How to integrate the Active directory with Amazon S3

The cloud vendors are offering dearth cheap cost of having storage for the enterprise users however there would be a challenge to integrate the enterprise desktop/servers onto cloud vendors storage. The challenge is to establish the role based access to cloud storage infrastructure and set storage quota for each type of enterprise users and many more management related tasks. In this space, one of the Amazon Partner Cloudberrylab.com has a robust product to integrate the enterprise active directory to the Amazon S3 ( Amazon Storage Service ).

The CloudBerry AD establish the interface between the corporate or enterprise AD to the Amazon S3 infrastructure. Below are the few benefits of integration:

1. Authentication – The existing Windows users can authenticate to Amazon S3 resources

2. Authorisation - The existing Windows users are integrated to Amazon IAM module which provides role based access

3. Drive Mapping – The data stored in Amazon S3 are mapped as network drive to the existing Windows users

CloudBerry AD offers very easy steps for the installation, configuration and setup the enterprise backup of desktop or servers in very short span.

There are some amazing products offered by CloudBerryLab in the storage and backup segment, if you are interested just visit http://www.cloudberrylab.com

Top 10 Cloud Concerns

Many organisations have different concerns about moving the business onto Cloud. In a collective note, below are the top 10 cloud concerns where majority of the organisations still trying to adopt the cloud technology.

1. Security defects in the cloud technology

2. Unauthorised access or leak of proprietary information

3. Unauthorised access or leak of customer sensitive data

4. Application or system performance

5. Unpredictable cost

Continue Reading…

Cloud Backup of your PC’s

Most of us take the backup of the necessary files onto either dropbox, google drive or similar type of cloud storage devices in the recent past. But still we are using the native backup to external HDD incase if we are taking the backup of the entire PC or use some of the most expensive native tools provided by the PC/laptop vendors like Apple Time Capsule which costs over more than $300. The limitation with these tools are the backup’s are not accessible over internet and convenience is the major blocker.

DrivePop provides you some amazing features in terms of taking the backup of the PC/laptop in the cloud and provides the flexibility in terms of accessing the backup 24×7 anywhere and where internet connection is there. The DrivePop provides the AES 256-bit encryption to the backup’s stored in the cloud which mitigates the fear of exposing the backup of your PC/laptop which may contain sensitive information.

Continue Reading…

Multiple layers of Security in Amazon EC2 – For Beginners

By this time many of us know what is virtual machine which wasn’t widely used about 4 – 5 years back. Though most of folks know the basic definition of the virtual machine (VM) I believe still at large in the internet community yet to understand the basic concept of the virtual machine and how to visualise it. I would be making an attempt to simplify the explanation of the virtual machine and also provide some basic information about the multiple layers of the security existing in the Amazon virtual machine well know as Amazon EC2 (Elastic Compute Cloud).

Let’s try to understand the physical machine or a server. The physical machine consists of 2 major components:

  • Hardware – CPU, Memory, HDD & NIC (Network Interface Card)
  • Operating System – Linux, Unix & Windows.

Below are the components of the virtual machine:

  1. Hardware – CPU, Memory, HDD & NIC (Network Interface Card)
  2. Virtual Layer – slice or partition the hardware components as required and or the base Operating system.
  3. Guest Operating System – This can be combination of different operating systems like Windows, Linux & Mac OS.

So essentially on one physical server you can create multiple machines with different guest operating systems and having different configurations of the hardware components. These systems can inter-communicate within each other via the virtualisation layer.

Continue Reading…

Encryption in the Cloud – For Beginners !!

Encryption is the process of encoding the information/message/data so that only authorised individuals are able to view it. Below are the three essential components of encryption process:

a) The data/information that needs to be encrypted

b) The encryption algorithm such as DES, AES -128 bit & AES-256 bit etc

c) The storage and management of the encryption keys

The Encryption process can be broadly classified into two types:

a) Symmetric – The same encryption key is used for both encryption and decryption.

b) Asymmetric – A set of keys i.e. private and public keys are required for both encryption and decryption.

I would not go in detail explaining the above two encryption process and leave it you folks to understand the concepts.

Continue Reading…

Top 5 threats of Cloud Computing in 2013

Cloud computing is perceived as the key business driver for variety of industries in the last couple of years and for majority of them it has proved successful in terms of achieving their business objectives efficiently and in short span. Though security of the cloud is often seen as the lever which negates the quick adoption of cloud computing for many industries but it has been matured and embedded in the cloud offerings by major vendors. Since the land scape of the cloud computing technology is evolving so the security threats to the offers made by the vendors. Some of the threats that I would want to discuss here are there right from the early stage of the cloud computing and getting more matured and complex due to paradigm shift of the cloud technology.

Below are the top 5 threats of Cloud Computing in 2013:

1. Data Breach or Data Loss
2. External Agents
3. Malicious Insiders
4. Insecure API’s
5. Abuse of the cloud services by the vendor

Continue Reading…