Internet Security Beyond the Cloud

What to expect in 2017 from cloud based data security services

Internet Security Beyond the Cloud

With choices between hybrid and public, regional or great players, SaaS, IaaS or PaaS is also managing your cloud services is a lot more complicated. Therefore, we see the advance of CMaaS in 2017 or Cloud-Monitoring-as-a-Service. With CMaaS do you do a job on a separate service provider to the overview over your cloud environment. Performance, cost and any problems are immediately detected and passed on to the responsible.

Open source revives

Although Open Stack – the market leader in open source IaaS – got big hits this year, open source in the cloud is very much alive. Microsoft recently announced more open source solutions in the cloud, and Google joined the Cloud Foundry Foundation. Open source is a way to get customers more flexibility, scalability, affordability and cloud services providers to offer grab that chance eagerly. It is the cornerstone of cloud computing and cloud based vpn services.

Battle for the cloud

On enterprise-level companies that choose to invest in a on-premise infrastructure, can ever think of next year. The leading cloud service providers – Amazon, Microsoft, IBM and Google – the big companies want to make it as easy as possible. Thus, Microsoft admitted that T-Systems a German version of Azure manages to get the local privacy laws to respect and Amazon makes it possible to massive amounts of data faster to the cloud to locks with trucks. The great cloud service providers to win the concessions do many hard competition, and that is not otherwise in 2017.

Switch between providers

Switch between cloud service providers is currently not done often, but that may change in the future. Now the cloud, and companies know more about what they need from a provider, they have more knowledge to compare. Cloud service providers will be stronger than ever compete to attract the right customers, and make it as easy as possible to move workloads. Flexibility is a priority.

Containers provide for less cost

The concept of containers is far from established everywhere, but will not now. Research firm Forrester predicts that containers in 2017 will be available on most cloud platforms. With containers can be packed to light and easily transportable software packages. That you can save money: hundreds of ‘ packets ‘ may exist on one host, what containers much cheaper than virtual machines. Simplistic, this means that you can run more in the cloud, for less money.

Massive data on telephone and internet use save is prohibited, so yesterday was decided by the European Court of Justice. In the judgment is described that internet service providers and telecom operators no data from random citizens must keep track over a longer period, since so “very precise conclusions can be drawn about the private life of the persons from whom the data have been saved”. That reports Reuters.

Save duty against terrorism

Such data retention was previously encouraged by public authorities in the fight against terrorism. The United Kingdom recently introduced the Investigatory Powers Act – baptized the Snooper’s Charter by critics – that internet and telecom providers obligated the dates of their users for one year. Police and security services would as good as unlimited access to the data, in order to identify criminals and suspects. In 2014, a similar European data retentiewet also frowned upon by the Court of Justice.

Since the attacks in Paris, Brussels and Berlin is there debated the balance between privacy and security. Security services call for more control over data in order to prevent such incidents, while defenders of privacy strictly reject such practices.

“Constant surveillance”

The Court considers that the General preservation of data has no place in a democratic society. The users whose data is tracked would feel “that that their lives are subject to continual surveillance”, the judgment read. In other words, a general data retention is frowned upon, but there is room left for alternatives. The storage and retrieval of data is allowed for specific persons suspected of planning or carrying out serious crimes. In this case, security services request permission to query the data.