Why APIs beat proxies for cloud security

While many businesses laud the benefits of cloud computing, some feel less than 100 percent confident in their ability to fully secure their cloud resources.

Is it any wonder? Your corporate network might link to multiple cloud services, run by different operators. Mobile users might be accessing cloud resources simultaneously over dissimilar WANs and device types. Some users and devices fall under your management domain; others don’t.

In fact, corporate data seems to be everywhere. It’s being copied, emailed, shared, and synced wherever users happen to be working. So it’s tough to know exactly where sensitive data is being stored and who has access to it.

To read this article in full or to leave a comment, please click here

from InfoWorld Cloud Computing http://ift.tt/28P25Ms
via IFTTT

Advertisements