As companies accelerate their adoption of cloud technologies – like infrastructure as a service (IaaS) or software as a service (SaaS) – the need for solutions that provide secure access and reliable operations in the cloud increase in importance. Since your data will now reside in several different facilities, with different providers or partners, you now have a new “security perimeter” to monitor and defend. As such, the need to closely evaluate how cloud-based data is protected should be part of the overall security strategy. A top area of concern is defending applications from distributed-denial-of-service (DDoS) attacks.
Many Colocation, Hosting, and Cloud Providers include Infrastructure as a Service (IaaS) as part of their base offering. These Providers are under increasing pressure to deliver this basic service with high quality at the lowest possible price – while still maintaining reasonable margins for their business.