fbpx Skip to content

Intrusion Detection on Public IaaS. Cloud computing is driving the business of IT.

Joey van Kuilenburg

Intrusion Detection on Public IaaS

Intrusion Detection on Public IaaS

Cloud computing is driving the business of information technology today.
“A recent Gartner survey on the future of IT services found that only 38 percent of all organizations surveyed indicate cloud services use today. However, 80 percent of organizations said that they intend to use cloud services in some form within 12 months, including 55 percent of the organizations not doing so today.“ (Gartner, Inc, 2013)
As companies rush to adopt cloud, however, information technology (IT) security sometimes seems to be an afterthought.
The goal of this paper is to provide a survey of the current state of IT security within public cloud infrastructure-as-a-service providers. After first providing a cloud computing overview, the paper will focus on the infrastructure-as-a-service (IaaS) deployment model, the typical home of IaaS intrusion detection components. The Gartner Cloud Use Case Framework will then be introduced as it will also serve as the framework for this survey. An in-depth review of public cloud intrusion detection studies, options and expert observations will then follow. The paper will then offer the authors conclusions and cloud computing IDS recommendations for enterprises considering a move to the cloud.


Connect

Kevin Jackson is a senior information technologist specializing in information technology solutions that meet critical Federal government operational requirements. Prior positions include VP & General Manager Cloud Services for NJVC, VP Federal Systems at Sirius Computer Solutions, Worldwide Sales Executive at IBM, Vice President Global IT Project Office at JP Morgan Chase, and CTO at SENTEL Corporation.

About the Author

Joey is a marketer who prefers to put in a bit of extra work to make an “ok” product or experience an amazing product or experience.

Never miss an interesting article

Get our latest news, tutorials, guides, tips & deals delivered to your inbox.

Please enter your name.
Please enter a valid email address.
Please check the required field.
Something went wrong. Please check your entries and try again.

Keep learning

A Massive Influx Into Remote Work Creates an Opportunity for Hackers

A Massive Influx Into Remote Work Creates an Opportunity for Hackers

While the coronavirus pandemic has infected millions of people worldwide, sending people back to work and study from home, these new habits could benefit cybercriminals....
jurian article

ITIL® 4, Why Should You? What’s New?

By 2019, when ITIL® 4 was finally launched, ITIL had been the leading guidance for IT Service Management for the past three decades. Millions of...
PCD-444

Knowledge Byte: Designing the Cloud to Expect Failure

Designing software for failure is an extra barrier to overcome but isn’t too hard, and it certainly pays off. Largely, it boils down to make...
The-best-online-coures-2

COVID-19 Response

Digital transformation has never been more relevant than today. Until the end of June, we offer all our industry-recognized certification courses for 50% off. Improve your skills and stand out from the crowd.

Scroll To Top
Tweet
Share
Share