How to set up smartphones and PCs. Informational portal
  • home
  • In contact with
  • The concept of cloud in network technologies. Application of cloud technologies in business

The concept of cloud in network technologies. Application of cloud technologies in business

The Internet has become entrenched in our lives. Many users can no longer imagine their lives without a computer. Naturally, technology improves every year. And for active users of the global network, such a useful technology as a cloud server has appeared. What it is? What is it for?

Cloud computing is...

Today it is very common to hear about such a function as cloud computing. The name of such servers comes from a graphic image that is used to designate technologies.

Cloud computing is the ability to access data without installing special applications on the device. Servers provide all the necessary support for users. But whether you have to pay for this remote access to data or not depends on the requests.

How are cloud technologies different from conventional ones?

To better explain the difference between traditional technologies and cloud storage, we can take email as an example. The case when an email client, such as Outlook, is already installed on the user's computer, and all data received by e-mail is saved to the hard drive, is considered a common IT technology. That is, the user himself can dispose of the received files and decide what to do with them. And the mail client will work exactly as long as the computer is running.

But e-mail, which is opened using a browser, is already a cloud technology. That is, the user, without installing anything on the device, can access his email address. Moreover, if something happens to the server on which all the data is stored, then access to e-mail will be lost.

What do you have to pay for when using the cloud?

Cloud server - the technology is not completely free. There are times when the user will have to pay for the provision of cloud storage services. All servers are divided into three types that charge for different features.

  • IaaS is a cloud model that requires a fee for providing remote access to storage. That is, the user pays only for access to the server.
  • When using the PaaS cloud, you will have to pay not only for the available resources, but also for access to special data processing software.
  • SaaS is a repository that provides access to a whole range of software, for which, of course, you will have to pay a considerable subscription fee.

Positive sides

The use of cloud technologies has a number of advantages, which are quite significant.

It is very profitable for young enterprises to use cloud servers. They will not have to worry about buying their server equipment, spend money on building a local network, or hire system administrators. It is enough just to choose one of the cloud servers, which is ideal in terms of memory size, number of clients and other characteristics, and pay a monthly fee once a month.

Cloud technologies are the ability to access the necessary information using a regular browser from anywhere in the world. Uptime will no longer worry the client, as it is monitored by those who are paid by the user for cloud storage. Such systems are in demand among corporate users who need to establish a workflow in the network of enterprises.

For ordinary users who simply do not want to clog their computer with unnecessary information, there are free cloud servers that will be enough.

Negative points

Of course, new cloud technologies also have a number of disadvantages.

Firstly, confidential data that is transferred using cloud storage can be intercepted by hackers. The quality of the Internet connection must be very high. In case of interruptions with the Internet, access to data on the "clouds" will be impossible. At the same time, large enterprises still need a system administrator to establish data transfer.

If the client wants to save money and prefer a cheaper server, then he will have to face performance problems. Cheap cloud storages have not very good hardware infrastructure, in which problems appear regularly, and it takes a lot of time to fix them.

If the use of cloud technologies is planned for the long term, then this can be much more expensive than installing your own local server. Especially if a cloud technology with a wide range of possibilities, such as SaaS, is chosen for work.

Overview of cloud storage

Cloud technologies are storages that can be divided into three types of services:

  • Creation of infrastructure.
  • platform services.
  • Software Services.

This division will help with the choice of a cloud server for data storage.

Windows Live SkyDrive is suitable for those who need a large amount of data. It allows you to store information up to 25 GB in size. There are no file format restrictions. However, for some types there are a number of advantages. So, for example, when storing Office documents, it is possible to edit them immediately in the browser.

Dropbox has become more widespread than Windows Live SkyDrive, although it has a much smaller amount of information - only 2 GB. It is enough to install one application on the device to have remote access.

A dedicated server even exists for storing music. This is Grooveshark, which is considered one of the most popular cloud storage for music files.

How fast progress progresses, just by leaps and bounds, not otherwise. The technologies that will be discussed have already entered our lives. " Clouds» call them in the common people, and AI-Tishniks say cloud technologies. I propose to deal with this interesting and promising technology.

  • What is the concept of cloud computing?
  • What can be cited as examples of cloud technologies?

Of course, our level of solutions is ordinary users. Let's touch on the theory at an accessible level and practice. In a word, I will try to systematize the basic information on the topic and, if possible, put it on the shelves.

Use of cloud technologies

The topic is quite popular on the Internet. There are many solutions on the market. However, not everyone understands this know-how and why we need it. If we touch on the mentioned theory of computing cloud comuting (cloud computing), then its essence is in distributed data processing.

It can be said otherwise. Cloud technology is when the user is provided with Internet services, various hardware and software, methodologies and tools to achieve their goals, objectives, projects. An example is . This is a completely cloud service.

The structure of cloud technology can be represented as follows. These are servers, hard drives and other hardware. On this structure, as on a platform, various services are created and offered. And only then the software to which users get access.

When changing the summer wheels (rims with rubber) of my car for winter ones, I left them directly in the service store. This service reminded me of a trend in IT too. All my photos from my Android phone are automatically uploaded to Picasa (now the same as in G +) the same thing happens with photos taken with a Canon camera. Files in the Google Drive folder on my computer are automatically synced with the Google Drive folders.

At present, the concept of cloud systems can offer many types of services. Services are provided as a service, this is the essence of the concept. Storing your data as a service. Those. install yourself Google Drive for example, and abandon the old technologies of data storage on disks and flash drives.

This is also work with a DBMS, i.e. database as a service. The concept allows you to save on "computer hardware" and even competently use the DBMS in your organization. You can also provide software with access via the Internet. For example Google Docs, Google Calendar like cloud technologies google.

As a service from cloud systems, security as a service is already being offered. Those. cloud security technologies that enable users to save on maintaining their own security system.

Cloud Applications

Cloud computing opportunities abound. This is access from any computer, working with your information from other devices like tablets and phones. It also doesn't matter what operating system you work on and how many people work simultaneously with the same information. It's easy to share, and it's easy to combine yours with information from people around the world.

Your information is not stored on your devices and is therefore protected from loss. Not only have many paid programs been replaced by free web applications, but the latest version is always at your service.

Cloud technology examples:

Let's review the solutions, services, application software already available on the market. Google cloud technology has recently released the Google Play service. The Corporation allows us to host our movies, music, books and various applications.

Apple provided its iCloud service. This service stores all your content and delivers it to any device using Push technology. OnLive and Xbox Live gaming services offer games as a service.

But the software is more interesting. Instead of boxed programs, Google Corporation (Microsoft did the same) provided the ability to work with Google Drive documents. These are storage, editing and sharing of files.

Pure Dropbox and Windows Live SkyDrive storage services. Dropbox allows you to store up to 2 GB of data for free. Up to 7GB allows you to save the SkyDrive service.

And so, the cloud is guaranteed and secure access to your information. The ability to synchronize your computers, do not load yourself with flash drives, disks and wires. Technologies are in great demand and innovations in the field of IT, of course, will be associated with them.

The term "cloud technology" is now on everyone's lips. An active discussion of the possible nuances of working with such technologies is conducted both at the forums of large Internet companies and among novice users. And there really is a lot to discuss.

Every day in search engines, computer owners are increasingly asking the question “what is cloud computing”. This is not surprising, because more and more users are learning about this innovation. A good example is anti-virus software. New versions of Norton Internet Security, Kaspersky and many others in the settings offer to activate the protection from the cloud option. Since curiosity is inherent in human nature itself, it is quite logical that people are becoming interested in cloud technologies.

Alas, something revolutionary should not be expected. In part, these technologies have existed on the Web for a long time, they just lacked an accurate and capacious definition, systematization and understanding of potential opportunities. Cloud computing is a way of processing digital data outside the environment of the initiating computer. Since many people get acquainted with the term thanks to anti-virus applications, let's consider the work of "clouds" using the example of this group of programs.

Let's imagine that an anti-virus application encounters suspicious program code, which is not described in the virus databases. If the user does not know what cloud technologies are and has not allowed their use (tick in the settings), then the antivirus will try to localize the suspicious file until the databases are updated. Everything is completely different if cloud technologies are activated. In this case, information about the strange code is automatically transmitted to the server of the anti-virus program developer, where it is promptly checked by specialists for potential danger. If the threat is confirmed, all computers connected to this resource are sent instructions on how to neutralize the threat. The result is an unprecedented speed of response to the emergence of new viruses. What is cloud technology in this example? The answer lies in processing the suspicious code on the developer's servers, outside the computers of ordinary users. This is the key feature.

Cloud technologies give a second life to low-powered computing devices. Let's assume that we have a calculator that has access to the Internet and is connected to a specialized "cloud" consisting of clusters of high-performance computers. We can perform elementary operations on our own, but what if complex calculations are necessary? In this case, the calculator sends the task data to the cloud service, and in return receives a ready-made solution. For the user, the actions that took place between the set of commands and the receipt of the response went unnoticed. After all, the main thing is the result, and it was achieved. Of course, a calculator is an extreme, but, on the other hand, it is easier to understand the principle of operation.

In addition to such non-obvious clouds, there are special services that largely replace full-fledged applications on a local computer. For example, the user needs to edit a text file in the Word program. To do this, you need to purchase the program itself (and the licensed version is not cheap), allocate free disk space on the media, connect the necessary modules. Of course, all this can be solved, but what if there are a lot of computers (enterprise)? Spend money on a purchase It is much easier to use a cloud service that provides access to certain programs hosted on its sites. The user needs to go to the desired site through a browser, remotely launch Word and open their file for editing. By the way, convenient interfaces are usually implemented in this way.

The benefits of cloud technologies can be listed for a long time. There are fewer cons, but they are significant: reduced privacy and dependence on the work of a third-party resource.

Send your good work in the knowledge base is simple. Use the form below

Students, graduate students, young scientists who use the knowledge base in their studies and work will be very grateful to you.

Posted on http:// www. allbest. en//

Posted on http:// www. allbest. en//

INTRODUCTION

For many years, information technology has been inextricably linked with business. This is due to the fact that information technology provides opportunities to improve business efficiency. In order to remain competitive, companies need to not only follow trends and new technologies, but also apply them. These technologies include cloud computing, which is increasingly gaining popularity in the business world.

Cloud computing is a model for providing ubiquitous and convenient network access to a common pool of configurable computing resources that can be quickly provisioned and released with minimal operational costs or calls to the provider. The essence of cloud computing is to provide customers with remote access to services, computing resources and applications via the Internet.

The relevance of this topic is due to the fact that the use of cloud technologies makes it possible to effectively solve business problems. The introduction of cloud technologies leads to significant changes in the organization, including:

Reducing investment in IT

Reduced IT Maintenance Resources

Productivity increase

Business agility

Disaster Recovery

Increasing capacity and increasing availability

Despite the effectiveness of these technologies, many companies do not use them, preferring other ways to deploy their IT infrastructure. Thus, such companies begin to yield to their competitors, because. business efficiency largely depends on the information technologies used. Thus, today the issue of using cloud technologies in business is relevant, because. companies need to know and apply the most effective technologies to improve their business processes that affect the profitability of the organization.

The purpose of this work is to identify how the use of cloud technologies in business is effective. To achieve this goal, I need to perform the following tasks:

1. Define cloud technologies, describe their main characteristics, identify the advantages and disadvantages of using cloud technologies in business

2. Determine the opportunities that cloud technologies provide to companies

3. Explore the features and capabilities of Kaspersky Endpoint Security Cloud by Kaspersky Lab

4. Evaluate the effectiveness of the application of the studied cloud solution in small and medium-sized businesses

This work consists of the main and practical parts. The main part contains 3 chapters, which define cloud technologies, describe models for deploying and maintaining cloud technologies, and identify the advantages and disadvantages of using cloud technologies in business. In the practical part of the work, I explore the cloud solution Kaspersky Endpoint Security Cloud and evaluate the effectiveness of its use in small and medium-sized businesses.

kaspersky cloud business

1. THE CONCEPT OF CLOUD TECHNOLOGIES

1.1 Definition

Today, cloud computing is one of the most popular directions in the development of information technology. Modern conditions of the information world require the solution of many tasks that can be effectively performed using cloud technologies. Many large global IT companies use cloud computing, which is a confirmation of the effectiveness of these technologies.

Cloud technologies represent a universal environment for storing and processing information, which combines hardware, licensed software, communication channels, and technical support for users. Cloud technologies also mean the ability to obtain the necessary computing power on demand from the Web. Today, large data centers allow not only to store and process data in their centers, but also make it possible to create their own virtual data centers. This allows companies not to waste resources on building their infrastructure from scratch.

The main feature of cloud technologies is scalability: these technologies do not have a rigid attachment to the hardware platform, there is no attachment to the geographical area. The use of cloud technologies in companies is aimed at reducing costs and improving the efficiency of business processes.

Cloud technologies are data processing technologies in which computer resources are provided to an Internet user as an online service. Thanks to this, the user works with cloud services from anywhere and from any device: the main thing is to have access to the Internet. Access to the "cloud" can be accessed not only via the Internet, but also via the local network. In this case, the user's computer is a terminal connected to the Web. Those computers that perform cloud computing are "computing cloud". The load between such computers is distributed automatically.

The cloud has three main components:

Cloud computing. Cloud computing refers to the architecture of computer data processing. Cloud architecture provides opportunities for self-service, scalability and flexible processes. Such an architectural solution replaces fixed costs with variables and provides ample opportunities for data analysis.

cloud platforms. Cloud platforms include tools, software and information models, system software, and other technologies that perform tasks.

Cloud services. Cloud services are models for delivering information services.

The development of cloud technologies has a huge impact on business. In order to have advantages over competitors, companies need to take into account modern trends in information technology. Companies that use cloud technologies in their business processes receive a number of advantages. Cloud computing is a business process management approach that reduces the complexity of information systems. This is achieved through the use of cloud computing, self-managed and available on demand within a virtual infrastructure.

Thus, companies have the following advantages from using cloud computing: reducing IT costs, improving the quality of service provision, business dynamism. The reduction in IT costs is due to the fact that cloud technologies reduce operational and capital costs: thanks to the "cloud", IT specialists of the company can focus on strategic projects without wasting time managing their own data center.

Cloud computing works like this: instead of acquiring, installing and managing their own servers to run applications, companies rent servers (for example, from Microsoft or Google). The user manages these servers via the Internet. Payment includes only the actual use of servers for processing and storing data.

Computing clouds consist of a huge number of servers that are located in data centers. Data centers provide tens of thousands of applications that are simultaneously used by millions of users at the same time. Full automation is a condition for the effective management of an infrastructure of this magnitude.

Thus, the use of cloud computing is on the trend, and companies need to be aware of it and apply it effectively to improve business processes.

1.2 Characteristics of cloud technologies

In order for information resources to be classified as cloud technologies, they must have the following key properties: have high availability and scalability, and be cost-effective for the client. In order to distinguish cloud technologies from other earlier approaches to the provision of hardware and software resources, the following main characteristics of cloud computing are distinguished:

1. Wide network availability

2. Easy scalability, elasticity

3. Ability to monitor

4. Accounting for consumption

5. Self-service on demand

6. Consolidation of resources

Broad network accessibility refers to the fact that software products, resources and services are available to the user over the network, no matter what device is used. The user can use a personal computer, laptop, tablet, mobile phone or any other terminal device - the main thing is to have access to the network.

Easy scalability consists in connecting (or disconnecting) additional hardware or software devices. This happens without additional delays with the supplier, in automatic mode.

Clouds are equipped with a monitoring system that allows you to monitor the stability of work and evaluate availability.

The following characteristic is especially important for business, because directly affects the financial resources spent on IT. It is economically beneficial that when using cloud technologies there is consumption accounting. The client does not spend money on resources that are not used. The consumed resources are recorded (for example, the number of users and transactions, the amount of data storage used), and on the basis of this accounting, the provider evaluates the services provided to the client in monetary terms.

On-demand self-service enables the customer to manage their computing needs. These needs include server time, speed of access and data processing, and the amount of data stored. The client can exercise such control without direct contact with the service provider.

Finally, resource pooling means that the provider pools resources to serve a large number of consumers into a single pool in order to dynamically distribute capacity between consumers with a constant change in demand for capacity. Thus, clients only monitor the main parameters (data volume, access speed, etc.), while the service provider monitors the actual distribution of resources.

2. CLOUD DEPLOYMENT AND SERVICE MODELS

2.1 Cloud deployment models

As a rule, the following cloud deployment models are distinguished: private, public and hybrid cloud.

The main models are public cloud (public cloud) and private cloud (private cloud). The public cloud provides cloud services and resources to a large number of customers using public data centers. A private cloud provides the organization's own infrastructure. Speaking about the public cloud, it is worth noting that it allows you to convert all relevant costs into operating costs and provides a quick and budget launch of an IT solution. With a private cloud, capital investments are saved, while maintaining full control of the IT infrastructure.

If we talk more about the private cloud, then it should be noted that a private cloud is an infrastructure that is located within the same organization. The private cloud is designed to meet the needs of internal workforce while providing a high level of data security.

Today, businesses are making more and more demands on IT technologies. A private cloud allows you to solve problems such as providing a large number of business services and optimizing costs. By deploying a private cloud, the company reduces the risks associated with information security and ensures the high availability of IT resources, despite the possible high server load.

Speaking about the advantages of a private cloud, we can note the following:

1. Compared to a public cloud, a company has more control over its IT infrastructure, because all its components remain on the side of the company.

2. High level of security. This is ensured by the fact that the service is consumed by one organization, so the infrastructure can be optimally configured to meet the data protection requirements in this organization.

3. High performance. It is connected, in particular, with the fact that all operations take place within the framework of internal firewalls and the means of protecting the perimeter of the corporate network. As a result, data transfer is fast.

4. When implementing a private cloud, the efficiency of the IT department increases - at any time it can quickly deploy the desired service. IT professionals only have to "lift" the virtual machine from the template and install the necessary service.

Despite the advantages, private clouds have a number of disadvantages:

1. Significant costs at all stages of the cloud life cycle. The deployment phase requires investments in hardware and software.

In addition, the private cloud needs to be managed, which incurs administration and staffing costs.

2. Compared to a public cloud, the risks of service downtime or data loss due to physical threats are much greater.

3. A company may run out of space in the cloud when infrastructure resources may not be sufficient.

Analyzing the above, we can conclude that the most significant drawback of a private cloud is the need to spend a significant amount of human and material resources for its creation and further work. This significantly affects the financial condition of the organization.

Turning to the consideration of the public cloud, it is worth saying that the public cloud is an infrastructure designed for free use by several organizations. This cloud model can be owned by multiple companies. Despite this, the word "public" does not mean that user data is available to absolutely everyone. The public cloud implements security mechanisms to control access. Ease of setup and low cost are the main benefits of deploying a public cloud. The provider does all the work related to the creation of the cloud, and the client only configures the amount of resources he needs.

In the case of using a public cloud, the consumer uses the infrastructure of a third-party provider, which creates many opportunities for the efficient use and redistribution of resources. Public cloud services are easy and efficient to use because customers need nothing more than a stable Internet connection to access applications.

Speaking about the advantages of a public cloud, it is worth noting the following:

1. Ease and efficiency of use.

2. Only a stable internet connection is required to access the apps.

3. The use of a public cloud makes it possible to reduce IT costs by eliminating the cost of hardware and software.

4. Flexibility and scalability: the public cloud allows you to pay for exactly as many resources as you need at the moment, and adjust this parameter up or down.

5. Reduction of time for infrastructure maintenance.

6. The risk of downtime of business processes due to server failures is eliminated, since the application servers are located in the cloud. Virtual servers of providers are most often configured on a powerful physical base and located in large data centers, where possible downtime is calculated in minutes per year.

7. The use of public clouds and the absence of user contact with complex computer equipment makes it possible to refuse the services of additional IT specialists.

However, the public cloud model has some disadvantages:

1. The main disadvantage of the public cloud is the lack of control over the organization, since the performance of services is completely subordinate to the service provider.

2. Slow speed: The performance of public cloud services is directly dependent on the stability of the Internet connection, so data transfer may be slow in some cases. When handling large amounts of data, public clouds are inferior to private ones in terms of performance.

3. Weak data security is a common feature of public clouds. Private cloud protection is an order of magnitude more reliable.

In addition to private and public clouds, there is a hybrid cloud (hybrid cloud).

A hybrid cloud is a cloud infrastructure deployment model that provides a combination of private and public clouds and combines the benefits of each. The combination of these two models allows a company that already has a private cloud to use the resources of a public cloud. Thus, the organization has the opportunity, if necessary, to expand its own infrastructure at the expense of the computing resources of the public cloud.

Therefore, by choosing a hybrid cloud, a company gains the control and security of a private cloud with the scale and benefits of a public cloud.

Hybrid cloud features:

1. Empowering the private cloud. A hybrid cloud allows network users to access the applications they need in the private cloud through the public cloud, while maintaining the security of the private cloud.

2. Redistribution of the load. A hybrid cloud allows you to transfer part of the load from a private cloud to a public one, if necessary, which ensures a high level of performance.

3. Data security. To increase the level of data security, the hybrid cloud allows, if necessary, to store encrypted backups from a private cloud in the public cloud.

4. Mobility. With the ability to access certain applications from the private cloud through the public cloud, these applications can be accessed from anywhere in the world with an Internet connection.

2.2 Cloud service models (IaaS, PaaS, SaaS)

The concept of cloud computing is characterized by service models (levels) that perform certain functions. The cloud provides the following service levels:

Infrastructure as a Service (IaaS)

Platform as a Service (PaaS)

Software as a Service (Software as a Service, SaaS)

Fig 1. Cloud service models

Infrastructure as a Service, IaaS is the provision of computer infrastructure as a service based on the concept of cloud computing?. This service model consists of physical assets - network devices, servers, disks, and so on. When interacting with IaaS, the user does not control the underlying infrastructure. It manages data stores, the operating system, deployed applications, and network components.

IaaS relieves the company of the need to maintain complex IT infrastructures, data centers, client and network infrastructures. This reduces the associated capital and operating costs.

Platform as a service, PaaS is the provision of integrated? platform for developing, testing, deploying and maintaining a web application? as services.

PaaS is a service model where the client is given the opportunity to use the cloud infrastructure to host the underlying software and then host applications on it. This platform includes tools for creating and testing application software. These tools are provided by the cloud provider.

PaaS, as an integrated platform for developing, testing, deploying and maintaining a web application?, allows the whole list of operations? for developing, testing and deploying a web application? run in one integrated environment. This approach eliminates the cost of maintaining separate environments for each phase of application development.

Does the ability to generate source code and share it within the development team significantly improve app building productivity? based on PaaS.

Service as a Service, SaaS is an application deployment model that involves providing the application to the end user as a service on demand. The SaaS concept makes it possible to use software as a service and do it remotely via the Internet. This allows the client not to buy a software product, but only temporarily use it if necessary. In this case, the main advantage of the SaaS model for the client is the absence of costs associated with installing, updating and maintaining the equipment and software running on it.

The SaaS model is characterized by the following:

application can be used remotely

application is charged either as a monthly subscription fee or based on total transaction volume

no additional payment is required for application support

regular automatic updates

Multiple clients can use the app at the same time

SaaS target audience - end users.

To better describe the three service models, Table 1 describes their characteristics, advantages, disadvantages, and risks.

Table 1. Service models. Characteristics, advantages, disadvantages and risks

Service Models

Characteristics

Advantages

Disadvantages and risks

1. Typically platform independent;

2. Reduced infrastructure costs;

3. Payment upon use;

4. Automatic scaling.

3. Low implementation threshold;

4. Smooth scaling.

1. Efficiency and productivity depend on the service provider;

2. Potentially large long-term costs;

3. Centralization requires new methods of protection and security.

1. Uses cloud infrastructure;

2. Provides methods for dynamic project management.

Smooth version rollout.

Centralization requires new protection and security methods that ensure that malware cannot exploit vulnerabilities in the software platform.

1. User interface;

2. Interaction via API (Application Programming Interface);

3. Semantic compatibility.

1. Reduced hardware and labor costs;

2. Reducing the risk of losing investments;

3. Regular update.

Centralization requires new methods of protection and security, which are related to the confidentiality of customer data.

3. APPLICATION OF CLOUD TECHNOLOGIES IN BUSINESS

3.1 Choosing an IT Infrastructure for SMBs

A company can choose between the following IT infrastructures:

Internal IT infrastructure with own support

Managed services: IT infrastructure functions are transferred to services that are managed by third parties

Cloud IT infrastructure

Where the equipment is owned by a company, the company has an internally managed IT infrastructure. When comparing internal and cloud infrastructure, it is worth noting that cloud infrastructure has a significant advantage in terms of financial performance: when using cloud IT infrastructure, there is no need for capital investments that are necessary for its use.

When using an internal IT infrastructure, the company purchases expensive equipment and pays for the services of people who maintain this equipment. When one of the servers fails, the company needs to bear the financial costs of repairing and replacing equipment.

What happens when IT infrastructure functions are outsourced to third parties is that the organization pays the third party company that owns the servers. The company pays for equipment rental and maintenance.

In the event that one of the servers fails, the third party company that provides this service takes care of its repair and replacement. This company also makes sure that the necessary operating systems are installed on the servers, and manages the network infrastructure in which the servers operate.

A comparative analysis of IT infrastructure data can be carried out by considering the following aspects taken into account when choosing an IT infrastructure:

investment

ongoing operating costs

commissioning time

flexibility

personnel qualification requirements

reliability

Capital investments. The choice of an internal IT infrastructure involves a high capital investment, as the company itself purchases expensive equipment. In the case of managed services, the company has a more moderate capital investment: the company needs to pay an initial fee for using third-party equipment. Cloud IT infrastructure requires a small capital investment: as a rule, organizations do not incur any initial costs and mandatory payments.

Current operating costs. The current operating costs of the back-end infrastructure consist of wages for staff who maintain and operate the equipment, space provided by the hosting provider, and real estate, energy, and utilities.

In the case of managed services, ongoing operating costs vary depending on the terms of the contract. It is not uncommon for services to be charged for using a third-party service, but in this case the company usually knows how much it will have to spend each month. This amount usually does not change. When considering cloud IT infrastructure, it is worth noting that it can be expensive or cheap: it depends on the needs of the company itself, because. cloud infrastructure implies that the company pays only for the consumed resources and capacities.

Time to put into use. The internal IT infrastructure is characterized by a long time to bring a new component into use. This is because when using internal infrastructure, a company that wants to add a new component to its infrastructure must plan this work in advance, place an order for a new component, wait for its delivery and implement it in its data center. When a company uses a third-party service provider, the time it takes to bring a new component into use is usually shorter because such third-party companies pre-purchase equipment. In the case of a cloud infrastructure, a company can "deploy" a new server in minutes if the organization decides it needs it.

Flexibility. The internal IT infrastructure has poor flexibility as this type of infrastructure has severe limitations. There are common cases when there is an increase in resource requirements, and there is not enough disk space. The company can eliminate these needs only through new financial costs. Third party service providers have moderate flexibility. They can offer the company a temporary increase in disk space and resources. Cloud infrastructure is highly flexible. This lies in the fact that such an infrastructure provides the company with resources as needed. A company may not use resources when it does not need them.

Staff qualification requirements. The internal IT infrastructure requires highly qualified personnel. In this case, employees perform the following functions: understand the company's IT infrastructure, maintain and replace equipment, monitor the current state of operating systems, install updates for operating systems and software. In the case when the company uses the services of a third-party service provider, the requirements for personnel qualification are minimal. All issues related to IT infrastructure are handled by a third-party company that is paid for this. When using cloud infrastructure, the requirements for personnel vary and depend on how and what exactly the company uses.

Reliability. In the case of an internal IT infrastructure, reliability depends on a number of circumstances. Whether the information environment is highly fault-tolerant depends primarily on the qualifications of the company's employees and on the investment in the IT infrastructure. Third party service providers provide high reliability. When comparing third-party service providers with cloud infrastructure, it is worth noting that the latter lacks stability and service levels. Thus, the reliability of cloud infrastructure can be both moderate and high: it largely depends on the service provider.

Based on the foregoing, we can conclude that for small and medium-sized companies, having their own IT infrastructure is not appropriate, because. this type of infrastructure requires large capital investments and equipment maintenance costs. The choice of such an infrastructure is justified only in the case when the company, from the point of view of confidentiality and security, cannot store its data on the side.

Thus, today it is beneficial for companies to use the services of service providers or switch to the use of cloud infrastructure.

3.2 Benefits of cloud computing in business

Cloud technologies have a number of advantages. Next, I will consider each of them.

Availability. Cloud computing makes it possible to access products and services from any computer that has the ability to access the Internet.

client computers. When using cloud services, the company does not need to purchase equipment that has a large amount of memory and disks. The use of programs over the Internet does not require a company to have a large number of such computers. Also, the company does not need a large number of data carriers, because. all programs, services and documents are stored in the "cloud".

Reduce damage from data loss or equipment theft. When data is stored in the cloud, copies of that data are distributed across multiple servers, which may be located in different countries. Thus, in the event of theft or equipment failure, the company does not lose valuable data.

Reliability. Data centers are managed by qualified specialists who provide ongoing support for the operation of equipment and services. This fact indicates a sufficiently high level of reliability and fault tolerance of the system.

Profitability. The company pays only for those services and services that it uses. Cloud computing makes it possible to pay only for the resources actually used.

Resource rental. The need for computing resources is not constant: in some period of time, the company needs additional computing resources, in some period of time they are not necessary, that is, the resources are simply not used. Cloud technologies enable companies to use only the necessary amount of computing resources, thereby reducing the cost of equipment and its maintenance.

Software rental. Cloud technologies make it possible not to purchase software packages for each employee of the company. Instead, the company buys only the software it needs from the cloud. Purchased programs are used only by those employees who need these programs for work. It is worth noting that the cost of programs that are available via the Internet is lower than their local counterparts for PC. In the event that the programs are not used frequently by users, then they can not be bought, but rented by the hour. One of the main advantages of renting software from cloud providers is that the company does not need to spend money and time on updating programs and maintaining them in working condition at every workplace.

Service. With the introduction of cloud technologies, there are fewer physical servers, so it becomes easier and faster to maintain them. Considering the software, it is worth noting that it is installed and configured in the cloud. It's being updated there. The company always makes sure that the latest version of the program is used. In addition, there is no need to spend money on software updates.

open interfaces. Clouds usually have standard APIs (Application Programming Interfaces) to communicate with existing applications and to develop new ones.

Flexibility and scalability. This implies unlimited computing resources (memory, processors, disks, etc.). Cloud computing is resilient and scalable because resources are provisioned and released based on need.

Productive computing. Compared to a conventional PC, the computing power available to cloud computing users is limited only by the number of remote servers. This means employees can tackle more complex tasks that require a lot of memory and storage space. In other words, employees have the opportunity to work with a powerful computer without actually purchasing it by the company. Scalability manifests itself in the ability to run a large number of copies of the application on many virtual machines. The number of application copies can grow on demand, depending on the workloads.

Data storage. Personal computers have a limited amount of memory. When using cloud technologies, the company has the amount of data storage that it needs at a particular moment. There is no risk of running out of memory, because cloud technologies provide a huge amount of gigabytes of free space.

Technology for a young company. Cloud computing is a financially sound solution for a young company, because there is no need to purchase various expensive equipment and software, as well as to hire people who will support it.

3.3 Disadvantages of using cloud technologies in business

Despite a large number of advantages, cloud technologies have a number of disadvantages, including:

The need for a permanent connection to the network. Cloud computing almost always requires a constant Internet connection. This may cause some inconvenience to the company and affect the continuity of business processes, because. if there is no access to the network, then there are no programs or documents. In addition, it is not uncommon for cloud applications to require a stable and good Internet connection with high bandwidth, which can lead to programs running slower than if they were hosted locally rather than in the cloud.

Data security. When choosing a cloud provider, keep in mind that not all third-party providers can be trusted with their data. The company must be sure that the provider provides high-quality cloud services, has been working in this service market for more than one year and has a good reputation. Otherwise, the company may be at risk of losing confidential data.

The state on whose territory the data center is located may have access to any information that is stored in it. For example, in the United States (the country with the largest number of data centers at the moment), a provider company can disclose the fact of transferring confidential information only to its lawyers. This problem is key in the matter of storing confidential information in the cloud, which can be solved in several ways: encrypt information and not store the most valuable information with the provider. One way or another, companies using cloud technologies should take this point into account.

Functionality of cloud programs. Not all programs or their properties are available remotely. Today, if we compare the functionality of local and cloud programs, the latter are inferior to the former (for example, Google Docs and Microsoft Excel: the latter has more features and capabilities).

Cloud provider dependency. There is a risk that the provider may not back up the data and it may be lost. However, this risk is no higher than the risk that employees themselves may lose valuable data by losing a device or not making a timely backup of data on their PC.

Thus, the advantages of using cloud technologies are greater than the disadvantages. However, before making a choice whether to use cloud computing in its IT infrastructure, a company must correctly build an IT security strategy, taking into account all the risks when using cloud technologies.

4. PRACTICAL PART

4.1 Statement of the problem

In the main part of the work, a definition was given to cloud technologies, their main characteristics were considered, models of deployment and maintenance were studied. In addition, the benefits and risks of using cloud technologies were identified. In the practical part of the work, it is necessary to study a specific cloud solution for business and evaluate its effectiveness.

For the study, I chose the cloud solution Kaspersky Endpoint Security Cloud from Kaspersky Lab, which ensures the information security of the company. The problem of effective information security always remains relevant, because. the lack of due attention of the company to the protection of confidential data leads to an increased risk of information security incidents that can cause significant damage to the company.

The purpose of the practical part of the work is to determine the effectiveness of the use of cloud solutions offered for small and medium-sized businesses.

To achieve this goal, it is necessary to perform the following tasks:

Explore the capabilities of the Kaspersky Endpoint Security Cloud

Discover the benefits of this cloud solution

Evaluate the effectiveness of this cloud solution in small and medium-sized businesses

The practical part of the work contains a description of the cloud solution under study, its capabilities and advantages, as well as an assessment of its effectiveness in small and medium-sized businesses.

4.2 Problem solving

Today, the number of cyber threats is constantly increasing. Corporate data protection, efficient use of work time and high performance IT infrastructure are vital to the success of any business, regardless of size or location. Information security requirements are similar for companies of any size: protection of confidential data, business continuity, security of working devices. The result of a cyber attack on a poorly protected company can lead to serious consequences:

Loss of valuable data, including information constituting intellectual property

Leakage of confidential information about customers and employees

Violation of business processes, which directly affects the profitability of the business.

Not all companies can hire a qualified full-time IT administrator, let alone an IT security specialist. If large companies have the resources to protect their data efficiently and effectively, then small and medium-sized companies often cannot afford to allocate sufficient funds for information protection. According to Kaspersky Lab, small and medium-sized businesses suffer losses from information security incidents, but despite this, such companies often do not take effective measures to counter cyber threats. This leads to the fact that it is small and medium-sized businesses that become the target of intruders, because. there is no due attention to the protection of data and information of the company. The challenges inherent in small and medium-sized businesses typically include:

limited time for IT security

insufficient resources to administer complex solutions small (compared to large companies) IT budget

As a result, it is precisely these companies that cannot devote a large amount of resources to information security that need a software solution that does not require significant time and effort to deploy within the company, is easy to manage and does not require additional expensive resources. Kaspersky Endpoint Security Cloud (hereinafter referred to as KES) is just such a product, the main advantage of which is the cloud management console. In this cloud solution, access to all the necessary management functions is in the cloud. For small and medium businesses, it is important that Kaspersky Endpoint Security Cloud is an easy-to-manage product that does not require special technical knowledge. In particular, this is a big plus for small companies, which often cannot have several highly qualified IT specialists on their staff. Kaspersky Endpoint Security Cloud can be customized to the needs of the client using pre-installed scenarios adapted to the standard needs of any company. This includes creating multiple user groups with different access rights, blocking access to entertainment sites, blocking the use of USB drives, linking users' corporate and mobile devices to their accounts, and more. The choice of available scenarios can be expanded, allowing customers to use different functions depending on the number of employees, the number of offices and the company's business processes.

4.3 Product description

Kaspersky Endpoint Security Cloud is a solution that meets the needs of small and medium businesses, providing reliable protection for personal computers, mobile devices and file servers from the cloud management console. Choosing such a solution, the company does not need to purchase additional expensive equipment. Kaspersky Endpoint Security Cloud allows you to manage your information security system at any time, from any place and device connected to the Internet. This solution makes it possible to protect up to 250 workplaces.

The product is a cloud console designed for centralized management and client applications. To work with the Kaspersky Endpoint Security Cloud cloud console, you need an Internet connection and a browser:

Internet Explorer 10.0 and above;

Microsoft Edge 13.0 and above;

Chrome 36.0 and above;

Firefox 35 and above;

Safari 8.0 and above.

During operation, Kaspersky Endpoint Security Cloud uses the following Kaspersky Lab applications:

Kaspersky Endpoint Security 10 for Windows.

Kaspersky Security 10 for mobile devices.

Hardware and software requirements for your computer or mobile device meet the requirements of the programs and browsers listed above.

Kaspersky Endpoint Security Cloud supports the following platforms:

Winsows based computers

Windows file servers

Android and iOS mobile devices

Thus, KES is a software solution, the essence of which is the centralized management and protection of devices (PCs, mobile phones, tablets, etc.) of company employees.

Fig 2. Architecture of Kaspersky Endpoint Security Cloud

Key features of Kaspersky Endpoint Security Cloud include:

centralized installation and updating of Kaspersky Lab applications on PCs and mobile devices of company employees.

manage device settings and protect them with security profiles

managing user data, creating user groups, and assigning rights to users from the cloud.

Kaspersky Endpoint Security Cloud has a number of characteristic features:

1. The fastest possible deployment and easy management from the cloud console, flexible cloud administration. The cloud console of Kaspersky Endpoint Security Cloud is always ready for use. Centralized management is supported from the cloud console, which allows the administrator to manage the protection of the corporate network at any time from any device that has access to the Internet. This is convenient if the company does not have a system administrator who can be regularly present at the office. Thanks to remote security, a company may not hire a second administrator if the company has several offices, which saves the organization money. Due to the fact that the console is cloud-based, the company does not need to purchase and maintain additional equipment, which also makes it possible to save financial resources. Initial settings are quick, so deployment of Kaspersky Endpoint Security Cloud does not require a lot of time and effort.

Fig 3. Remote control of company devices

2. High level of protection for all types of devices. Multi-level protection of all devices used in the company is provided regardless of their territorial location. The main requirement is that the device can access the Internet.

Recognized Kaspersky Lab technologies protect Windows-based workstations, laptops and file servers from a variety of threats, including ransomware and ransomware. Device security is provided on many levels - protecting files from malware, protecting mail servers and Internet traffic. Protection is complemented by such effective technologies of the Laboratory as Firewall, Network Attack Protection and System Monitor. By default, the solution is configured taking into account the recommendations of Kaspersky Lab specialists. Device protection features of Kaspersky Endpoint Security Cloud for Windows-based workstations and file servers, as well as for smartphones and tablets are presented in Tables 2-3.

Table 2. Security features for Windows-based workstations and file servers

Windows based workstations and file servers

Malware Protection

Firewall

Web protection

Mail antivirus

System monitoring

Blocking network attacks

Controls

Web control

Device control

Table 3. Security features for mobile devices

Smartphones and tablets

Malware Protection

Antiphishing / Safe Browser

Call and SMS filtering

Password settings

Setting up corporate mail

Wi-Fi and Bluetooth control

Built-in camera control

Anti-Theft (remote lock/wipe data)

Manage iOS features

Not available

3. Centralized management. All protection functions can be configured and deployed from a single console on all devices - Windows workstations, laptops, file servers and Android/iOS mobile devices. With a simple and user-friendly interface, the IT security officer can quickly set up policies and apply them to all workplaces.

4. Preset security settings. There are preset settings based on the recommendations of Kaspersky Lab employees. Such settings allow you to provide full protection immediately after implementation.

5. A profitable solution for small and medium-sized companies. This solution enables companies to save money by eliminating the need to purchase additional equipment. All company devices can be protected remotely, eliminating the need to hire additional IT professionals. As a result, the protection of geographically distributed offices and company branches is simplified.

The main features of this cloud solution include the following:

1. Access control to devices and the Internet. Device control tools allow you to determine which devices are allowed access to the company's corporate network. At the same time, Web Control allows you to set security policies regarding the Internet, as well as monitor the use of employees' web resources. The administrator can block or restrict access to certain websites or categories of websites (for example, social networks).

2. Rapid deployment from the cloud. Due to the fact that all protection functions are managed from the cloud, there is no need to install the management console on a local server. The cloud console is always available on the website https://cloud.kaspersky.com/, which makes it possible to deploy the necessary software to all company devices (computers, file servers, mobile devices) directly from the cloud.

3. Easy management of mobile devices. Mobile device management tools (MDM, master data management) include functions that allow you to determine the access parameters of smartphones and tablets to the corporate network, set Wi-Fi and Bluetooth settings, control camera use, and adjust other settings. You don't need to purchase a separate management solution to manage iOS devices, as the iOS device management server is already deployed in the cloud.

4. Protection against mobile threats. Modern security technologies for mobile devices from Kaspersky Lab help protect mobile devices from various cyber threats, including ransomware. Anti-phishing tools (a set of technologies used to protect against online fraud and identity theft) protect against theft of confidential information or credentials on fake sites. Attempts of unauthorized flashing are immediately detected, for such devices access to the corporate network is blocked.

5. Protection of valuable data, including on lost devices. If an employee's mobile device is lost or stolen, the administrator can remotely lock the device from the cloud console or delete all corporate data from it, thereby avoiding the loss of important information.

The key functionality of the KES cloud console is presented in Table 4.

Table 4. Cloud console functionality

Functionality

Actions available to the administrator

User Account Management

View user accounts

Create account groups

Changing account information

Moving accounts between groups

Deleting accounts

Deleting account groups

User rights management

Grant a user administrative rights

Revoking administrator rights from a user

Device Management

Viewing a List of Devices and Device Properties

Connecting Windows Devices

Connecting mobile devices

Sending commands to mobile devices

Assigning an owner to a Windows device

Removing a device from the device list

Security profile management

Creating and configuring a security profile

Assigning a security profile to a user account or group of user accounts

Deleting a security profile

Managing files in the Quarantine section

Viewing files in the Quarantine section

Restoring files in the Quarantine and Backup categories

Removing files from the Quarantine section

Configuring general settings of Kaspersky Endpoint Security Cloud

Similar Documents

    History and development factors of cloud computing. The role of virtualization in the development of cloud technologies. Service models and principles of cloud services. Advantages of the cloud for Internet startups. Application of cloud computing technology in business.

    abstract, added 03/18/2015

    Implementation of "cloud" technologies in corporate information systems. Application of "cloud" technologies at RUE "Belorusneft". Commissioning, installation and launch of the cloud service, initial configuration and scaling proposals.

    term paper, added 07/24/2014

    The history of the emergence of cloud technologies. The essence and objectives of cloud technologies, their classification, advantages and disadvantages. Research on the use of cloud technologies on the example of Google drive. Comparison of Google Drive with Apple's analogue (iCloud).

    term paper, added 12/05/2016

    Creation and implementation levels of cloud computing. Advantages and disadvantages of using cloud technologies in organizing a single information space. Evaluation of the importance of criteria by the method of "Pairwise comparison", "Heat maps", "Expert assessments".

    thesis, added 04/08/2014

    The evolution of cloud services. Characteristics and classification of cloud services. Analysis of the possibilities of cloud services offered for use in small businesses. Analysis of the cost of ownership of a local solution for automating accounting activities.

    term paper, added 05/10/2015

    Analysis of cloud services for business automation and justification of the benefits of switching to cloud data processing. Types and models of cloud services for business, principles of their operation and characteristics. Tasks of business automation on the example of cloud solutions.

    thesis, added 09/06/2017

    Analysis of the structure and content of the company's marketing plan. The cloud computing market and the possibility of their application. Selection of sources of information and presentation of the results. Development of a software tool shell for cloud computing.

    thesis, added 11/12/2013

    The concept of cloud computing, its advantages and disadvantages; types of clouds. Comparative analysis of the risks of using cloud services in Russia and the EU. Regulators in the field of information security, their concepts, features and regulatory authorities.

    term paper, added 05/14/2014

    The history of the emergence of computer science. Apple products. Main categories, distinctive features, levels of cloud services. Characteristics of public and private clouds. Advantages and disadvantages of cloud computing, prospects for their development.

    test, added 08/06/2013

    The concept of cloud technologies is a convenient environment for storing and processing information that combines hardware, licensed software, communication channels and technical support for users. Advantages and Disadvantages of Dropbox.

And again, hello, dear readers! :) Let's talk about cloud technologies .

Tobish, today another note will be entirely devoted to a very entertaining and promising technology (so to speak, the "gold mine" of the IT industry), hiding under a pseudonym - cloud technologies or in the common people - "cloud".

We will talk about the very concept of cloud computing, give a variety of examples of its implementation (at the level of solutions for ordinary users), namely, we will talk about the theory, then we will smoothly move on to practice and a little .. we will move in the clouds :-)

Thus, the purpose of our note, as always, is good (it cannot be otherwise) - to systematize the basic information related to this topic and sort everything out.

So, Earthlings, get ready, now we will talk about cloud technologies, which, every day, are getting closer and closer to us.

We flew..

Cloud technologies. About everything, little by little

In recent years, this topic has become one of the most popular in IT-sphere, a lot of articles have been written about it, an even greater number of conferences have been held, and how many solutions already exist on the market (and are used to the fullest by us in everyday life, sometimes even unconsciously), cannot be counted at all.

However, as always, there is one "but", namely, the majority of users still do not even know what kind of "know-how" cloud technologies are and why they gave up at all. Well, we will correct the situation and we will start, as expected, from theory.

Cloud computing ( cloud computing) is a distributed data processing technology in which computer resources and capacities are provided to the user as an Internet service. If you explain in an accessible language, then this is your, in a sense, working platform on the Internet, or rather on a remote server.

Let's look at an example to make sure that almost every one of us, one way or another, has already come across this solution.

Do you have e-mail ( e-mail)? Of course have. So, if you work with mail on some service site (for example,) that allows you to use this mail, then this is nothing more than a cloud service, which is part of such a thing as cloud technologies. Or, for example, image processing.

If you downsize, flip your photo to photoshop or another special program, then you have nothing to do with cloud technology - everything happens and is processed locally on your computer. But if, having loaded an image, for example, through, you process it on the other side, that is, in the browser, then this is the very "cloud".

More details about cloud technologies

Actually, the whole difference lies solely in the method of storing and processing data. If all operations take place on your computer (using its capacities), then this is not a "cloud", and if the process takes place on a server on the network, then this is exactly the trendy contraption that is commonly called "cloud technology".

In other words, cloud technologies are various hardware, software, methodologies and tools that are provided to the user as Internet services to achieve their goals, objectives, projects.

As practice shows, the terms "cloud technology" / "cloud service", with their generally accepted graphical representation, in the form of "clouds", only confuses users, in fact, their structure can be easily understood if presented in the form of the following pyramid.

The base of the pyramid "infrastructure" is a set of physical devices (servers, etc.), above it is built a "platform" - a set of services and the top - software available at the request of users.

Also, you should know that cloud computing is a certain basis vector obtained as a result of the synthesis of a number of technologies and approaches (in a wiser! :-)). To make it clear what I mean, I will give the following diagram:

I think that now it has become a little clearer, since the scheme is quite simple. However, speaking generally, cloud technologies are such a kind of mess that performs calculations by servers and other things without directly involving the resources of your computer.

Do you want to know and be able to do more yourself?

We offer you training in the following areas: computers, programs, administration, servers, networks, site building, SEO and more. Find out the details now!

It may turn out that we will all return to computers that are close in power to, so to speak, the first and, in fact, will be just a screen with a microprocessor, and all calculations and capacities will be located and performed remotely, i.e. in somewhere there living servers, namely, in the cloud mentioned repeatedly.

Services provided by cloud systems

Everything about cloud computing(Further SS), usually called the word aaS. It is deciphered simply - " as a Service", i.e. "as a service", or "as a service".

Currently, cloud technologies and, in fact, their concept, involves the provision of the following types of services to its users:

  • Storage-as-a-Service("storage as a service")
    This is perhaps the simplest of SS-services, which is disk space on demand. Each of us has ever encountered a situation where an ominous warning appeared on the monitor: " The logical disk is full to free up space, remove unnecessary programs or data". Service Storage-as-a-Service allows you to save data in external storage, in the "cloud". For you, it will look like an additional logical drive or folder. The service is basic for the rest, since it is part of almost every one of them. Other similar services can serve as an example.
  • Database-as-a-Service("database as a service")
    Here it is rather more for admins, because this thing provides the ability to work with databases, as if DBMS has been installed locally. Moreover, in this case it is much easier to "share" projects between different performers, not to mention how much money you can save on and required for proper use DBMS in a large or even medium-sized organization.
  • Information-as-a-Service("information as a service")
    It gives you the ability to remotely use any kind of information that can change every minute or even every second.
  • Process-as-a-Service("process control as a service")
    Represents a remote resource that can link together multiple resources (such as services or data contained within the same "cloud" or other available "clouds") to create a single business process.
  • Application-as-a-Service("application as a service")
    Also, it may be called Software-as-a-Service("Software as a Service"). It is positioned as "on-demand software" that is deployed on remote servers and each user can access it via the Internet, and all updates and licenses for this software are regulated by the provider of this service. Payment, in this case, is made for the actual use of the latter. An example is Google Docs, Google Calendar etc. online programs.
  • Platform-as-a-Service("platform as a service")
    The user is provided with a computer platform with an installed operating system and some software.
  • Integration-as-a-Service("integration as a service")
    This is an opportunity to receive a complete integration package from the "cloud", including software interfaces between applications and control of their algorithms. This includes well-known services and features of enterprise application centralization, optimization, and integration packages ( EAI), but provided as a "cloud" service.
  • Security-as-a-Service("security as a service")
    This type of service provides users with the ability to quickly deploy products that allow for the secure use of web technologies, electronic correspondence, and a local network, which allows users of this service to save on deploying and maintaining their own.
  • Management/Governance-as-a-Service("administration and management as a service")
    Provides the ability to manage and set the operation parameters of one or many "cloud" services. These are mainly parameters such as topology, resource usage, virtualization.
  • Infrastructure-as-a-Service("infrastructure as a service")
    The user is provided with a computer infrastructure, usually virtual platforms (computers) connected to a network, which he independently configures for his own purposes.
  • Testing-as-a-Service("testing as a service")
    Provides the ability to test local or "cloud" systems using test software from the "cloud" (no hardware or software required in the enterprise).

For clarity, let's summarize all these services of the "cloud" architecture, in one scheme behind which cloud technologies are hidden (sorry, in English):

On which the classification of services is given, by type of service.

Now let's look at what cloud technologies are, so to speak, according to the form of ownership. Here, there are three categories:

  • public
  • Private
  • Hybrid.

Briefly for each:

  • public cloud IT infrastructure is used simultaneously by many companies and services. Users do not have the ability to manage and maintain this "cloud", and all responsibility for these issues rests with the owner of the resource. Any company and individual user can become a subscriber of the offered services.
    Examples are online services: Amazon EC2, Google Apps/Docs, Microsoft Office Web.
  • private cloud is a secure IT infrastructure controlled and operated for the benefit of a single organization. An organization can manage the private cloud itself or outsource this task to an external contractor. The infrastructure can be hosted either on the premises of the customer or at an external operator (or partly at the customer and partly at the operator).
  • hybrid cloud is an IT infrastructure that uses the best qualities of a public and private cloud in solving the task. Often this type is used when an organization has seasonal periods of activity, in other words, as soon as the internal IT infrastructure can not cope with current tasks, part of the capacity is transferred to the public "cloud" (for example, large amounts of statistical information), as well as to provide access to users to enterprise resources through the public cloud.

Confused? Nothing, we will soon analyze the examples and everything will fall into place;)

Cloud Computing Opportunities

Now consider the possibilities of cloud computing:

  • Access to personal information from any computer connected to the Internet
  • You can work with information from different devices (PCs, tablets, phones, etc.)
  • It doesn't matter what operating system you prefer to work in - web services work in the browser of any operating system
  • One and the same information, both you and others, can be viewed and edited simultaneously from different devices
  • Many paid programs have become free (or cheaper) web applications.
  • If something happens to your device (PC, tablet, phone), then you will not lose important information, since it is no longer stored in the device memory
  • Always at hand fresh and updated information
  • You always use the latest version of the software and do not need to keep track of updates
  • You can combine your information with other users
  • You can easily share information with loved ones or with people from anywhere in the world.

There are plenty of opportunities, however, there are also disadvantages (where without them), which should also be mentioned.

"Fly in the ointment" - disadvantages:

  • The need for a permanent connection.
    To access the services of the "cloud" you need a permanent connection to the Internet
  • Software and its "customization".
    There are restrictions on software that can be deployed on the "clouds" and provide it to the user. The user has limitations in the software used and sometimes does not have the ability to customize it for his own purposes
  • Confidentiality.
    The confidentiality of data stored in public clouds is currently controversial, but in most cases, experts agree that it is not recommended to store the most valuable documents for a company on a public cloud, since there is currently no technology which would guarantee 100% data privacy
  • Safety.
    The "cloud" itself is a fairly reliable system, however, when an attacker penetrates it, he gains access to a huge data warehouse. Another disadvantage is the use of systems in which, as a hypervisor, the kernels of standard operating systems are used (for example, Windows), which allows the use of viruses and system vulnerabilities
  • The high cost of equipment.
    To build your own cloud, you need to allocate significant material resources, which is not beneficial for newly created and small companies
  • Further monetization of the resource.
    It is possible that companies will decide in the future to charge users for the services they provide.

As you can see, there are two sides of the coin. However, this does not harm the development of technology, and maybe even spurs it on.

Cloud technologies - a view from the user's side. Solution Overview

We have come to perhaps the most interesting (and so beloved by many readers) part of the article - examples and, so to speak, practice. Here we will consider what solutions, services, programs already exist on the market and what you should pay attention to. Let's start with services:

  • iCloud
    cloud service iCloud from company Apple(replaced Mobile Me), fully automatic and free (albeit with a few functional limitations). It stores your various content (mail, calendar, contacts, documents, music, videos and images, etc.) on servers, and then delivers it to all devices ( iPhone, iPad, iPod touch,MacandPC) using wireless technology Push.
  • Google Play
    Fresh cloud service called Google Play from the "corporation of kindness", which is designed for users to place movies, music, applications and books on servers specially designed for storing digital information. Access to the service is provided directly from the browser, regardless of OS, and therefore can be carried out both from a PC and from mobile devices based on Android. Each user has the ability to place and store up to 20 -ty thousand music records for free, as well as directly download to the server purchased in stores ( Android Market,Google Music and Google eBookstore) digital goods - movies, e-books, programs, music tracks, both purchased and rented.
  • OnLive
    I think that everyone knows the service, since I already wrote about it. Provides the ability to play modern games even on the simplest and weakest computer. Technically, it looks like this: the game itself is located on a remote server and the graphics are processed there, which is sent to the computer to the user already in a “ready” form. Simply put, those calculations that are performed during a normal game on a computer, etc., are already performed here on the server, and your computer is used only as a monitor that receives the final picture. If you do not understand, then all this means that all problems with computer performance and the amount of free hard disk space are automatically removed, because even installation is not required. In addition, there is no need to pay quite a lot of money immediately for a product (game, etc.) that you will not necessarily like. In addition, it is no secret that most games do not want to be played again, so it turns out that the cost of several hours (or even several days) of pleasure is unreasonably high. Much more convenient would be the option in which you would pay only for the time that you play. Or - you would pay some small fixed amount monthly, which would allow you to play any of the available games without restrictions. This is what it offers OnLive.
  • Xbox Live
    Another notorious gaming service that also provides rich Internet functionality and is related to cloud technologies. The essence of the service is that the owners of set-top boxes Xbox 360 and CPC on the base Windows Phone 7, can play computer games with each other and communicate, as well as buy add-ons and various multimedia content, in the online store. It turns out that the service creates a kind of virtual universe for gamers, the components of which are located not on end-user consoles, but in the cloud.

Thus, the last two services offer games as a service. Now let's imagine that we are not talking about games, but about software. That is, you pay not for the product as such (for a box with a disc), but for the specific functions/opportunities that it provides you. Interesting? Here's to me :)

Small note

And since we, as users, are most interested in software (and not all sorts of platforms as a service), now we will consider the “software landscape” ( SaaS) clouds. In other words, let's give the most popular software solutions that, within the concept of cloud technologies, actually exist on the market now.

Actually, according to SaaS-concepts, as mentioned above, you do not pay at a time when buying a product, but as if renting it. Moreover, you use exactly those functions that you need (and, accordingly, pay for them). For example, once a year you need a certain program and you are not going to use it more often. So why buy a product that will lie idle?

And why waste space on it (in the apartment, if it's a box with a disk, or on a hard drive, if it's a file)? That's right, why not, because there is an alternative - a free online service (providing the full functionality of this program).

Working with documents in the cloud

It was along this path that two headliners of the IT industry (and also competitors) went - Google and Microsoft. Both companies have released sets of services that allow you to work with documents.

From the side Google- it's theirs Google Docs(now Google Drive):

Free online office that includes a word processor, spreadsheet and "stray" for creating presentations, as well as an Internet service cloud file storage with file sharing features.

This is web-based software, that is, a program that runs within a web browser without installation on the user's computer, i.e. a kind of alternative version of any Word, excel and so on without the need to purchase and all that. Documents and tables created by the user are stored on a special server Google or can be exported to a file.

This is one of the key advantages of the program, since the entered data can be accessed from any computer connected to the Internet (while access is password protected).

From the side Microsoft- it's theirs Microsoft Office Web Apps:

Applications Microsoft Office Web Apps, allow you to use the possibilities Microsoft Office, through a web browser and work with documents (and not only view them, but also edit them) directly on the website where they are stored.

Thus, documents look exactly the same in the browser as in programs. office, i.e. complete, so to speak, unification.

It is also worth noting that both services are closely interconnected with mail ( gmail in the first case and hot mail in the second) and file storages, tobish, to use Google Docs, just create a free Google account and you will receive a set of programs for working with texts, spreadsheets, etc., right in your browser. For many, Google Docs completely replaced, as already mentioned above, paid MS Ooffice.

To summarize (for these two services), we can say that the user is transferred from his usual offline environment to online.
We go further.

Cloud technologies and data storage

Cloud file storage is no less popular. The most famous repository is considered..

  • dropbox.
    You may have several computers, but with the help of this cloud storage you can make a shared folder with files for all your PCs and even smartphones. The most interesting thing is that you don’t have to do any special actions here, because the operating system itself will perceive the shared folder, like all other folders on the hard drive, and the dropbox will simply take care of synchronization. The service allows you to store up to 2 GB of data. The main emphasis in it is on synchronization and information exchange. dropbox keeps a history of downloads so that after deleting files from the server it is possible to restore data, plus a history of file changes is kept, which is available for the period of the last 30 days.
  • Windows Live Sky Drive.
    Service skydrive allows you to save up to 7 GB (and you can exchange files up to 100 MB) of information organized using standard folders. For images, a preview mode is provided, as well as the ability to show them as slides. In addition to the fact that the service is integrated with Microsoft Office, it also supports the new operating system (more specifically, the client skydrive built into applications Metro and allows you to upload documents and photos to the "cloud" in one click, open files from remote storage).
  • And of course Google Drive. There will be a separate article about it.

By the way, not only all sorts of offices and file storages use cloud technologies. For example, in the camp of the fight against digital "evil spirits" they also relied on cloud computing. And here is the result - free antivirus Panda Cloud Antivirus.

It is based on the innovative technology of "collective intelligence" (which automatically detects new threats in a minimum period of time) and allows you to minimize the impact of protection on computer system resources, using the computing power of cloud technologies for most operations: analysis, blocking and attempts to remove malware.

Antivirus servers use information received from millions of users of antivirus products Panda around the world to automatically detect and classify new types of malware that appear every day.

In a nutshell, something like this, although there are still a lot of services that could be told about, but then you have to write a volume of War and Peace :)
So let's get to the bottom line.

Cloud technologies. Cloudy or clear?

To put it quite simply, the cloud is an opportunity to always have guaranteed and secure access to all your personal information, as well as avoiding the need to keep a lot of extra things in your pocket (all flash drives, disks, wires, and everything else) or buy a new computer/components / programs / games, etc. There is no doubt that at the moment, cloud technologies are one of the most popular and interesting topics in IT-sphere and more and more interesting solutions appearing in the world are connected precisely with them.

Of course, it is still difficult for an ordinary user to fully appreciate (and reveal) their full potential, but what it is is visible to the naked eye.

Thus, without a doubt, the future of cloud technologies seems to be very bright, because such giants ( Microsoft, Apple and Google) they just don’t do anything for sure and it’s completely clear that if they have already entered this unexplored territory, they are clearly not going to leave it, because two years ago the concept "cloud" seemed just a beautiful idea and a bold experiment, and today even those people who are not connected with software development, web technologies and other highly specialized things (the above-mentioned Xbox Live, Windows Live, OnLive, Google Docs are prime examples of this).

Afterword

Something like that. I hope that the information was interesting, useful and exciting for you. Stay with the project - you are always welcome here;)

As usual, if you have questions, additions, and other differences, then comments are at your service.

PS: For the existence of this article, thanks to a member of the team 25 FRAME

Top Related Articles