Top 5 Security Perils of Forcing Applications onto the Cloud

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6
Previous Top 5 Security Perils of Forcing Applications onto the Cloud-1 Next

Click through to learn more about the risks of moving traditional apps to the cloud.

Applications are typically built from the ground up using programming languages, such as PHP, JAVA or .NET by an internal development team or a third-party vendor with “For Internal Use Only” in mind.  There has been a general assumption by development teams that users can always be trusted, the application will be used “as intended,” and all information (i.e., user data) and content (i.e., product data from databases or ERP systems) are coming from safe and secure sources.

As cloud computing becomes more favorable among companies, they are forcing their applications out of the internal network into the cloud, causing them to be vulnerable to Web threats.  If the application, or part of the application, is moved into the cloud, there will be typically less security within the infrastructure and several more users will be accessing it.  Therefore, vulnerabilities turn up and hacks occur.  The following are typical challenges enterprises face when moving an application to the cloud, prepared by security vendor Art of Defence.
 

Related Topics : Cloud Computing, Dell, Services Vendors, SMBs, Web Platform Vendors

 
More Slideshows

cloud51-190x128 5 Best Practices for Managing Zombie Cloud Infrastructure

IT administrators need to identify zombie assets, verify idle status and shut off anything that is unused. Here's how to get your dormant infrastructure back in shape. ...  More >>

cloud50-190x128.jpg How to Use the Cloud to Become a High-Velocity Business

Cloud SaaS adoption allows organizations to gain the flexibility and scalability necessary for creating a high-velocity business. ...  More >>

DynCloudInternetVisibility0x 8 Reasons the Enterprise Needs More Visibility into the Cloud

IT executives need the right tools to monitor and control their cloud infrastructure to maximize the positive impacts and mitigate security threats. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.