It’s 6:00 a.m. on a Monday morning. You get an automated text from your security systems that a DDOS attack was attempted, but new security policies downloaded several hours earlier proactively protected the systems from the attacking IP address.

All is well. The alternative is not good—meaning that you had no idea of the DDOS attack, and now you’re playing cloud security whack-a-mole to fend off the attack until you can put more permanent solutions in place. Of course, other types of breaches could be much worse, in terms of their impact on the enterprise. [ Working with data in the cloud requires new thinking.
InfoWorld shows you the way: How Cosmos DB ensures data consistency in the global cloud. | Stay up on the cloud with InfoWorld’s Cloud Computing Report newsletter. ]

Proactive and automated security solutions are known as centralized trust.
Simply put, these are central repositories of security policies that are linked to local repositories in the enterprise cloud.

They may even contain centralized identities—things, processes, or people—that that can be centrally credentialed.To read this article in full or to leave a comment, please click here

Leave a Reply