Hybrid Security for Hybrid Cloud – Securing a hybrid cloud, poses great challenges. Not only for the users but also for the providers, it is not enough simple. The title Hybrid Security for Hybrid Cloud is actually not limited to the literal meaning but crosses that margin.
Hybrid Security for Hybrid Cloud : The Secure Web Gateway
The main entry point for malware are the potential gaps in Internet access. Web gateways work as URL filtering, malware scanners etc. Actually this part of Hybrid Security for Hybrid Cloud, that is the secure web gateway will not be discussed in this article as Cloud Storage Gateway and Secure Web Gateway has been discussed as a part of Secure Cloud Computing Guide.
Companies like Cisco with Products like appliances, IronPort S-Series, ScanSafe Services implemented in Cisco corporate users. BlueCoat offers Proxy SG, as an on-premise solution, Websense is distinguished by its data-leak prevention products.
---
Secure Web Gateway : Secure virtualization
Here it is about the hypervisor, the virtualization, the ability to survive and to prevent malicious traffic between the virtual machines. he security and virtualization experts from Bromium have largely worked previously for Citrix and developed a desktop security solution that virtualizes the activities of end users when external programs or malware attempting system access. VSecurity 5.0 provides access control, intrusion detection, secure auditing, automatic protection, visibility and control of efficiency for all virtual machines because it has direct access to the hypervisor.
Security Incident and Event Management (SIEM)
The amount of data that is generated by the log management system, to keep them under control, in turn, own tools are required. Hybrid cloud infrastructures increases the amount of information in addition to the external portion by the part of the service provider. For Security Incident and Event Management (SIEM), therefore a lot of experience is required, as well as evidenced by the fact that by now almost exclusively to play the big business of a role – even if they have paid for their position rather than own efforts. HP has settled the makers of ArcSight after taking over in the “Enterprise Security” division, NitroSecurity was known for its advanced correlation engine, which combined rule-based links with risk-based activity profiles. In addition a very good performance came in larger networks.
Identity and Access Governance (IAG)
A turnover of 300 million obtained estimates for the past year from a growth of up to 40 percent. Identity and Access Governance products manage all access, certification and auditing process to applications, data and other IT services. Courion stands out with a structured development process that allows integration with third-party solutions.