eBooks/eGuides

Hybrid IT for Dummies

Issue link: https://insights.oneneck.com/i/1200933

Contents of this Issue

Navigation

Page 35 of 64

Hybrid IT For Dummies, HPE Special Edition 30 These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. For those who operate in highly regulated arenas, such as the finance and healthcare industries, although there are hard- ened cloud services that you may be able to use, the fact is that your local data center will probably have more security and be more compliant than a commodity cloud provider. Commodity cloud providers look at the overall customer base and may not delve deeper to consider individual vertical needs. Just like all other aspects of the hybrid cloud, the location you choose for individual workloads will depend on a number of factors, security included. Understanding the Full Scope of On‐Premises Physical Security Let's talk about on‐premises security for a minute. Like cloud providers, you may be under regular attack and just not know it. Or you may be painfully aware, as your Internet services slow to a crawl. There are also a multitude of other risks that you need to keep in mind when it comes to on‐premises physical security. Denial‐of‐service attacks Denial‐of‐service (DOS) attacks happen more frequently and are more serious than ever before. Some of this is due to hackers stepping up their game, but some is due to the fact that there are many, many more devices on the Internet that can be turned into so‐called zombies and programmed to attack. A DOS attack against your headquarters could be devastat- ing, unless you have multiple redundant connections to the Internet — and even that may not help you. Cloud providers typically have multiple points of connectivity to the Internet. So, even though they're impacted by DOS attacks, the impact may be more muted. Plus, some terms of service with cloud providers may actually allow them to shut down your virtual machines if your site experiences a DOS attack. When a DOS attack does take place, although it may not impact every

Articles in this issue

Archives of this issue

view archives of eBooks/eGuides - Hybrid IT for Dummies