{"id":35467,"date":"2023-10-17T05:53:34","date_gmt":"2023-10-17T05:53:34","guid":{"rendered":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/?p=35467"},"modified":"2023-10-17T05:53:34","modified_gmt":"2023-10-17T05:53:34","slug":"whats-cloud-security-cloud-based-security-explained","status":"publish","type":"post","link":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/10\/17\/whats-cloud-security-cloud-based-security-explained\/","title":{"rendered":"What&#8217;s Cloud Security? Cloud-Based Security Explained"},"content":{"rendered":"<p><\/p>\n<div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Several organizations are shifting to the cloud to modernize their enterprise networking environments. This includes leveraging the cloud\u2019s flexibility and scalability to deploy <a href=\"https:\/\/www.liquidweb.com\/blog\/what-is-server-virtualization\/\">server virtualization<\/a> and other <a href=\"https:\/\/www.liquidweb.com\/blog\/what-is-virtualization\">virtualization types<\/a>, in addition to to fulfill the demands of growing distant workforces.\u00a0<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">As IT teams make the transition to the cloud, nevertheless, it\u2019s vital to acknowledge that traditional hardware-based security solutions can\u2019t provide the protection this highly complex infrastructure needs. Adopting a cloud-first networking framework requires deploying a complete latest security solution: cloud security.\u00a0<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Keep reading to learn the way cloud security can keep your organization&#8217;s networking environments secure when <a href=\"https:\/\/www.liquidweb.com\/blog\/cloud-migration\/\">migrating to the cloud<\/a>.\u00a0<\/p>\n<\/div>\n<h2 id=\"h-what-is-cloud-security\" class=\"Heading__SHeading-sc-o0nhd6-0\">What&#8217;s Cloud Security?<\/h2>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Cloud security (or cloud computing security) is the gathering of policies, controls, services, and technologies that protect cloud-based networking infrastructures. Together with virtualization security, a sturdy and effective cloud security solution keeps proprietary or confidential data secure, ensures regulatory compliance, and protects your organization against malicious attackers.\u00a0<\/p>\n<\/div>\n<h2 id=\"h-how-secure-is-the-cloud\" class=\"Heading__SHeading-sc-o0nhd6-0\">How Secure is the Cloud?<\/h2>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Overall, there\u2019s a general sense that the cloud isn\u2019t as secure as on-premises network architecture. But cloud computing <em>can<\/em> offer each a highly secure <em>and<\/em> dynamic framework when <a href=\"https:\/\/www.liquidweb.com\/blog\/cloud-security-best-practices\/\">cloud security best practices<\/a> are in place.\u00a0<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Similar to other networking architectures, there are some security vulnerabilities and areas of concern related to unoptimized cloud solutions, including:<\/p>\n<\/div>\n<div data-lw-block-type=\"list\" data-lw-block-attributes=\"\">\n<ul class=\"list-disc list-outside\">\n<li><strong>Larger Attack Surface<\/strong>: Migrating to a public cloud networking environment means coping with a bigger attack surface that cybercriminals can exploit. This is particularly true as distant workforces grow and distant staff use unsanctioned personal devices and networks to access corporate apps and resources within the cloud. Attacks similar to malware, Zero-Day, account takeovers, and <a href=\"https:\/\/www.liquidweb.com\/blog\/what-is-ddos\/\">Distributed Denial of Service (DDoS)<\/a> have gotten more common in the general public cloud each day.<\/li>\n<li><strong>Low Visibility<\/strong>: IT departments and network administrators relinquish some control and visibility to the service provider when adopting cloud-based solutions. For instance, several cloud service providers maintain control over the infrastructure layer and don&#8217;t share it with their customers. This implies IT or security teams would have a difficult time envisioning their entire cloud environment and assets.<\/li>\n<li><strong>Dynamic Workloads<\/strong>: Assets within the cloud are spun up or decommissioned rapidly, meaning cloud environments are continuously changing. This calls for agility that traditional hardware-based security solutions are incapable of providing.<\/li>\n<li><strong>Mismanaged Permissions<\/strong>: Security within the cloud enables granular controls over permissions. Unfortunately, these controls could be overwhelming and mismanaged by those that are unfamiliar with cloud-based infrastructures. A standard pitfall of inexperienced IT or security teams is giving users more access to corporate resources within the cloud than they need to finish their jobs.<\/li>\n<li><strong>Securing Hybrid or Multi Cloud Environments<\/strong>: Most enterprises don\u2019t adopt a 100% cloud infrastructure. As an alternative, they deploy hybrid systems combining each on-premises hardware with cloud-based software. A security system that may effectively protect the hybrid system is required in these complex environments.<\/li>\n<li><strong>Compliance<\/strong>: While several cloud providers are aligned with well-known compliance programs (e.g., GDPR, HIPAA, PCI 3.2, NIST 800-53, etc.), organizations are liable for ensuring their data management processes and workloads are compliant. As cloud environments are ever-changing and sophisticated, running compliance audits generally is a difficult process without the proper tools in place.\u00a0<\/li>\n<\/ul>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">The safety of the cloud can be impacted by the environment it\u2019s deployed in.<\/p>\n<\/div>\n<div data-lw-block-type=\"html\" data-lw-block-attributes=\"\">\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large lw-drop-shadow\"><\/figure>\n<\/div>\n<\/div>\n<h2 id=\"h-the-importance-of-cloud-security\" class=\"Heading__SHeading-sc-o0nhd6-0\">The Importance of Cloud Security<\/h2>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">While there are some real security concerns in relation to the cloud, deploying a powerful cloud security solution in tandem together with your service provider can address these vulnerabilities head-on. Cloud security can protect a cloud-based infrastructure and its assets by:<\/p>\n<\/div>\n<div data-lw-block-type=\"list\" data-lw-block-attributes=\"\">\n<ul class=\"list-disc list-outside\">\n<li><strong>Shrinking the Attack Surface<\/strong>: The cloud\u2019s large attack surface is an enormous security concern\u2014but through strategies similar to workload micro-segmentation, the service provider\u2019s cloud network could be split up into isolated chunks that don&#8217;t communicate or interact with each other and have their very own granular security policies. This separation reduces the general attack surface and keeps apps and data isolated from each other should one develop into compromised.<\/li>\n<li><strong>Establishing the Principle of Least Privilege (PoLP)<\/strong>: A staple of <a href=\"https:\/\/www.liquidweb.com\/kb\/how-to-implement-zero-trust-security-in-5-steps\/\">Zero Trust security<\/a>\u2014which is a key element of sturdy cloud security\u2014is the power to determine the PoLP for users and devices connecting to the network. With Zero Trust and PoLP deployed within the cloud, users are only granted the minimum access required to finish their tasks.\u00a0<\/li>\n<li><strong>Increasing Visibility<\/strong>: IT teams are sometimes concerned with a scarcity of visibility within the cloud. Fortunately, there\u2019s a better level of visibility in cloud computing security than traditional on-premises security solutions can provide. Within the cloud, IT can easily monitor the networking environment to be sure that users, devices, and applications or application programming interfaces (APIs) aren&#8217;t accessing resources or information they shouldn\u2019t. The cloud can even provide more granular insights into potential points of <a href=\"https:\/\/www.liquidweb.com\/blog\/security-vulnerability\/\">vulnerability<\/a> throughout the network.<\/li>\n<li><strong>Providing Agility<\/strong>: Cloud security is designed to fulfill the dynamic needs of a cloud-based infrastructure, in addition to the complexity of <a href=\"https:\/\/www.liquidweb.com\/blog\/hybrid-cloud\/\">hybrid cloud<\/a> or <a href=\"https:\/\/www.liquidweb.com\/blog\/multi-cloud\/\">multi cloud<\/a> IT environments.\u00a0This is particularly vital as organizations undergo digital transformation, which requires a scalable security architecture that may adapt to complex threats within the cloud.<\/li>\n<\/ul>\n<\/div>\n<h2 id=\"h-understanding-cloud-security-and-how-it-works\" class=\"Heading__SHeading-sc-o0nhd6-0\">Understanding Cloud Security and How It Works<\/h2>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">While robust cloud service providers typically offer built-in safety features, partnering with a third-party cloud security vendor that delivers a comprehensive security stack is the simplest strategy to achieve advanced levels of protection. These vendors also give IT teams the power to view their entire cloud infrastructure from a single pane of glass, in addition to implement stringent levels of control based on corporate policies and compliance standards.\u00a0<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Nevertheless, it\u2019s vital to notice that each cloud service providers and organizations are liable for the deployment of a sturdy cloud-based security perimeter.\u00a0<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Typically, the cloud service provider oversees the cloud infrastructure (delivered via <a href=\"https:\/\/www.liquidweb.com\/blog\/what-is-iaas\/\">Infrastructure-as-a-Service<\/a>, Platform-as-a-Service, or Software-as-a-Service) and its configuration is protected.\u00a0<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Then again, a company is liable for:<\/p>\n<\/div>\n<div data-lw-block-type=\"list\" data-lw-block-attributes=\"\">\n<ul class=\"list-disc list-outside\">\n<li>Its identity access management (IAM) policies and authentication.\u00a0<\/li>\n<li>Data protection.<\/li>\n<li>Regulatory compliance.\u00a0<\/li>\n<\/ul>\n<\/div>\n<h2 id=\"h-5-key-aspects-of-cloud-security\" class=\"Heading__SHeading-sc-o0nhd6-0\">5 Key Elements of Cloud Security<\/h2>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Robust cloud security requires a completely integrated stack that features several key features:<\/p>\n<\/div>\n<h3 id=\"h-1-iam-and-authentication\" class=\"Heading__SHeading-sc-o0nhd6-0\">1. IAM and Authentication<\/h3>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">As essential features of a cloud security solution, robust IAM and authentication controls are required to determine Zero Trust and PoLP to your users and their devices. These allow a company to create granular access privileges to corporate resources based on what\u2019s required for every user to finish their jobs.\u00a0<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">In addition they ensure higher levels of authentication for users who&#8217;re given extensive network privileges. It\u2019s also critical for organizations to implement their very own IAM policies concurrently, similar to promoting strong <a href=\"https:\/\/www.liquidweb.com\/blog\/password-security-best-practices\/\">password security<\/a> for all employees.<\/p>\n<\/div>\n<h3 id=\"h-2-asset-isolation\" class=\"Heading__SHeading-sc-o0nhd6-0\">2. Asset Isolation\u00a0<\/h3>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Cloud security tools must allow for asset isolation within the cloud that supports a Zero Trust framework. For instance, IT teams must have the power to partition their cloud network into isolated sections that feature their very own resources and apps. As well as, the power to make use of subnetworks and micro-segmentation to further isolate workloads (with each featuring its own Zero Trust security policies) is one other vital aspect of sturdy cloud security.<\/p>\n<\/div>\n<h3 id=\"h-3-next-generation-cloud-web-application-firewalls-wafs\" class=\"Heading__SHeading-sc-o0nhd6-0\">3. Next-Generation Cloud Web Application Firewalls (WAFs)<\/h3>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">These cloud-based <a href=\"https:\/\/www.liquidweb.com\/products\/add-ons\/web-application-protection\/\">web application firewalls (WAFs)<\/a> protect applications by closely inspecting and managing HTTP traffic before it gets to web application servers. With WAF security, organizations can stay protected against attacks similar to cross-site scripting (XSS), <a href=\"https:\/\/www.liquidweb.com\/kb\/how-to-protect-your-website-from-remote-code-execution\/\">SQL injection<\/a>, web scraping, and advanced application layer DDoS.\u00a0<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Unlike traditional appliance-based WAFs, these cloud-native WAFs provide proactive (fairly than reactive) threat detection, real-time app security insights, and help to make sure regulatory compliance is met.<\/p>\n<\/div>\n<h3 id=\"h-4-data-protection\" class=\"Heading__SHeading-sc-o0nhd6-0\">4. Data Protection<\/h3>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Advanced cloud security solutions should provide automated cloud data protection, similar to data encryption. This ensures data-in-motion or at rest is consistently encoded to stop malicious attackers from capturing sensitive data because it routes to and from the cloud, or when data is accessed from cloud storage. A cloud security vendor must also provide <a href=\"https:\/\/www.liquidweb.com\/blog\/cloud-monitoring\/\">cloud monitoring<\/a> controls that allow them to simply discover, categorize, and monitor all data and apps of their cloud environment.<\/p>\n<\/div>\n<h3 id=\"h-5-artificial-intelligence-and-machine-learning\" class=\"Heading__SHeading-sc-o0nhd6-0\">5. Artificial Intelligence and Machine Learning\u00a0<\/h3>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Cloud security solutions that feature AI\/ML may also help to mechanically detect and forestall intrusions or policy violations, in addition to perform device posture assessments in real time to discover any malicious behavior or anomalies.\u00a0<\/p>\n<\/div>\n<h2 id=\"h-who-needs-cloud-security\" class=\"Heading__SHeading-sc-o0nhd6-0\">Who Needs Cloud Security?<\/h2>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Any enterprise transitioning to the cloud will need to have a solid plan of motion in place for cloud security, as traditional hardware-based security solutions can\u2019t sustain with these complex environments. Considering the safety risks related to the cloud, it\u2019s critical for IT teams or security personnel to partner with a sturdy third-party cloud security provider, in addition to have a comprehensive set of policies in place to maintain employees secure and meet compliance regulations.\u00a0<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">As your private cloud provider, Liquid Web takes measures to maintain your infrastructure secure\u2014similar to managing security patches and updates and seamlessly integrating together with your enterprise\u2019s current cloud computing security architecture.\u00a0<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">With Liquid Web, following and incorporating the important thing elements of security in cloud computing can ensure your entire network stays protected. Learn more about Liquid Web\u2019s <a href=\"https:\/\/www.liquidweb.com\/products\/private-cloud\/\">Managed Private Cloud<\/a> hosting and the way the agility, efficiency, and security of our private cloud infrastructure can profit your organization today.\u00a0<\/p>\n<\/div>\n<div data-lw-block-type=\"html\" data-lw-block-attributes=\"\">\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large lw-drop-shadow\"><a href=\"https:\/\/hub.liquidweb.com\/ebooks\/cloud-computing-tactical-guide\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2021\/09\/Tactical-Guide-for-Rapid-Growth-using-Cloud-Computing-eBook-banner.png\" alt=\"Tactical Guide for Rapid Growth using Cloud Computing eBook banner\" class=\"wp-image-234948\" loading=\"lazy\"><\/a><\/figure>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Several organizations are shifting to the cloud to modernize their enterprise networking environments. This includes leveraging the cloud\u2019s flexibility and scalability to deploy server virtualization and other virtualization types, in addition to to fulfill the demands of growing distant workforces.\u00a0 As IT teams make the transition to the cloud, nevertheless, it\u2019s vital to acknowledge that [&#8230;]\n","protected":false},"author":1,"featured_media":35468,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"fifu_image_url":"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2022\/02\/Cloud-Security-Everything-You-Need-to-Know-social-tile.jpg","fifu_image_alt":"","two_page_speed":[],"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[97],"tags":[109,766,1216,623],"class_list":["post-35467","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-cloud","tag-cloudbased","tag-explained","tag-security"],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What&#039;s Cloud Security? Cloud-Based Security Explained - Daniels Marketing BLC<\/title>\n<meta name=\"description\" content=\"Several organizations are shifting to the cloud to modernize their enterprise networking environments. This includes leveraging the cloud\u2019s flexibility\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/10\/17\/whats-cloud-security-cloud-based-security-explained\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What&#039;s Cloud Security? Cloud-Based Security Explained - Daniels Marketing BLC\" \/>\n<meta property=\"og:description\" content=\"Several organizations are shifting to the cloud to modernize their enterprise networking environments. This includes leveraging the cloud\u2019s flexibility\" \/>\n<meta property=\"og:url\" content=\"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/10\/17\/whats-cloud-security-cloud-based-security-explained\/\" \/>\n<meta property=\"og:site_name\" content=\"Daniels Marketing BLC\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-17T05:53:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2022\/02\/Cloud-Security-Everything-You-Need-to-Know-social-tile.jpg\" \/>\n<meta name=\"author\" content=\"info\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2022\/02\/Cloud-Security-Everything-You-Need-to-Know-social-tile.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"info\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/10\\\/17\\\/whats-cloud-security-cloud-based-security-explained\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/10\\\/17\\\/whats-cloud-security-cloud-based-security-explained\\\/\"},\"author\":{\"name\":\"info\",\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/#\\\/schema\\\/person\\\/6a0a5d2e1a48d29297b62e635a4db33f\"},\"headline\":\"What&#8217;s Cloud Security? Cloud-Based Security Explained\",\"datePublished\":\"2023-10-17T05:53:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/10\\\/17\\\/whats-cloud-security-cloud-based-security-explained\\\/\"},\"wordCount\":1549,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/10\\\/17\\\/whats-cloud-security-cloud-based-security-explained\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/res.cloudinary.com\\\/lwgatsby\\\/f_auto\\\/www\\\/uploads\\\/2022\\\/02\\\/Cloud-Security-Everything-You-Need-to-Know-social-tile.jpg\",\"keywords\":[\"Cloud\",\"CloudBased\",\"Explained\",\"Security\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/10\\\/17\\\/whats-cloud-security-cloud-based-security-explained\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/10\\\/17\\\/whats-cloud-security-cloud-based-security-explained\\\/\",\"url\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/10\\\/17\\\/whats-cloud-security-cloud-based-security-explained\\\/\",\"name\":\"What's Cloud Security? Cloud-Based Security Explained - Daniels Marketing BLC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/10\\\/17\\\/whats-cloud-security-cloud-based-security-explained\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/10\\\/17\\\/whats-cloud-security-cloud-based-security-explained\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/res.cloudinary.com\\\/lwgatsby\\\/f_auto\\\/www\\\/uploads\\\/2022\\\/02\\\/Cloud-Security-Everything-You-Need-to-Know-social-tile.jpg\",\"datePublished\":\"2023-10-17T05:53:34+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/#\\\/schema\\\/person\\\/6a0a5d2e1a48d29297b62e635a4db33f\"},\"description\":\"Several organizations are shifting to the cloud to modernize their enterprise networking environments. This includes leveraging the cloud\u2019s flexibility\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/10\\\/17\\\/whats-cloud-security-cloud-based-security-explained\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/10\\\/17\\\/whats-cloud-security-cloud-based-security-explained\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/10\\\/17\\\/whats-cloud-security-cloud-based-security-explained\\\/#primaryimage\",\"url\":\"https:\\\/\\\/res.cloudinary.com\\\/lwgatsby\\\/f_auto\\\/www\\\/uploads\\\/2022\\\/02\\\/Cloud-Security-Everything-You-Need-to-Know-social-tile.jpg\",\"contentUrl\":\"https:\\\/\\\/res.cloudinary.com\\\/lwgatsby\\\/f_auto\\\/www\\\/uploads\\\/2022\\\/02\\\/Cloud-Security-Everything-You-Need-to-Know-social-tile.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/10\\\/17\\\/whats-cloud-security-cloud-based-security-explained\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What&#8217;s Cloud Security? Cloud-Based Security Explained\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/#website\",\"url\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/\",\"name\":\"Daniels Marketing BLC\",\"description\":\"All About Health &amp; Marketing\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/#\\\/schema\\\/person\\\/6a0a5d2e1a48d29297b62e635a4db33f\",\"name\":\"info\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/387c3341fa426df253347bf8f03bf81e7c8355f511b0ffdb256b6fad73bc149c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/387c3341fa426df253347bf8f03bf81e7c8355f511b0ffdb256b6fad73bc149c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/387c3341fa426df253347bf8f03bf81e7c8355f511b0ffdb256b6fad73bc149c?s=96&d=mm&r=g\",\"caption\":\"info\"},\"url\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/author\\\/info\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What's Cloud Security? Cloud-Based Security Explained - Daniels Marketing BLC","description":"Several organizations are shifting to the cloud to modernize their enterprise networking environments. This includes leveraging the cloud\u2019s flexibility","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/10\/17\/whats-cloud-security-cloud-based-security-explained\/","og_locale":"en_US","og_type":"article","og_title":"What's Cloud Security? Cloud-Based Security Explained - Daniels Marketing BLC","og_description":"Several organizations are shifting to the cloud to modernize their enterprise networking environments. This includes leveraging the cloud\u2019s flexibility","og_url":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/10\/17\/whats-cloud-security-cloud-based-security-explained\/","og_site_name":"Daniels Marketing BLC","article_published_time":"2023-10-17T05:53:34+00:00","og_image":[{"url":"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2022\/02\/Cloud-Security-Everything-You-Need-to-Know-social-tile.jpg","type":"","width":"","height":""}],"author":"info","twitter_card":"summary_large_image","twitter_image":"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2022\/02\/Cloud-Security-Everything-You-Need-to-Know-social-tile.jpg","twitter_misc":{"Written by":"info","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/10\/17\/whats-cloud-security-cloud-based-security-explained\/#article","isPartOf":{"@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/10\/17\/whats-cloud-security-cloud-based-security-explained\/"},"author":{"name":"info","@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/#\/schema\/person\/6a0a5d2e1a48d29297b62e635a4db33f"},"headline":"What&#8217;s Cloud Security? Cloud-Based Security Explained","datePublished":"2023-10-17T05:53:34+00:00","mainEntityOfPage":{"@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/10\/17\/whats-cloud-security-cloud-based-security-explained\/"},"wordCount":1549,"commentCount":0,"image":{"@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/10\/17\/whats-cloud-security-cloud-based-security-explained\/#primaryimage"},"thumbnailUrl":"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2022\/02\/Cloud-Security-Everything-You-Need-to-Know-social-tile.jpg","keywords":["Cloud","CloudBased","Explained","Security"],"articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/10\/17\/whats-cloud-security-cloud-based-security-explained\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/10\/17\/whats-cloud-security-cloud-based-security-explained\/","url":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/10\/17\/whats-cloud-security-cloud-based-security-explained\/","name":"What's Cloud Security? Cloud-Based Security Explained - Daniels Marketing BLC","isPartOf":{"@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/#website"},"primaryImageOfPage":{"@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/10\/17\/whats-cloud-security-cloud-based-security-explained\/#primaryimage"},"image":{"@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/10\/17\/whats-cloud-security-cloud-based-security-explained\/#primaryimage"},"thumbnailUrl":"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2022\/02\/Cloud-Security-Everything-You-Need-to-Know-social-tile.jpg","datePublished":"2023-10-17T05:53:34+00:00","author":{"@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/#\/schema\/person\/6a0a5d2e1a48d29297b62e635a4db33f"},"description":"Several organizations are shifting to the cloud to modernize their enterprise networking environments. This includes leveraging the cloud\u2019s flexibility","breadcrumb":{"@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/10\/17\/whats-cloud-security-cloud-based-security-explained\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/10\/17\/whats-cloud-security-cloud-based-security-explained\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/10\/17\/whats-cloud-security-cloud-based-security-explained\/#primaryimage","url":"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2022\/02\/Cloud-Security-Everything-You-Need-to-Know-social-tile.jpg","contentUrl":"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2022\/02\/Cloud-Security-Everything-You-Need-to-Know-social-tile.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/10\/17\/whats-cloud-security-cloud-based-security-explained\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/"},{"@type":"ListItem","position":2,"name":"What&#8217;s Cloud Security? Cloud-Based Security Explained"}]},{"@type":"WebSite","@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/#website","url":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/","name":"Daniels Marketing BLC","description":"All About Health &amp; Marketing","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/#\/schema\/person\/6a0a5d2e1a48d29297b62e635a4db33f","name":"info","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/387c3341fa426df253347bf8f03bf81e7c8355f511b0ffdb256b6fad73bc149c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/387c3341fa426df253347bf8f03bf81e7c8355f511b0ffdb256b6fad73bc149c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/387c3341fa426df253347bf8f03bf81e7c8355f511b0ffdb256b6fad73bc149c?s=96&d=mm&r=g","caption":"info"},"url":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/author\/info\/"}]}},"jetpack_featured_media_url":"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2022\/02\/Cloud-Security-Everything-You-Need-to-Know-social-tile.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/posts\/35467","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/comments?post=35467"}],"version-history":[{"count":2,"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/posts\/35467\/revisions"}],"predecessor-version":[{"id":35470,"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/posts\/35467\/revisions\/35470"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/media\/35468"}],"wp:attachment":[{"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/media?parent=35467"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/categories?post=35467"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/tags?post=35467"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}