Cloud computing is on the rise. Over 90 percent of recently surveyed companies expect to be using cloud computing in the next three years. Still, securing access to the cloud poses significant challenges for IT departments. Mission-critical, cloud-based business applications such as Salesforce.com, SharePoint and SAP are often prime targets for continuous, persistent criminal attack from sophisticated, profit-driven and even politically motivated hackers.
Today's workers also go far beyond traditional applications in their cloud-based computing. They routinely transfer information via personal e-mail accounts such as Yahoo or Gmail, use peer to peer applications such as LimeWire and BitTorrent, download files from Web 2.0 social networking sites such as Facebook and stream rich media from YouTube.
While these cloud-based Web applications can offer business benefits in certain scenarios, they have the potential to rob companies of bandwidth, productivity and confidential data-and subsequently put them at risk of regulatory noncompliance.
Finally, traditional approaches to network security become less effective in the public cloud. WiFi-enabled laptops, third-generation/fourth-generation cellular smartphones, dynamic port selection and traffic encryption have undermined traditional, perimeter-based network controls over application access. Moreover, it is critical to prioritize and manage bandwidth for all of these applications to ensure network throughput and business productivity.