{"id":760,"date":"2016-11-17T18:37:02","date_gmt":"2016-11-17T16:37:02","guid":{"rendered":"https:\/\/community.virtono.com\/?p=760"},"modified":"2016-11-17T18:37:02","modified_gmt":"2016-11-17T16:37:02","slug":"3-major-challenges-in-cloud-security","status":"publish","type":"post","link":"https:\/\/www.virtono.com\/community\/knowledgebase\/3-major-challenges-in-cloud-security\/","title":{"rendered":"3 major challenges in Cloud security"},"content":{"rendered":"<p>Is your institution planning to leverage cloud computing and mobile computing in order to improve service agility, increase increase student and research success and lower costs of ownership, and lower capital expenses? If so, you are no doubt aware that your institution is also increasing its attack surface. Cloud-based technologies, smartphones, social media and mobile applications give cybercriminals and hackers more opportunities to find weak points in your defenses and unpatched vulnerabilities on your systems and devices. A single Achilles\u2019 heel can result in a loss of confidential information and intellectual property worth millions of dollars. To keep your data and network safe, and to succeed as what Juniper Networks calls a \u201cCloud-Enabled Enterprise,\u201d your organization must overcome three security challenges.<\/p>\n<p>You need to:<\/p>\n<p>1. Integrate and deploy a comprehensive set of security services to detect and block an expanding array of threats.<\/p>\n<p>2. Close the gap between intelligence and enforcement to cope with zero-day and advanced targeted attacks.<\/p>\n<p>3. Leverage centralized visibility and management to identify and address threats wherever they are detected inside or outside the network perimeter. This short paper provides an overview of how Juniper Networks helps you address these three challenges and protect data as your organization evolves into a Cloud-Enabled Enterprise.<\/p>\n<p><strong>Integrate and Deploy a Comprehensive Set of Security Services<\/strong><\/p>\n<p>Today you need to defend against a widening array of attack techniques. Threat actors are devising new types of obfuscated malware for zero-day attacks, new spear phishing and social engineering techniques, and new forms of advanced persistent threats (APTs) that can hide on your network for weeks or months. To counter these threats, you not only need to deploy a range of diverse security technologies, you must be able to deploy and manage them cost-effectively. In addition, you need to make sure\u00a0that your security solutions are integrated, so that an attack detected by one technology can be blocked by another. Yet supporting and integrating multiple point products is very expensive and difficult. You can count on Juniper Networks to address these issues with its SRX Series Services Gateways and the new Sky Advanced Threat Prevention service. SRX Series Services Gateways provide a wide variety of critical security services, including: \u2022 Stateful firewall capabilities \u2022 Unified threat management (UTM) technologies such as antivirus, antispam, web filtering and content filtering \u2022 Intrusion prevention system (IPS) capabilities \u2022 Protection against denial of service (DoS) and distributed denial of service (DDoS) attacks \u2022 Application firewall and application quality of service (QoS) features \u2022 SSL encryption and decryption and support for IPSec VPN tunnels These security services are integrated with core firewall capabilities. For example, attacks detected by the IPS features can be blocked automatically by the firewall.<\/p>\n<p><strong>Close the Gap Between Intelligence and Enforcement<\/strong><\/p>\n<p>We know that threat intelligence is a critical weapon in the war against cybercriminals and hackers. Threat intelligence allows security defenses to block probes and detect advanced attacks before they can do serious damage. But threat intelligence loses most of its value if it is distributed too slowly, or if it doesn\u2019t reach all of the enterprise\u2019s enforcement points. Fortunately, you can close the gap between intelligence and enforcement with Spotlight Secure and network security management with Junos Space Security Director from Juniper Networks.<\/p>\n<p><strong>Leveraging Centralized Visibility and Management<\/strong><\/p>\n<p>Today you have to assume that some attackers will be able to penetrate the perimeter and establish beachheads inside. That means your team needs to be able to spot suspicious activities anywhere they occur, even in the far corners of the network. You also need to take immediate action to shut down outbound communication to the attacker\u2019s command and control servers, and to update firewalls across the enterprise so they can stop further penetrations by the attackers. The Junos Space Security Director gives you centralized visibility and management of essential security services (Figure 2). Key features of Security Director related to visibility include: \u2022 An easily customized dashboard, with predefined widgets to track key threats and trends and fast drill-down to indepth security data \u2022 Threat maps, graphs, and other visualization tools to make issues visible at a glance and speed up the analysis of threat patterns. \u2022 Clear, intuitively organized views of security events and policy rules, with features to filter, sort and aggregate key data.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Is your institution planning to leverage cloud computing and mobile computing in order to improve service agility, increase increase student and research success and lower costs of ownership, and lower capital expenses? If so, you are no doubt aware that your institution is also increasing its attack surface. Cloud-based technologies,<\/p>\n","protected":false},"author":3,"featured_media":761,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[5],"tags":[],"class_list":["post-760","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledgebase"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Cloud-security.jpg?fit=5506%2C3671&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7ISfL-cg","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":676,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/data-security-in-cloud-computing\/","url_meta":{"origin":760,"position":0},"title":"Data Security in Cloud Computing","author":"Daniel Draga","date":"October 3, 2016","format":false,"excerpt":"\u0097With the development of cloud computing, Data security becomes more and more important in cloud computing. This paper analyses the basic problem of cloud computing data security. . \u0097Cloud Computing provides the way to share distributed resources and services that belong to different organizations or sites. Since Cloud Computing share\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/IMG_2035.jpg?fit=1200%2C900&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/IMG_2035.jpg?fit=1200%2C900&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/IMG_2035.jpg?fit=1200%2C900&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/IMG_2035.jpg?fit=1200%2C900&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/IMG_2035.jpg?fit=1200%2C900&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":3151,"url":"https:\/\/www.virtono.com\/community\/internet-and-technology-news\/virtono-at-cloudfest-2023-a-journey-into-the-future-of-cloud-computing\/","url_meta":{"origin":760,"position":1},"title":"Virtono at CloudFest 2023: A Journey into the Future of Cloud Computing","author":"Teo Moraru","date":"April 3, 2023","format":false,"excerpt":"As members of the Virtono team, we were excited to attend CloudFest 2023 and explore the latest advancements and trends in cloud computing. The three-day conference provided us with an incredible opportunity to network with industry peers, learn from experts, and showcase our own cloud hosting solutions. The event was\u2026","rel":"","context":"In &quot;IT News&quot;","block_context":{"text":"IT News","link":"https:\/\/www.virtono.com\/community\/category\/internet-and-technology-news\/"},"img":{"alt_text":"CloudFest","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/04\/Brand-Kit.png?fit=1200%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/04\/Brand-Kit.png?fit=1200%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/04\/Brand-Kit.png?fit=1200%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/04\/Brand-Kit.png?fit=1200%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/04\/Brand-Kit.png?fit=1200%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":4073,"url":"https:\/\/www.virtono.com\/community\/internet-and-technology-news\/virtono-admintools-at-davos-2025-innovation-recognition-and-a-vision-for-the-future\/","url_meta":{"origin":760,"position":2},"title":"Virtono &amp; AdminTools at Davos 2025: Innovation, Recognition, and a Vision for the Future","author":"Teo Moraru","date":"February 4, 2025","format":false,"excerpt":"Earlier this year, the world\u2019s most influential business, tech, and policy leaders gathered in Davos for the\u00a0World Economic Forum (WEF) 2025. Alongside this prestigious event,\u00a0Davos Innovation Week - Quantumfai\u00a0brought together the brightest minds in technology, investment, and entrepreneurship to discuss and showcase groundbreaking innovations. Among the standout participants was\u00a0Teodora Moraru,\u2026","rel":"","context":"In &quot;IT News&quot;","block_context":{"text":"IT News","link":"https:\/\/www.virtono.com\/community\/category\/internet-and-technology-news\/"},"img":{"alt_text":"WEF Teodora Moraru","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2025\/02\/wet.png?fit=1200%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2025\/02\/wet.png?fit=1200%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2025\/02\/wet.png?fit=1200%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2025\/02\/wet.png?fit=1200%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2025\/02\/wet.png?fit=1200%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":836,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/the-future-of-big-data-what-we-learned-from-2016\/","url_meta":{"origin":760,"position":3},"title":"The Future Of Big Data, What We Learned From 2016.","author":"Daniel Draga","date":"January 6, 2017","format":false,"excerpt":"#1: Cloud-Based BDA Technology Complexity in managing on- and off-premises data from disparate sources and types in a hybrid environment will persist. Integration, orchestration, provisioning, and data management requirements will increase during the transition to cloud. IT needs to work closely with business to identify and prioritize workloads to move\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/bigdata.jpg?fit=1200%2C821&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/bigdata.jpg?fit=1200%2C821&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/bigdata.jpg?fit=1200%2C821&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/bigdata.jpg?fit=1200%2C821&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/bigdata.jpg?fit=1200%2C821&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":777,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/business-intelligence-roadblocks\/","url_meta":{"origin":760,"position":4},"title":"Business Intelligence Roadblocks","author":"Daniel Draga","date":"November 27, 2016","format":false,"excerpt":"Business Information asked attendees at the BI Leadership Summit, \u00a0a conference in New York co-hosted by SearchBusinessAnalytics and \u00a0consultancy Eckerson Group, about the biggest challenges they face \u00a0in increasing the use of business intelligence, or BI, and analytics \u00a0applications inside their organizations. \u00a0 IT User-oriented technology trends like self-service BI\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Business-Intelligence-Buzzwords-panda.jpg?fit=901%2C533&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Business-Intelligence-Buzzwords-panda.jpg?fit=901%2C533&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Business-Intelligence-Buzzwords-panda.jpg?fit=901%2C533&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Business-Intelligence-Buzzwords-panda.jpg?fit=901%2C533&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":2797,"url":"https:\/\/www.virtono.com\/community\/news-announcements\/canada-japan-cloud-hosting\/","url_meta":{"origin":760,"position":5},"title":"Guess what? Canada &#038; Japan servers are live! Cloud Hosting &#038; Cloud VPS available!\ufffc","author":"Stefan Dutu","date":"July 7, 2022","format":false,"excerpt":"Starting today, our new locations in Montreal, Canada & Tokyo, Japan are available for purchase. You can order Cloud VPS\u00a0and Cloud Hosting\u00a0services in this location. Skyrocket your business with little to no effort: Gain Complete ControlLightning SpeedSecurity ProtocolSolid State DrivesInstant ActivationHigh-Performance Are you ready? Try out our new locations with\u2026","rel":"","context":"In &quot;Announcements&quot;","block_context":{"text":"Announcements","link":"https:\/\/www.virtono.com\/community\/category\/news-announcements\/"},"img":{"alt_text":"Montreal Canada Data Center and Tokyo Japan Data Center ready to provide cloud hosting services","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/hosting-offer-for-small-businesses-11-1.png?fit=1200%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/hosting-offer-for-small-businesses-11-1.png?fit=1200%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/hosting-offer-for-small-businesses-11-1.png?fit=1200%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/hosting-offer-for-small-businesses-11-1.png?fit=1200%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/hosting-offer-for-small-businesses-11-1.png?fit=1200%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/760","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/comments?post=760"}],"version-history":[{"count":1,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/760\/revisions"}],"predecessor-version":[{"id":762,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/760\/revisions\/762"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media\/761"}],"wp:attachment":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media?parent=760"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/categories?post=760"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/tags?post=760"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}