Apr 22, 2011
The term “cloud” has ridden a strange and winding path in the technology industry over the last two decades. Back in the 90’s, when I was working for a small, start-up network optimization company many companies were using a cloud to graphically illustrate the activity that took place in a WAN. It was a somewhat negative connotation representing some of the nebulousness and insecurities that existed when your company practiced remote access.
Over the years, that cloud lifted, the vagaries became less hazy, and the cloud eventually became the preferred term for software as a service, aka SaaS. The strategic and financial benefits of SaaS provided “cloud” with a much more appealing and positive connotation – yet one still met with questions about its security.
It was interesting, therefore, to see Gartner’s Daryl Plummer and Jay Heiser deliver something of a reality slap in the face to those hysterical about Cloud security. In the March 30 segment of their series being published in Financial Times, Plummer and Heiser said:
Many orgainsations have significant concerns about confidentiality when their data are stored in a cloud service. But the greater risk is data loss through an unrecoverable technical failure, a clumsy user error by a person, or a deliberate attack against a prominent cloud vendor.
In other words, like with an internal network, the greatest risk to security lies within the organization, rather than with the technology. This doesn’t mean you can let down your guard when it comes to cloud security. Plummer and Heiser note that “security breaches can happen at multiple levels of technology and use” and that a breach at one point in the process can lead to issues at another one up the line. In other words, if the breach point starts on your side of the WAN, it leaves your piece of the cloud open to being exploited at the next level.
WAN Level Security
With the right provider and architecture, enterprises are able to consolidate resources into purpose-built data centers where they can physically protect critical information and more easily track vital assets. In addition, data can be backed-up more easily and with consistent regularity, minimizing the ongoing risk of exposure.
This is why CIOs are turning to WAN acceleration as a key enabler for these strategic IT initiatives. By overcoming common WAN obstacles, such as limited bandwidth, network congestion and high latency, these devices ensure that consolidation does not come at the expense of application performance.
But it is possible for WAN acceleration to introduce new security challenges if not implemented properly. For example, deploying a WAN acceleration appliance with unencrypted drives can actually create risk where none previously existed.
The best solution incorporates the latest in encryption technology to protect data at all times — at rest and in transit across the WAN. It should also be easy to configure, enforce, and monitor security policies from a central location employing mechanisms to ensure that security does not come at the expense of network performance or scalability.
Silver Peak Secure Content Architecture
Silver Peak products are built on a Secure Content Architecture™ that enables enterprises to deploy WAN acceleration with complete confidence. The Secure Content Architecture employs various techniques to ensure that data remains secure, regardless of where it is in the WAN acceleration process. This is achieved via the following capabilities:
Silver Peak’s Secure Content Architecture also delivers a variety of features that control the manner in which traffic traverses the WAN. These include:
The Silver Peak solution was designed from the ground up with secure acceleration in mind. By leveraging a variety of hardware and software components, Silver Peak provides the highest level of data protection today, while ensuring seamless support of future security technologies tomorrow.