by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : July 30, 2016
ExecTe c h For many agencies, cloud computing is the answer to a wide range of long- standing challenges, including scal- ability and true elasticity, barriers to entry, technology refreshes and cost savings. Yet cloud computing can introduce its own challenges, particularly in terms of security — not necessarily in the capabilities of the cloud but in the perceptions that surround cloud technology because of its abstract nature. The facts, however, tell a different story: Security in the cloud can equal, and often exceed, the security of an on-premises or legacy data center. Why the disparity between percep- tion and reality? Unlike on-premises and legacy data centers, cloud tech- nology cannot be seen or touched. Federal IT teams must put their trust in cloud providers, and that can understandably create questions and concerns. It can also be uncomfortable for an agency to know it is potentially sharing the underlying physical hard- ware, which is mostly abstracted in the cloud, with other organizations. That discomfort often manifests in the form of security concerns. To help dispel those concerns, let’s look at four of the reasons an infra- structure-as-a -service (IaaS) cloud environment is, and can remain, highly secure. 1. Hypervisors The hypervisor is the core software that allows multiple virtual machine instances to run on the same physical hardware. Its main job is to abstract the hardware and securely separate each of the virtual machine “tenants.” A key benefit of this simplicity is that the hypervisor has a minimal attack surface, which helps prevent any exposure of the virtual machine instances via the hypervisor. Hypervisors have been around for decades, and constant testing and hardening over time have further strengthened their security. Unlike operating systems that have con- Cloud security: Learning to trust the facts BY MARK PIETRASANTA Cloud technology can often exceed the security of an on-premises or legacy data center. Here’s why. ExecTe c h July 30, 2016 FCW.COM 31 SHUTTERSTOCK 0730fcw_031-032.indd 31 7/13/16 9:38 AM
July 15, 2016
August 15, 2016