Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Universities, the Pioneers of Private Clouds

Reputed innovators, universities crave the cutting edge. They need to keep current. They need to trailblaze. It’s how they can continue to advance academic status and attract fresh talent. For this reason, it makes sense that university IT departments aren’t shy about investigating and participating in the latest and greatest technology trends—including virtualization and cloud computing.

Reputed innovators, universities crave the cutting edge. They need to keep current. They need to trailblaze. It’s how they can continue to advance academic status and attract fresh talent. For this reason, it makes sense that university IT departments aren’t shy about investigating and participating in the latest and greatest technology trends—including virtualization and cloud computing.

Private Cloud InnovationFor the most part, these IT groups face similar challenges as their counterparts in the enterprise world. Even with limited budgets and finite resources, they are under constant pressure to streamline business processes and lower costs even more. At the same time, they are responsible for continuing to provide state-of-the-art resource-rich environments that enable them to meet and uphold service-level agreements and data security standards.

The Pursuit of New Technologies

To succeed in doing more with less, many universities became early adopters of virtualization, benefitting from server consolidation, improved energy efficiency, and cost savings and consequently enabling some of the U.S.’s largest private clouds.

For universities, private clouds offer a new approach to delivering IT services. They promise not only to cut hardware and software expenditures, but also facilitate and hasten the ability to meet departmental demands for compute and network resources.

This type of internal cloud environment provides on-demand computing resources, use-based service models, and on-the-fly up-and-down system scalability to deal with spikes in demand for a particular application or service. A university is able to offer the CPU, storage, and access to high-end networking-as-a-service to departments across the university, thus saving money that would otherwise be spent on new hardware for a large, disparate number of departments.

Security, The University Private Cloud Enabler

For a university private cloud to work, the IT department has to ensure that the resources of each college or department are isolated properly from one another and those communications paths among departments follow university security policies. This is extremely important because like enterprise networks, university networks are subject to regulatory compliance for maintaining the privacy and safekeeping of student records (FERPA), protecting financial and credit card information (PCI), and ensuring the confidentiality of patient data stored within medical colleges (HIPAA), among others.

And perhaps unlike tightly managed business networks, university cloud computing environments are at greater risk from information loss and misuse since these are environments for broad use and experimentation by their very design. So when it comes to putting high-value or security-intense data on virtual machines in the private cloud, university IT departments know that they must also provision their cloud with security measures. These security measures must allow for highly granular access control and selective isolation of VM groups that restrict use and mitigate the risks to which one college’s academic pursuits may subject another.

Advertisement. Scroll to continue reading.

So if the college of engineering is testing computer viruses on their portion of the cloud, the medical college can house patient data on its VMs with complete faith that traffic from one will automatically be prevented from reaching the other. The accidental migration or motion of a VM to the wrong part of the cloud should also be prevented. This type of “security bubble” system, which some virtualization security vendors call hypervisor-based, mitigates the risks of cross-pollinating traffic, and makes the pursuit of higher education in the cloud a reality.

Read More in SecurityWeek’s Cloud and Virtualization Security Section

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Kim Larsen is new Chief Information Security Officer at Keepit

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Cloud Security

Microsoft and Proofpoint are warning organizations that use cloud services about a recent consent phishing attack that abused Microsoft’s ‘verified publisher’ status.