@CloudExpo Authors: Yeshim Deniz, Liz McMillan, Pat Romanski, Zakia Bouachraoui, Carmen Gonzalez

Related Topics: @CloudExpo, Cloud Security

@CloudExpo: Blog Feed Post

Thin Clients, the Cloud, and Security

IT security is all about trying to lower risks and increase the protection of your organization

IT security is all about trying to lower risks and increase the protection of your organization. With each new technology that comes along, there’s a new security challenge. Some of those technologies – like wireless networks or the Internet – have such an impact on security that they turn the whole world on its head. Two of the most recent technological advancements that are impacting the security world are cloud computing and thin clients.

Are thin clients less vulnerable?

There are some who suggest that thin clients may be less vulnerable to security problems. Thin clients have simpler and tighter code, which should mean that there are fewer possible security exploits and fewer opportunities for bugs. Those things are certainly true, on some level.

Unfortunately, most thin clients use browser-based solutions to provide functionality to the end-users. Web browsers, unlike the thin clients themselves, are highly exploitable. Every browser has its security problems, and while you may find one browser that’s more secure than another, the risks tend to number in the hundreds.

Even the upcoming OS solutions for thin clients tend to rely on the browser, which takes that OS security we mentioned earlier and puts it at risk. This is the biggest challenge for security in a thin-client environment: securing the browser.

Cloud security concerns

By their very nature, cloud platforms are a security challenge. They rely on virtualization, which carries the same risk as any other physical computing environment but adds in guest-host and guest-guest risks.

In addition, cloud solutions run other risks. For example, customers share the same database in some cloud environments. This is a security risk you just don’t have with in-house solutions. Add in authentication and authorization procedures that may nto be the best, and cloud solutions can become shaky.

On top of all of that, it’s awfully hard for a cloud vendor to physically secure your data when, in all likelihood, it’s hard to say at any given time where your data might be located.

Clouds can be as secure as a traditional network, but the key here is making sure you get a good look at the vendor’s security protocols and procedures, and make sure that they’re up to snuff.

Read the original blog entry...

More Stories By Unitiv Blog

Unitiv, Inc., is a professional provider of enterprise IT solutions. Unitiv delivers its services from its headquarters in Alpharetta, Georgia, USA, and its regional office in Iselin, New Jersey, USA. Unitiv provides a strategic approach to its service delivery, focusing on three core components: People, Products, and Processes. The People to advise and support customers. The Products to design and build solutions. The Processes to govern and manage post-implementation operations.

CloudEXPO Stories
Big Switch's mission is to disrupt the status quo of networking with order of magnitude improvements in network e ciency, intelligence and agility by delivering Next-Generation Data Center Networking. We enable data center transformation and accelerate business velocity by delivering a responsive, automated, and programmable software-dened networking (SDN) fabric-based networking solution. Traditionally, the network has been viewed as the barrier to data center transformation as legacy networking architectures hinder IT organizations with brittle, complex and cumbersome switch-by-switch management paradigms and in exible, proprietary hardware choices that are increasingly unable to keep up with the pace required of businesses today.
Lori MacVittie is a subject matter expert on emerging technology responsible for outbound evangelism across F5's entire product suite. MacVittie has extensive development and technical architecture experience in both high-tech and enterprise organizations, in addition to network and systems administration expertise. Prior to joining F5, MacVittie was an award-winning technology editor at Network Computing Magazine where she evaluated and tested application-focused technologies including app security and encryption-related solutions. She holds a B.S. in Information and Computing Science from the University of Wisconsin at Green Bay, and an M.S. in Computer Science from Nova Southeastern University, and is an O'Reilly author.
Digital Transformation (DX) is a major focus with the introduction of DXWorldEXPO within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throughout enterprises of all sizes. We are offering early bird savings on all ticket types where you can save significant amount of money by purchasing your conference tickets today.
Daniel Jones is CTO of EngineerBetter, helping enterprises deliver value faster. Previously he was an IT consultant, indie video games developer, head of web development in the finance sector, and an award-winning martial artist. Continuous Delivery makes it possible to exploit findings of cognitive psychology and neuroscience to increase the productivity and happiness of our teams.
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, discussed the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docker containers gain prominence. He explored these challenges and how to address them, while considering how containers will influence the direction of cloud computing.