cloud-based solution.

Bill Lowry is director, Cloud Services at Radware, where he leads strategic sales engagement and evangelism for Radware’s industry-leading products and services for co-location, hosting, managed service, and cloud providers. Lowry has more than 20 years of experience integrating security, network and data center technologies into solutions for service providers and Fortune 500 enterprises, with leadership roles at companies including Terremark, Verizon, Arista Networks, Brocade, and Apple.


Related Topics : IBM Looks to Redefine Industry Standard Servers, APC, Brocade, Citrix Systems, Data Center

More Slideshows

Holiday20-190x128 5 Ways to Protect Your Data Center from a 'Zombie' Server Attack

It's easy to forget about the ghosts of servers past that are hiding in the background, continuing to consume electricity and potentially exposing organizations to malicious attacks. ...  More >>

cloud50-190x128.jpg How to Use the Cloud to Become a High-Velocity Business

Cloud SaaS adoption allows organizations to gain the flexibility and scalability necessary for creating a high-velocity business. ...  More >>

DynCloudInternetVisibility0x 8 Reasons the Enterprise Needs More Visibility into the Cloud

IT executives need the right tools to monitor and control their cloud infrastructure to maximize the positive impacts and mitigate security threats. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.