{"id":2869,"date":"2014-10-24T04:21:32","date_gmt":"2014-10-24T04:21:32","guid":{"rendered":"https:\/\/devbloglavaprotocols.nityo.in\/why-public-cloud-is-the-future\/"},"modified":"2014-10-24T04:21:32","modified_gmt":"2014-10-24T04:21:32","slug":"why-public-cloud-is-the-future","status":"publish","type":"post","link":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/why-public-cloud-is-the-future\/","title":{"rendered":"Why Public Cloud Is The Future"},"content":{"rendered":"<div style=\"margin-top: 0px; margin-bottom: 0px;\" class=\"sharethis-inline-share-buttons\" ><\/div><p><em><strong>By\u00a0<\/strong><strong>Kana Sabaratnam, former\u00a0<\/strong><strong>General Manager of Lava Labs<\/strong><\/em><\/p>\n<p><!--more--><\/p>\n<p><img data-attachment-id=\"2021\" data-permalink=\"https:\/\/www.lavaprotocols.com\/2014\/10\/24\/public-cloud-inherently-secure\/cloud-security\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.lavaprotocols.com\/wp-content\/uploads\/2014\/10\/cloud-security.jpg?fit=620%2C465&#038;ssl=1\" data-orig-size=\"620,465\" data-comments-opened=\"1\" data-image-meta=\"{\"aperture\":\"0\",\"credit\":\"\",\"camera\":\"\",\"caption\":\"\",\"created_timestamp\":\"0\",\"copyright\":\"\",\"focal_length\":\"0\",\"iso\":\"0\",\"shutter_speed\":\"0\",\"title\":\"\"}\" data-image-title=\"cloud computing\" data-image-description=\"\n\n<p>cloud security<\/p>\n<p>&#8221; data-image-caption=&#8221;&#8221; data-medium-file=&#8221;https:\/\/i0.wp.com\/www.lavaprotocols.com\/wp-content\/uploads\/2014\/10\/cloud-security.jpg?fit=300%2C225&#038;ssl=1&#8243; data-large-file=&#8221;https:\/\/i0.wp.com\/www.lavaprotocols.com\/wp-content\/uploads\/2014\/10\/cloud-security.jpg?fit=620%2C465&#038;ssl=1&#8243; loading=&#8221;lazy&#8221; class=&#8221;aligncenter wp-image-2021 size-full&#8221; src=&#8221;https:\/\/4843500.fs1.hubspotusercontent-na1.net\/hubfs\/4843500\/Imported_Blog_Media\/cloud-security-2.jpg&#8221; alt=&#8221;cloud computing&#8221; width=&#8221;620&#8243; height=&#8221;465&#8243; srcset=&#8221;https:\/\/4843500.fs1.hubspotusercontent-na1.net\/hubfs\/4843500\/Imported_Blog_Media\/cloud-security-3.jpg 620w, https:\/\/4843500.fs1.hubspotusercontent-na1.net\/hubfs\/4843500\/Imported_Blog_Media\/cloud-security.jpg 300w&#8221; sizes=&#8221;(max-width: 620px) 100vw, 620px&#8221; data-recalc-dims=&#8221;1&#8243;><\/p>\n<p style=\"text-align: left;\">Public cloud computing is set to increase from USD 3 Billion in 2008 to 160 Billion in 2020 (Feb 2011 Frost \u00a0&#038; \u00a0Sullivan). \u00a0This growth forecast \u00a0is driven by the confidence that public cloud data security will only keep getting more secure. Therefore, public clouds \u00a0have \u00a0to provide \u00a0the \u00a0highest \u00a0possible \u00a0<a href=\"https:\/\/lavaprotocols.com\/2016\/04\/19\/cloud-security-secured-not\/\" target=\"_blank\" rel=\"noopener\">security<\/a> to maintain this rate of growth.<\/p>\n<p style=\"text-align: left;\">Furthermore, government and <a href=\"https:\/\/lavaprotocols.com\/2018\/07\/23\/cloud-operating-model\/\" target=\"_blank\" rel=\"noopener\">Enterprise users<\/a> are demanding that public cloud security standards be much higher than in their own private cloud environments.<\/p>\n<p style=\"text-align: left;\">Currently the standard set far exceeds most private cloud security architectures. In retrospect, public cloud providers are increasing their security standards to meet this demand faster than what is available commercially as private clouds.<\/p>\n<h3 style=\"text-align: left;\"><strong><span style=\"color: #ff6600;\">Immediate \u00a0first \u00a0steps \u00a0on \u00a0why \u00a0cloud \u00a0is \u00a0an important differentiation:<\/span><\/strong><\/h3>\n<ul style=\"text-align: left;\">\n<li><b>Public cloud data up-time and availability<\/b><\/li>\n<\/ul>\n<p style=\"padding-left: 30px; text-align: left;\">The technology cloud providers use to maintain up-time of more than 99.8% is a consideration when comparing with internally hosted data centers.<\/p>\n<ul style=\"text-align: left;\">\n<li><b>Public cloud collaboration tools<\/b><\/li>\n<\/ul>\n<p style=\"padding-left: 30px; text-align: left;\"><a href=\"https:\/\/lavaprotocols.com\/2018\/07\/04\/collaborate-with-your-colleagues\/\" target=\"_blank\" rel=\"noopener\">Collaboration among business users<\/a> is taking over from social discussions. The benefit in business collaboration has got a dollar value that makes it profitable for businesses.<\/p>\n<ul style=\"text-align: left;\">\n<li><b>Bring Your Own Device (<a href=\"https:\/\/lavaprotocols.com\/2016\/06\/14\/bringing-device-work\/\" target=\"_blank\" rel=\"noopener\">BYOD<\/a>)<\/b><\/li>\n<\/ul>\n<p style=\"padding-left: 30px; text-align: left;\">Mobility is the key adoption driver. It is not a \u201cnice to have\u201d. It is required for user adoption and success of your implementation<\/p>\n<p style=\"text-align: left;\">The primary focus of public cloud providers are data security and up time so that all three key important differentiation of cloud are available as a service. Each public cloud provider has a home-grown scalable platform to meet their unique offerings. This is the only way the public cloud providers can ensure that their cloud computing service will be available 24\/7.<\/p>\n<p style=\"text-align: left;\">The \u00a0public \u00a0cloud \u00a0has \u00a0a \u00a0dedicated \u00a0and \u00a0scheduled development and deployment plan that ensures the security and up-time is maintained at all times. This value is not for sale and will not be available in any private cloud unless it is driven by a sustainable commercial model.<\/p>\n<p><strong>Related<\/strong>:\u00a0<a href=\"https:\/\/lavaprotocols.com\/2016\/04\/19\/60-second-data-security-checklist\/\" target=\"_blank\" rel=\"noopener\">The 60 Second Data Security Checklist<\/a><\/p>\n<p><img decoding=\"async\" data-attachment-id=\"2088\" data-permalink=\"https:\/\/www.lavaprotocols.com\/2014\/10\/24\/public-cloud-inherently-secure\/claranet_virtual_data_centre\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.lavaprotocols.com\/wp-content\/uploads\/2014\/10\/claranet_virtual_data_centre.jpg?fit=492%2C297&#038;ssl=1\" data-orig-size=\"492,297\" data-comments-opened=\"1\" data-image-meta=\"{\"aperture\":\"0\",\"credit\":\"\",\"camera\":\"\",\"caption\":\"\",\"created_timestamp\":\"0\",\"copyright\":\"\",\"focal_length\":\"0\",\"iso\":\"0\",\"shutter_speed\":\"0\",\"title\":\"\"}\" data-image-title=\"claranet_virtual_data_centre\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/www.lavaprotocols.com\/wp-content\/uploads\/2014\/10\/claranet_virtual_data_centre.jpg?fit=300%2C181&#038;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/www.lavaprotocols.com\/wp-content\/uploads\/2014\/10\/claranet_virtual_data_centre.jpg?fit=492%2C297&#038;ssl=1\" loading=\"lazy\" class=\"aligncenter wp-image-2088 size-medium\" src=\"https:\/\/4843500.fs1.hubspotusercontent-na1.net\/hubfs\/4843500\/Imported_Blog_Media\/claranet_virtual_data_centre-300x181.jpg\" alt=\"claranet_virtual_data_centre\" width=\"300\" height=\"181\" srcset=\"https:\/\/4843500.fs1.hubspotusercontent-na1.net\/hubfs\/4843500\/Imported_Blog_Media\/claranet_virtual_data_centre-1.jpg 300w, https:\/\/4843500.fs1.hubspotusercontent-na1.net\/hubfs\/4843500\/Imported_Blog_Media\/claranet_virtual_data_centre.jpg 492w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" data-recalc-dims=\"1\"><\/p>\n<h2 style=\"text-align: left;\"><span style=\"color: #ff6600;\"><b>Virtual Data Centers<\/b><\/span><\/h2>\n<p style=\"text-align: left;\">The fact that there is no single point of \u00a0\u00a0identification \u00a0\u00a0where \u00a0\u00a0the \u00a0\u00a0data resides, is already a security control that can deter attacks. Data situated in \u00a0a \u00a0defined location \u00a0will \u00a0attract attention and become a sitting duck. Data located in a virtual environment which has multiple instances, is less vulnerable to be broken into. Virtual locations \u00a0\u00a0can \u00a0\u00a0be \u00a0\u00a0brought \u00a0\u00a0down systematically \u00a0and \u00a0traffic \u00a0redirected.<\/p>\n<blockquote>\n<p style=\"text-align: justify;\"><b>The primary \u00a0focus of public \u00a0cloud providers are data security \u00a0and up time so \u00a0that all three \u00a0key important differentiation of \u00a0cloud are available as a service.<\/b><\/p>\n<\/blockquote>\n<h2 style=\"text-align: left;\"><span style=\"color: #ff6600;\"><b>Architecture-Driven Framework<\/b><\/span><\/h2>\n<p style=\"text-align: left;\">Public cloud is driven by proprietary architecture. The benefit of public cloud such as multi-tenancy, scheduled redundancy and \u00a0virtualization, \u00a0is \u00a0what \u00a0makes public \u00a0clouds \u00a0more secure.<\/p>\n<p style=\"text-align: left;\">In the current public cloud platforms, there are many providers that bring all these benefits into a single platform, specifically the multi-tenancy is standard that implements data security.<\/p>\n<p style=\"text-align: left;\">Multi tenancy is an architectural design of the system, and it can not be altered just to target a single tenant. It is the framework of how information is stored. All information is hard coded with the org identifier in every level. The database processes transactions where the ID is the identifier of how information is partitioned. This partitioning is then done in the model level (database) and application level (business logic).<\/p>\n<p style=\"text-align: left;\">Furthermore, the architecture is closed. It is constantly built on to meet the ever increasing demands of public cloud users. It has a well-established development and deployment schedule that ensures security and up-time. This technology is not and will not be made available commercially.<\/p>\n<h2 style=\"text-align: left;\"><span style=\"color: #ff6600;\"><b>Secure Public Cloud Data<\/b><\/span><\/h2>\n<p style=\"text-align: left;\">CipherCloud for public cloud addresses data privacy, residency, security, and compliance concerns so that organizations can confidently deploy Salesforce, Force.com \u00a0applications, Amazon Web Services and Google Gmail App.<\/p>\n<p style=\"text-align: left;\">In this example, CipherCloud solution understands Salesforce metadata and provides organizations with the ability to easily tag any standard and custom fields, files, and attachments as sensitive. Once configured, the CipherCloud solution secures this data and prevents it from being leaked to unauthorized users, while working seamlessly with<\/p>\n<p style=\"text-align: left;\">This revolutionary technology, based on function-preserving encryption and advanced tokenization, provides full protection and control, and allows customers to retain complete control over keys. The solution is transparent to the end user, and all native Salesforce functionalities, such as searching and sorting, are preserved.<\/p>\n<h2 style=\"text-align: left;\"><span style=\"color: #ff6600;\"><b>Public Cloud is Defining Mobile Applications<\/b><\/span><\/h2>\n<p style=\"text-align: left;\">Public \u00a0cloud \u00a0is \u00a0defining \u00a0the \u00a0future of \u00a0mobile \u00a0applications. \u00a0The \u00a0cloud providers \u00a0have \u00a0a \u00a0strangle \u00a0hold \u00a0on mobile \u00a0\u00a0applications \u00a0\u00a0and \u00a0\u00a0how \u00a0it delivered \u00a0to \u00a0the \u00a0user. \u00a0The \u00a0sale \u00a0and distribution of mobile applications is controlled \u00a0by \u00a0public \u00a0cloud \u00a0providers.<\/p>\n<p style=\"text-align: left;\">The \u00a0features \u00a0that \u00a0are \u00a0included \u00a0or embedded \u00a0in \u00a0the \u00a0operating \u00a0systems of mobile phones are set by the cloud providers. \u00a0In \u00a0order \u00a0for \u00a0private \u00a0cloud providers to engage with users, they would need to create their own mobile app store to distribute and deliver the apps.<\/p>\n<p style=\"text-align: left;\">The adoption of newer app stores has been \u00a0very \u00a0unconvincing. \u00a0Developers would \u00a0use \u00a0the \u00a0more \u00a0popular \u00a0public cloud \u00a0development \u00a0platforms \u00a0than private cloud platforms.<\/p>\n<p style=\"text-align: left;\">Furthermore, the mobile device itself will not install the apps unless it is installed from one of these stores. If you are not already in the game, the barrier of entry is very high.<\/p>\n<p><a href=\"https:\/\/static.hsstatic.net\/BlogImporterAssetsUI\/ex\/missing-image.png\"><img decoding=\"async\" data-attachment-id=\"2093\" data-permalink=\"https:\/\/www.lavaprotocols.com\/2014\/10\/24\/public-cloud-inherently-secure\/mobile-cloud-computing\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.lavaprotocols.com\/wp-content\/uploads\/2014\/10\/mobile-cloud-computing.jpg?fit=642%2C348&#038;ssl=1\" data-orig-size=\"642,348\" data-comments-opened=\"1\" data-image-meta=\"{\"aperture\":\"0\",\"credit\":\"\",\"camera\":\"\",\"caption\":\"\",\"created_timestamp\":\"0\",\"copyright\":\"\",\"focal_length\":\"0\",\"iso\":\"0\",\"shutter_speed\":\"0\",\"title\":\"\"}\" data-image-title=\"mobile-cloud-computing\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/www.lavaprotocols.com\/wp-content\/uploads\/2014\/10\/mobile-cloud-computing.jpg?fit=300%2C162&#038;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/www.lavaprotocols.com\/wp-content\/uploads\/2014\/10\/mobile-cloud-computing.jpg?fit=642%2C348&#038;ssl=1\" loading=\"lazy\" class=\"aligncenter wp-image-2093 size-full\" src=\"https:\/\/4843500.fs1.hubspotusercontent-na1.net\/hubfs\/4843500\/Imported_Blog_Media\/mobile-cloud-computing-1.jpg\" alt=\"mobile-cloud-computing\" width=\"642\" height=\"348\" srcset=\"https:\/\/4843500.fs1.hubspotusercontent-na1.net\/hubfs\/4843500\/Imported_Blog_Media\/mobile-cloud-computing.jpg 642w, https:\/\/4843500.fs1.hubspotusercontent-na1.net\/hubfs\/4843500\/Imported_Blog_Media\/mobile-cloud-computing-2.jpg 300w\" sizes=\"auto, (max-width: 642px) 100vw, 642px\" data-recalc-dims=\"1\"><\/a><\/p>\n<p>\u00a0<\/p>\n<h2 style=\"text-align: left;\"><span style=\"color: #ff6600;\"><b>Conclusion<\/b><\/span><\/h2>\n<p style=\"text-align: left;\">Private \u00a0\u00a0clouds \u00a0\u00a0are \u00a0\u00a0derived \u00a0\u00a0from open \u00a0systems \u00a0that \u00a0are \u00a0available commercially. \u00a0Therefore \u00a0it \u00a0is \u00a0not proprietary technology. However, public clouds are home grown solutions that are \u00a0derived \u00a0from \u00a0customer \u00a0needs. Google is the third largest hardware manufacturer for internal consumption. This is the typical paradigm for cloud providers \u00a0to \u00a0have \u00a0their \u00a0proprietary software and hardware.<\/p>\n<p style=\"text-align: left;\">Private clouds will not exist if public clouds have not shared their expertise and knowledge. Private clouds will not be able to lead the cloud technology in terms of security and information access.<\/p>\n<p>\u00a0<\/p>\n<p><i><span style=\"font-weight: 400;\">Lava is an<\/span><\/i><a href=\"https:\/\/lavaprotocols.com\/salesforce-crm\/\"> <i><span style=\"font-weight: 400;\">authorised Salesforce Partner<\/span><\/i><\/a><i><span style=\"font-weight: 400;\"> in Malaysia and has more than a decade of experience in cloud solutions which includes marketing automation, CRM implementation, change management, and consultation. We pride ourselves in not just being a CRM partner but in also understanding the needs of our customers and taking their business to the next level.<\/span><\/i><\/p>\n<p><span class=\"et_bloom_bottom_trigger\"><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Public cloud computing is set to increase from to 160bil in 2020. In fact, public cloud data security will only keep getting more secure.<\/p>\n","protected":false},"author":1,"featured_media":2870,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[103,18],"class_list":["post-2869","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-amazon-web-services","tag-blog"],"jetpack_featured_media_url":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-content\/uploads\/2024\/10\/cloud-security-1.jpg","_links":{"self":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/posts\/2869","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/comments?post=2869"}],"version-history":[{"count":0,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/posts\/2869\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/media\/2870"}],"wp:attachment":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/media?parent=2869"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/categories?post=2869"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/tags?post=2869"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}