Cover Image
市場調查報告書

雲端安全:企業及解決方案

Cloud Security 2014: Companies and Solutions

出版商 Mind Commerce 商品編碼 289773
出版日期 內容資訊 英文 45 Pages
商品交期: 最快1-2個工作天內
價格
Back to Top
雲端安全:企業及解決方案 Cloud Security 2014: Companies and Solutions
出版日期: 2014年07月01日 內容資訊: 英文 45 Pages
簡介

雲端安全是守護雲端資源及雲端運算環境保存的資料完整性的一連串安全通訊協定及技術。雲端安全與未把重點放在防止對特定機制存取的傳統電腦保安不同。

本報告套組,提供雲端運算模式、雲端運算所面臨的課題、雲端安全的最佳業務實踐及雲端安全產業上主要企業的分析、雲端運算環境相關資訊、包含架構與機能的一般雲端安全解決方案的重要安全組件概要、未來的雲端安全市場展望等彙整資料,為您概述為以下內容。

目錄

雲端運算概要

雲端運算模式

  • 儲存即服務
  • 資料庫即服務
  • 情報即服務
  • 商務流程即服務
  • 應用程式即服務
  • 平台即服務
  • 整合即服務
  • 安全即服務
  • 經營管理即服務
  • 測試即服務
  • 基礎設施即服務

雲端運算的優點

  • 可擴展性的擴大
  • 基礎設施成本低
  • 利用增加
  • 終端用戶生產率的改善
  • 可靠性的改善
  • 安全的改善
  • 省卻IT事務的配合措施
  • 獲取更高級的應用
  • 節能

雲端運算的課題

對不安全流通管道的機密資料洩漏

互通性的缺乏

應用兼容性

對應法令遵循的困難

不完全的安全

雲端供應商

  • 網路的隔離
  • 管理網路的隔離
  • 客戶資料網路的隔離
  • 客戶存取雲端型資源的保證
  • 雲端型資源的保證,持續備份及回復
  • 強力認證、核准及審核機制
  • 基本的OS、應用的保證、最新模板的程式庫

客戶安全的最佳業務實踐

雲端安全供應商

BARRACUDA

CARPATHIA

CISCO

CITRIX

EXPEDIENT

HYTRUST

MCAFEE

OPSOURCE

SAFENET

TRAPEZOID

VIRTUSTREAM

雲端安全的未來展望

專業活性應用監測

強化資訊中心實體安全

防止數據傳送的強化

災害復原與雲端

附錄:雲端、安全的理解

  • 雲端運算
  • 雲端運算之後:內容、應用、貿易及通訊
  • 內容
  • 應用
  • 貿易
  • 通訊
  • 雲端解決方案的類型
  • 私有雲端
  • 社群雲端
  • 公共雲端
  • 混合雲端
  • 雲端中整體安全的疑慮
  • DoS攻擊
  • 退信攻擊
  • 客制化
  • 媒體特定攻擊
  • 惡意程式碼入侵
  • 實例:安全應用和內容即服務
  • 應用程式商店的安全
  • 安全管理
  • ID管理
  • 認證、核准
  • 個別隱私
  • 資料儲存

本網頁內容可能與最新版本有所差異。詳細情況請與我們聯繫。

目錄

Cloud security is the set of security protocols and technologies that protect the cloud resources and the integrity of data stored in a cloud computing environment. Cloud security differs from traditional computer security in that it is not focused on preventing access to specific machines.

This research provides an evaluation of security in cloud computing environment including different types of cloud computing models and security challenges facing cloud computing companies/solutions. The report provides analysis of key security components of popular cloud security solutions. The report includes an evaluation of key players in cloud security industry. The report also provides a cloud security future outlook.

All report purchases include telephone time with an expert analyst who will help you link key findings in the report to the business issues you're addressing. This needs to be used within three months of purchasing the report.

Table of Contents

  • Cloud Computing and Cloud Security
  • Cloud Computing
  • Cloud Computing Models
  • Storage-as-a-service
  • Database-as-a-service
  • Information-as-a-service
  • Business-Process-as-a-Service
  • Application-as-a-service
  • Platform-as-a-service
  • Integration-as-a-service
  • Security-as-a-service
  • Management-as-a-service
  • Testing-as-a-service
  • Infrastructure-as-a-service
  • Types of Cloud Services
  • Public Cloud
  • Private Cloud
  • On-premise Private Cloud
  • Externally hosted Private Cloud
  • Hybrid Cloud
  • Community cloud
  • Heterogeneous cloud
  • Cloud Computing Benefits
  • Expand scalability
  • Lower infrastructure costs
  • Increase utilization
  • Improve end-user productivity
  • Improve reliability
  • Increase security
  • Saving Effort for IT Tasks
  • Gain access to more sophisticated applications
  • Save energy
  • Elements of Cloud Protection: Policy, Identity, Information, and Infrastructure
  • Policy
  • Identity
  • Information
  • Infrastructure
  • Cloud Security (Categories, Challenges, and Service Providers)
  • Overview
  • Identity and Access Management (IAM)
  • Functionalities
  • Provisioning/de-provisioning of accounts:
  • Authentication
  • Directory services
  • Web SSO
  • Fraud Prevention
  • Authorization
  • User profile Management
  • Threats Addressed
  • Security Challenges
  • Solutions Providers
  • Novell Cloud Security Services
  • Gemalto
  • Protiva Cloud Confirm
  • SafeNet
  • SafeNet certificate-based authenticators
  • SafeNet Hardware Security Module
  • Data Loss Prevention
  • Functionalities
  • Identification of Sensitive Data
  • SQL regular expression detection
  • Real Time User Awareness
  • Threats Addressed
  • Challenges
  • Solutions Providers
  • Websense
  • Websense Cloud Web Security
  • Web Security
  • Functionalities
  • Web Filtering
  • Instant Messaging Scanning
  • Email Security
  • Bandwidth Control
  • Threats Addressed
  • Challenges
  • Solutions Providers
  • TrendMicro
  • Deep Security Solution
  • zScaler
  • Cloud Application Security
  • Email Security
  • Functionalities
  • Accurate filtering to block spam and phishing
  • Virus Protection
  • Threats Addressed
  • Challenges
  • Solutions Providers
  • Symantic.Cloud
  • Email Encryption.cloud
  • Email Security.cloud
  • Web Security.cloud
  • Instant Messaging Security.cloud
  • Security Assessments
  • Functionalities
  • Risk Management
  • Application Security Assessments
  • Vulnerability Assessments
  • Threats Addressed
  • Challenges
  • Solutions Providers
  • VeraCode
  • Intrusion Management
  • Functionalities
  • Identification of intrusions and policy violations
  • Deep Packet Inspection
  • Threats Addressed
  • Challenges
  • Solutions Providers
  • Redware
  • DefensePro
  • Security Information and Event Management
  • Functionalities
  • Real-time event correlation
  • Forensics support
  • Threats Addressed
  • Challenges
  • Solutions Providers
  • Loglogic
  • LogLogic Cloud Security
  • SenSage
  • SenSage 4.6
  • Encryption
  • Functionalities
  • Protection of data in transit
  • Protection of data at rest
  • Key and policy management
  • Protection of cached data
  • Threats Addressed
  • Challenges
  • Solutions Providers
  • Cypher Cloud
  • CypherCloud for Office 365
  • Business Continuity and Disaster Recovery
  • Functionalities
  • Secure backup
  • Replicated infrastructure component
  • Threats Addressed
  • Challenges
  • Solutions Providers
  • Atmos
  • EMC Atmos
  • Network Security
  • Functionalities
  • Data Threats
  • Hackers
  • Malware
  • Virus
  • Worms
  • Trojan Horses
  • Spyware
  • Adware
  • Crimeware
  • SPAM
  • Phishing
  • Access Control Threats
  • Unauthorized/accidental disclosure
  • Unauthorized changes
  • Unauthorized Access
  • Threats Addressed
  • Challenges
  • Solutions Providers
  • Rackspace
  • Rackspace Cloud Security
  • Cloud Security Future Outlook
  • Proactive Application Monitoring
  • Enhanced Data center physical security
  • Enhanced Data Transfer Protection
  • Disaster Recover and the Cloud
Back to Top