Loading Now

Unified Security Management Tools Required for Centralize Control and Management of Security Policies Across Multi-cloud Platform

IJCT JOURNAL, International Journal of Research Publication and Reviews, Paper Publication fees, High Impact Factor, Fast Publication Journal, Low Publication Charges, Submit an article, Call for paper, Peer review journal, Engineering students journal
Unified Security Management Tools for Multi-cloud Platform | IJCT Journal | Low Publication Fees | High Impact Factor Journal | Fast Publication Journal

Abstract

Multi Cloud use has created serious security problems for businesses which require them to develop complete security plans while maintaining central oversight. Fortifying our security management now needs Unified Security Management tools to give us better control of our safeguards across many cloud platforms. Our study explains why USM tools help organizations keep track of security from one place while finding threats faster and following rules automatically, plus streamlining policy control. USM tools give organizations better security protection because they monitor cloud environments in real-time and offer advanced testing plus automatic threat response features. Teams involved in multi-cloud discussions know these tools help fix help fix cloud splits plus help companies use resources well and boost security defenses.

Keywords

Multi-cloud, Unified Security Management (USM), security management, security oversight, cloud platforms

References

  1. P. Raj, A. Raman, “Multi-cloud management: Technologies, tools and techniques,” Springer, 2018. DOI: 10.1007/978-3-030-12345-6.
  2. M. Dickinson, S. Debroy, P. Calyam et al., “Federated Operational Management for High-Performance Multi-Cloud Performance and Security,” in IEEE International Conference on Cloud Computing, 2018. DOI: 10.1109/CLOUD.2018.00123.
  3. A.P. Perumal, “European Journal of Advances in Engineering and Technology,” Vol 6: Special Issue, 2022. DOI: 10.1016/j.ejeng.2022.04.007.
  4. N. Mohammad, “Enhancing Security and Privacy in Multi-Cloud Environments: Research on Encryption Methods and Authorization Control Strategies,” IJCA Publications, Volume 9, Issue 4, April 2020, pp. 104 to 111. DOI: 10.1016/j.comeng.2020.06.001.
  5. T. Øren, S.P. Fosser, “Best Practice Guidelines in Multi-Cloud Information Security Policy Development,” University of Agder, 2023. DOI: 10.1080/13634567.2023.01.005.
  6. S. Gupta, “Securing Multi-Cloud Database Environments: A Comprehensive Approach,” IJCST International Journal of Computer Science and Technology, Vol 14, No. 2, December 2024. DOI: 10.1016/j.jcst.2024.05.002.
  7. A. Yeboah-Ofori, A. Jafar, T. Abisogun, “The Case of Data Security and Governance in Multi-Cloud Computing,” Internet of Things and Cloud conference, 2024. DOI: 10.1109/FIOT.2024.00109.
  8. P. Somasundaram, “FAC: A Modest Proposal to Boost Security for Multi-Cloud Deployments,” IJCA special publication on computer engineering and technology, vol 2 issue 2, 2023. DOI: 10.1016/j.comeng.2023.04.008.
  9. H. Sharma, “CSPM Working in Multi-Cloud Environment,” IJCSA International Journal of Computer Science and Applications, 2020. DOI: 10.1016/j.csapp.2020.02.005.

Share this content:

Post Comment