Vision for Cloud Security

Vision for Cloud Security

By Evan Kirstel December 15, 2016 Leave a Comment
Evan_Kirstel_png
Vision for Cloud Security by Evan Kirstel

Recent discussion around enterprise cybersecurity has focused so heavily on the cloud and the apps contained within that you would think the cloud is the only area worth considering. But it is important to remember that cloud security begins with any touchpoint in the process and therefore can be vulnerable at any of those sections. With so many parties involved such as customers, users, partners along with APIs, special applications, devices and now IoT, the cloud must be able to reach across and get and gather real-time data and react to know and unknown situations. Therefore we must carefully consider how best to secure the cloud as it stretches across so many platforms and scenarios. 

Let’s start with the idea that any real security architecture begins with a platform that can incorporate what is known and react to what is not known. A common enterprise approach has been to layer on a new security app to each disaster hoping that it will help for the next one. In so many circumstances we have found that security apps don’t really work together as they come from separate vendors. If one considers the premise that the IoT will have thousands, even millions of devices or entities connected to enterprise networks sending/receiving information, it becomes clear that a complex security solution is required. Whether it be electric meters, motors, biometric nanotech, robots or more, these will all need to be integrated into the security system. 

Bitdefender has anticipated this and has solutions that address today’s and tomorrow’s issues. What this really means is that enterprises must have a plan and vision for future technology whatever it may be. From my perspective these are some of the endpoint elements that can also be integrated in a futuristic AI-artificial intelligence or expert system. 

In designing any AI system, there is a balance between using a hard approach, which takes the form of heuristics, algorithms, or other prepackaged material, and the soft approach, which involves hunches, guesses, or hearsay. The emphasis of many expert systems takes the form of rule-based phenomenon. Cold, calculated, known approaches appear to be the most successful strategies for expert systems. Expert systems take generally known facts and figures and organize them into congenial, interactive processes that can be queried by network monitors such as Bitdefender. 

It can be argued that many already have enough expertise to perform at the level of most machine-based expert systems. However, it is in these high-level complex situations where a corresponding high-level expert system is needed that machine-based technology is most fragile or limiting. It is here that new approaches to expert systems are needed. I look forward to writing more and learning more from Bitdefender on their plans in future sponsored posts.

 

No Comments Yet.

To Leave a Comment, Please Login or Register

UC Alerts
UC Blogs
UC ROI Tool RSS Feeds