What is cloud technology? Application of cloud technologies. Cloud technologies. Basic concepts and types of cloud services

Lecture Cloud technologies

Cloud technologies (computing) are distributed data processing technologies in which computer resources and power are provided to the user as an Internet service.

The main types of cloud technologies include:

    " InfrastructureHowservice" (“Infrastructure as a Service” or “IaaS”)

    " PlatformHowservice" ("Platform as a Service", " PaaS")

    "Software as a service"(“Software as a Service” or “SaaS”).

Let's take a closer look at each of these technologies.

Infrastructure as a Service (IaaS)

IaaS is the provision of computer infrastructure as a service based on the concept of cloud computing.

IaaS consists of three main components:

    Hardware (servers, storage systems, client systems, network equipment)

    Operating systems and system software (virtualization tools, automation tools, basic resource management tools)

    Middleware (e.g. systems management)

IaaS is based on virtualization technology, which allows the user of the equipment to divide it into parts that correspond to the current needs of the business, thereby increasing the efficiency of using available computing power. The user (company or software developer) will only have to pay for the server time, disk space, network bandwidth and other resources that he really needs to work. In addition, IaaS provides the customer with a complete set of management functions in one integrated platform.

IaaS eliminates the need for enterprises to maintain complex data center, customer, and network infrastructures, while also reducing the associated capital expenditures and operating costs. In addition, additional savings can be achieved by providing the service within a sharing infrastructure.

Platform as a Service (PaaS)

PaaS is the provision of an integrated platform for developing, testing, deploying and maintaining web applications as a service.

To deploy web applications, the developer does not need to purchase hardware and software, and there is no need to organize their support. Access for the client can be organized on a rental basis.

This approach has the following advantages:

    scalability;

    fault tolerance;

    virtualization;

    safety.

Scalability PaaS involves automatic allocation and release of the necessary resources depending on the number of users served by the application.

PaaS as an integrated platform for developing, testing, deploying and supporting web applications will allow the entire range of operations for developing, testing and deploying web applications to be performed in one integrated environment, thereby eliminating the cost of supporting separate environments for individual stages.

The ability to create and share source code within a development team significantly improves productivity in building applications based on PaaS.

Software as a service (SaaS).

SaaS– an application deployment model that involves providing the application to the end user as an on demand service. Such an application is accessed via the network, and most often via an Internet browser. In this case, the main advantage of the SaaS model for the client is the absence of costs associated with installing, updating and maintaining the functionality of the equipment and software running on it. The target audience is end consumers.

In the SaaS model:

    the application is adapted for remote use;

    one application can be used by several clients;

    payment for the service is charged either as a monthly subscription fee or based on the total volume of transactions;

    application support is already included in the payment;

    Application upgrades can be carried out smoothly and transparently for customers by maintenance staff.

From the point of view of software developers, the SaaS model makes it possible to effectively combat unlicensed use of software, due to the fact that the client cannot store, copy and install the software.

In fact, SaaS software can be considered as a more convenient and profitable alternative to internal information systems.

The development of SaaS logic is the concept WaaS (Workplace as a Service - workplace as a service). That is, the client receives at his disposal a virtual workplace fully equipped with everything necessary for the operation of the software.

    Communications (VoIP)

    Antispam and antivirus

    Project management

    Distance learning

    Data storage and backup

All three types of cloud services are interconnected and represent a nested structure.

In addition to various methods of providing services, there are several options for deploying cloud systems:

Private cloud- used to provide services within one company, which is both a customer and a service provider. This is an option for implementing the “cloud concept” when a company creates it for itself, within the organization. First of all, implementation private cloud eliminates one of the important questions that certainly arises among customers when familiarizing themselves with this concept - the question of data protection from the point of view of information security. Since the “cloud” is limited by the company itself, this issue is resolved using standard existing methods. For private cloud characterized by a reduction in the cost of equipment due to the use of idle or inefficiently used resources. And also, reducing the cost of purchasing equipment by reducing logistics (we don’t think about which servers to buy, in what configurations, what productive capacities, how much space to reserve each time, etc.

In essence, power increases in proportion to the overall growing load, not depending on each task that arises - but, so to speak, on average. And it becomes easier to plan, purchase and implement - launch new tasks into production.

Public cloud- used by cloud providers to provide services to external customers.

Mixed (hybrid) cloud- joint use of the two above deployment models

Cloud (dispersed) computing(English) cloud computing, the term is also used Cloud (dispersed) data processing) - a data processing technology in which computer resources and power are provided to the user as an Internet service.

The user has access to his own data, but cannot manage and does not have to care about the infrastructure, operating system and the actual software with which he works. The term "Cloud" is used as a metaphor based on the image of the Internet on a computer network diagram, or as an image of a complex infrastructure behind which all the technical details are hidden. According to an IEEE document published in 2008, “Cloud computing is a paradigm in which information is permanently stored on servers on the Internet and temporarily cached on the client side, such as personal computers, game consoles, laptops, smartphones, etc. ."

Cloud data processing as a concept includes the concepts:

  • "Everything as a service"
  • "Infrastructure as a service"
  • "Platform as a service"
  • "Software as a service"
  • "Data as a service"
  • "Workplace as a service"
  • other technological trends, which have in common the belief that the Internet is able to meet the data processing needs of users.

For example, Google Apps provides online business applications that are accessed using an Internet browser while the software and data are stored on Google servers. The Google Chrome OS operating system is designed to work with the cloud.

Although the term “cloud computing” is well-established, in Russian it has a different meaning than the original. “Cloud” has another meaning besides cloud, namely scattered; the actual meaning of “absent-minded” is implied in English terminology.

For cloud computing, the main assumption is that the resource demand from the client(s) is uneven. To smooth out this unevenness to provide service, another layer is placed between real hardware and middleware - server virtualization. Servers running applications are virtualized and load balancing is carried out both by software and by means of distributing virtual servers over real ones.

Criticism

The concept of cloud computing has been criticized by the free software community and in particular by Richard Stallman:

You should not use web applications for your computing processes, for example, because you lose control over them. And it's no better than using any proprietary program. Do your calculations on your computer, using programs that respect your freedom. If you use any proprietary program or someone else's web server, you become defenseless. You become a toy in the hands of the one who developed this software.

- "Cloud computing is a trap, warns GNU founder Richard Stallman", interview with The Guardian newspaper (English)

What are cloud services really?

Cloud computing evokes a whole range of emotions. "In the networking space, this phrase is emblematic of today's times," says Gartner senior analyst Ben Pring, and many of his colleagues agree. But the problem is that everyone interprets the term “cloud data processing” in their own way.

Often the word "cloud" refers to the entire Internet: that is, everything that is outside the computer's firewall automatically ends up in the "cloud" - including traditional outsourcing. Others see cloud services as an updated version of utility computing: essentially virtual servers accessible over the Internet.

If you are looking for a way to expand the IT capabilities of your enterprise and do not yet plan to invest in creating a new infrastructure, attracting new personnel and retraining employees, or licensing new software, then sooner or later you will come to the idea of ​​cloud services. These types of services are available in real time via the Internet and significantly expand existing IT capabilities.

Today, cloud services are still in their infancy: a “motley” team of large and small providers is ready to provide you with many equally “motley” services based on cloud technology: from full-featured applications to data storage and spam filtering services. If you require several types of such services, then most likely you will have to connect each of them separately - perhaps even from different providers. Of course, as this area develops, larger providers - aggregators and integrators of cloud services - are beginning to appear, but so far there are very few of them. In the meantime, let's look at what types of cloud services exist today.

SaaS (Software As a Service)

This type of cloud service uses a multi-tenant architecture: it provides access to a single application to thousands of clients through a browser. The abbreviation SaaS stands for Software-as-a-Service - software as a service, as opposed to SaaP - Software-as-a-Product - when you buy a software product “in a box”. This type of service is convenient for the consumer in that it does not require upfront investment in a server or software licensing.

SaaS services are based on subscription principle: the software runs on the provider’s side and is leased to subscribers, with payment depending on the number of users, transaction volume, etc. It is also convenient that applications can be customized to meet specific user needs. One of the most successful players in the SaaS market today is Salesforce.com.

Utility IT services (utility computing)

The idea of ​​utility IT services is not new, but today this form of cloud services is experiencing a rebirth, thanks to such “monsters” as Amazon.com, Sun, IBM and many other companies offering access to storage devices and virtual servers upon customer demand. Previously, such services were used mainly for auxiliary purposes, but today they can even replace part of an enterprise data center.

Other providers offer solutions that help IT companies create virtual data centers from public servers: for example, using memory, I/O devices, storage and computing resources as a virtual pool accessible over the network.

Cloud web services

Close to SaaS are web service providers that offer APIs that developers can use over the Internet - without having to download a full-featured application.

These types of services are offered by a wide range of providers: from companies providing individual business services (including traditional credit card processing services) to full-scale APIs provided by, for example, Google.

Platform as a service

Another SaaS option. This form of cloud services provides a development environment as a service. You build your own applications running on the provider's infrastructure. Your users work with applications via the Internet - from the provider's servers.

These services are limited by the design and capabilities of the vendor, so here you will not get complete freedom to fly with your imagination, but you can fully count on predictability and pre-integration. An example is Google App Engine.

Managed services

One of the oldest forms of cloud services. The company providing these services is called MSP (managed service provider). This includes the full range of services - from software delivery to remote monitoring and full IT infrastructure support.

This category includes email virus scanning services, application monitoring services, various Managed security services, anti-spam services and desktop management services.

Commercial service platforms

A hybrid of SaaS and MSP. This type of cloud computing service is most often used by commercial companies: with their help, users can order a sightseeing tour or, for example, secretarial services from one common platform, and the service will provide them with the necessary information in accordance with the search parameters and prices entered by the user.

Internet integration

Today, the integration of cloud services is in the initial phase of its development. OpSource recently introduced the OpSource Services Bus topology, using integration technology from a small startup called Boomi. SaaS provider Workday acquired CapeClear, an ESB (enterprise service bus) provider aimed at B2B integration. Since 2005, Grand Central has strived to become a one-stop "bus in the cloud" provider and bring together smaller SaaS providers to deliver integrated solutions to end users.

But in general, interconnections between different cloud services are still quite rare today. Therefore, some prefer, instead of the phrase “cloud computing” - “cloud services”, to use the term “sky computing” - “heavenly service”, i.e. a system consisting of many isolated “cloud” services, to each of which IT clients must connect separately.

On the other hand, as virtualization and SOA (Service Oriented Architecture) gradually make their way into the enterprise, the idea of ​​connected services is beginning to gain more attention. According to some forecasts, in the future, every enterprise should become a “cloud” node. But this task is unlikely to be solved in the near future - rather, this represents a long-term trend with a distant horizon.

MBOU Secondary School No. 9, Karabanovo

REPORT

In computer science

"Cloud technologies"

Completed: Plotnikov M.I.

Class 11A student

Chapter 1. The concept of “Cloud technologies”

Chapter 2. History of the emergence of cloud technologies

Chapter 3. Overview of cloud products

Chapter 4. Examples of “cloud technologies”

Chapter 5. Pros and cons of cloud technologies

Chapter 6. Prospects for the development of cloud technologies

Conclusion

Bibliography

Introduction

Everything is changing, the world does not stand still, and most Internet users are also changing their attitude towards the World Wide Web. The reason for this is “cloud technologies”, which set the “fashion” for using the Internet and storing files on the Internet. It is “behind the cloud” that Facebook, Amazon, Twitter and those “engines” on which services like Google Docs and Gmail are based now operate. All this is good, but so far it remains for the uninitiated only words, pompous and incomprehensible. So how does it work anyway?

Despite the fact that such terms as “cloud technologies” or “cloud computing” have long been heard by many, nevertheless, very few people understand what exactly cloud technology is.

At first glance, it may seem that everything is too confusing to delve into. In fact, this technology is very simple and almost every one of us has been using it for a long time, without even thinking about it. For example, all social networks, file hosting services, YouTube, email clients, banking services and much more operate on the cloud.



In simple terms, cloud technology involves the use of a computer/web application located on remote servers through a user-friendly user interface or application format. Businesses and companies use various types of applications in the cloud, such as for customer relationship management (CRM), human resources, accounting, and other organizational needs.

Target: studying the issue of the emergence and development of “Cloud technologies”.

The work aims to: tasks :


  • formulate the concept of “Cloud technologies”,

  • talk about the main platforms using clouds,

  • present the positive and negative aspects of the service,

  • highlight prospects for further development in the world.

Chapter 1. The concept of “Cloud technologies”

Cloud technologies are data processing technologies in which computer resources are provided to the Internet user as an online service. The word “cloud” is present here as a metaphor, personifying a complex infrastructure that hides all the technical details behind it.

Cloud (scattered) computing (English cloud computing, the term Cloud (scattered) data processing is also used) is a data processing technology in which computer resources and power are provided to the user as an Internet service. The user has access to his own data, but cannot manage and does not have to care about the infrastructure, operating system and the actual software with which he works. The term "Cloud" is used as a metaphor based on the image of the Internet on a computer network diagram, or as an image of a complex infrastructure behind which all the technical details are hidden. According to an IEEE document published in 2008, “Cloud computing is a paradigm in which information is permanently stored on servers on the Internet and temporarily cached on the client side, such as personal computers, game consoles, laptops, smartphones, etc. ."

Cloud data processing as a concept includes the concepts:

infrastructure as a service

platform as a service,

software as a service,

data as a service

workplace as a service

and other technological trends, which have in common the belief that the Internet is able to meet the data processing needs of users.

For cloud technologies, the most important feature is the uneven demand for Internet resources from users. To smooth out this unevenness, another intermediate layer is used - server virtualization. Thus, the load is distributed between virtual servers and computers.

Cloud technologies is one big concept that includes many different concepts that provide services. For example, software, infrastructure, platform, data, workplace, etc. Why is all this needed? The most important function of cloud technologies is to meet the needs of users who need remote data processing.

What is not considered cloud computing? The first is offline computing on a local computer. Secondly, this is “utility computing”, when the service of performing particularly complex calculations or storing data arrays is ordered. Thirdly, this is collective (distributed) computing (grid computing). In practice, the boundaries between all these types of calculations are quite blurred. However, the future of cloud computing is still much larger than communal and distributed systems.

Cloud data storage (English: cloudstorage) is an online storage model in which data is stored on numerous servers distributed over the network, provided for use by clients, mainly by third parties. In contrast to the model of storing data on your own dedicated servers, purchased or rented specifically for such purposes, the number or any internal structure of servers is generally not visible to the client. The data is stored, as well as processed, in the so-called cloud, which, from the client’s point of view, is one large virtual server. Physically, such servers can be located remotely from each other geographically, even located on different continents.

In order to understand what a “cloud” is, it’s worth starting with the history of this issue. It is necessary to understand: is this technology really in the category of new ideas or is this idea not so new.

The concept of "Cloud technologies"

Cloud technologies- These are data processing technologies in which computer resources are provided to the Internet user as an online service. The word “cloud” is present here as a metaphor, personifying a complex infrastructure that hides all the technical details behind it.

Cloud (scattered) computing (English cloud computing, also used the term Cloud (scattered) data processing) is a data processing technology in which computer resources and power are provided to the user as an Internet service. The user has access to his own data, but cannot manage and does not have to care about the infrastructure, operating system and the actual software with which he works. The term "Cloud" is used as a metaphor based on the image of the Internet on a computer network diagram, or as an image of a complex infrastructure behind which all the technical details are hidden. According to an IEEE document published in 2008, “Cloud computing is a paradigm in which information is permanently stored on servers on the Internet and temporarily cached on the client side, such as personal computers, game consoles, laptops, smartphones, etc. d."

Cloud data processing as a concept includes the concepts:

  • 1) infrastructure as a service
  • 2) platform as a service
  • 3) software as a service
  • 4) data as a service
  • 5) workplace as a service

and other technological trends, which have in common the belief that the Internet is able to meet the data processing needs of users.

For cloud technologies, the most important feature is the uneven demand for Internet resources from users. To smooth out this unevenness, another intermediate layer is applied - server virtualization . Thus, the load is distributed between virtual servers and computers.

Cloud technologies is one big concept that includes many different concepts that provide services. For example, software, infrastructure, platform, data, workplace, etc. Why is all this needed? The most important function of cloud technologies is to meet the needs of users who need remote data processing.

What is not considered cloud computing? The first is offline computing on a local computer. Secondly, this is “utility computing”, when the service of performing particularly complex calculations or storing data arrays is ordered. Thirdly, this is collective (distributed) computing (grid computing). In practice, the boundaries between all these types of calculations are quite blurred. However, the future of cloud computing is still much larger than communal and distributed systems.

Cloud data storage-- an online storage model in which data is stored on numerous servers distributed over the network, provided for use by clients, mainly by third parties. In contrast to the model of storing data on your own dedicated servers, purchased or rented specifically for such purposes, the number or any internal structure of servers is generally not visible to the client. The data is stored, as well as processed, in the so-called cloud, which, from the client’s point of view, is one large virtual server. Physically, such servers can be located remotely from each other geographically, even located on different continents.

In order to understand what a “cloud” is, it’s worth starting with the history of this issue. It is necessary to understand: is this technology really in the category of new ideas or is this idea not so new.

Send your good work in the knowledge base is simple. Use the form below

Students, graduate students, young scientists who use the knowledge base in their studies and work will be very grateful to you.

Posted on http:// www. allbest. ru//

Posted on http:// www. allbest. ru//

INTRODUCTION

For many years, information technology has been inextricably linked with business. This is due to the fact that information technology provides opportunities to improve business efficiency. To remain competitive, companies need to not only keep up with trends and new technologies, but also apply them. These technologies include cloud computing, which is increasingly gaining popularity in the business world.

Cloud computing is a model for providing ubiquitous and convenient network access to a shared pool of configurable computing resources that can be quickly provisioned and released with minimal operational costs or service provider calls. The essence of cloud technologies is to provide clients with remote access to services, computing resources and applications via the Internet.

The relevance of this topic is due to the fact that the use of cloud technologies makes it possible to effectively solve business problems. The introduction of cloud technologies leads to significant changes in the organization, including:

Reduced investment in IT

Reduce IT maintenance resources

Productivity increase

Business adaptability

Disaster recovery

Increasing Capacity and Availability

Despite the effectiveness of these technologies, many companies do not use them, preferring other methods of deploying IT infrastructure. Thus, such companies begin to yield to their competitors, because Business efficiency largely depends on the information technologies used. Thus, today the issue of using cloud technologies in business is relevant, because companies need to know and apply the most effective technologies to improve their business processes that affect the profitability of the organization.

The purpose of this work is to identify how effective the use of cloud technologies in business is. To achieve this goal, I need to complete the following tasks:

1. Define cloud technologies, describe their main characteristics, identify the advantages and disadvantages of using cloud technologies in business

2. Identify the opportunities that cloud technologies provide to companies

3. Explore the functions and capabilities of the Kaspersky Endpoint Security Cloud cloud solution from Kaspersky Lab

4. Assess the effectiveness of using the cloud solution under study in small and medium-sized businesses

This work consists of a main and practical part. The main part contains 3 chapters that define cloud technologies, describe models for deploying and maintaining cloud technologies, and identify the advantages and disadvantages of using cloud technologies in business. In the practical part of the work, I examine the cloud solution Kaspersky Endpoint Security Cloud and evaluate the effectiveness of its use in small and medium-sized businesses.

cloud business kaspersky

1. CONCEPT OF CLOUD TECHNOLOGY

1.1 Definition

Today, cloud computing is one of the most popular areas of information technology development. Modern conditions of the information world require the solution of many tasks that can be effectively performed using cloud technologies. Many of the world's largest IT companies use cloud computing, which confirms the effectiveness of these technologies.

Cloud technologies represent a universal environment for storing and processing information, which combines hardware, licensed software, communication channels, as well as technical support for users. Cloud technologies also mean the ability to obtain the necessary computing power upon request from the Internet. Today, large data centers allow not only storing and processing data in their centers, but also make it possible to create your own virtual data centers. This allows companies to avoid wasting resources on building their infrastructure from scratch.

The main feature of cloud technologies is scalability: these technologies are not strictly tied to a hardware platform, nor are they tied to a geographic territory. The use of cloud technologies in companies is aimed at reducing costs and increasing the efficiency of business processes.

Cloud technologies are data processing technologies in which computer resources are provided to the Internet user as an online service. Thanks to this, the user works with cloud services from anywhere and from any device: the main thing is to have access to the Internet. You can access the “cloud” not only via the Internet, but also via a local network. In this case, the user's computer is a terminal connected to the Network. Those computers that perform cloud computing are “cloud computing.” The load is distributed automatically between such computers.

The cloud has three main components:

Cloud computing. Cloud computing refers to the architecture of computer data processing. Cloud architecture provides opportunities for self-service, scale and flexible processes. This architectural solution replaces fixed costs with variable ones and provides ample opportunities for data analysis.

Cloud platforms. Cloud platforms include tools, software and information models, system software and other technologies that perform tasks.

Cloud services. Cloud services are models for providing information services.

The development of cloud technologies has a huge impact on business. In order to have an advantage over competitors, companies need to take into account modern trends in information technology. Companies that use cloud technologies in their business processes receive a number of benefits. Cloud computing is an approach to business process management that reduces the complexity of information systems. This is achieved through the use of cloud computing, self-managed and available on demand within a virtual infrastructure.

Thus, companies have the following advantages from using cloud computing: reduced IT costs, improved quality of service, and business dynamism. The reduction in IT costs is due to the fact that cloud technologies reduce operational and capital costs: thanks to the cloud, a company's IT specialists can focus on strategic projects without wasting time on managing their own data center.

Cloud technologies work as follows: companies, instead of purchasing, installing and managing their own servers to run applications, rent servers (for example, from Microsoft or Google). The user controls these servers via the Internet. Payment only includes the actual use of servers for processing and storing data.

Computing clouds consist of a huge number of servers located in data centers. Data centers support tens of thousands of applications that are used simultaneously by millions of concurrent users. Full automation is a prerequisite for efficient management of infrastructure of this scale.

Thus, the use of cloud technologies is becoming a trend and companies need to be aware of them and use them effectively to improve business processes.

1.2 Characteristics of cloud technologies

In order for information resources to be classified as cloud technologies, they must have the following key properties: have high availability and scalability, and be cost-effective for the client. In order to distinguish cloud technologies from other earlier approaches to the provision of hardware and software resources, the following main characteristics of cloud computing are distinguished:

1. Wide network availability

2. Easy scalability, elasticity

3. Monitoring capability

4. Consumption accounting

5. Self-service on demand

6. Pooling resources

Wide network accessibility means that software products, resources and services are available to the user over the network, no matter what device is used. The user can use a personal computer, laptop, tablet, mobile phone or any other terminal device - the main thing is to have access to the network.

Easy scalability consists of connecting (or disconnecting) additional hardware or software devices. This happens without additional delays with the supplier, automatically.

Clouds are equipped with a monitoring system that allows you to monitor the stability of operation and assess availability.

The following characteristic is especially important for business, because directly affects the monetary resources spent on IT. It is economically beneficial that when using cloud technologies there is consumption accounting. The client does not spend money on resources that are not used. The resources consumed are taken into account (for example, the number of users and transactions, the amount of data storage used), and based on this accounting, the supplier evaluates the services provided to the client in monetary terms.

On-demand self-service enables the customer to manage their computing needs. Such needs include server time, speed of access and data processing, and the amount of stored data. The client can exercise such control without direct contact with the service provider.

Finally, resource pooling means that the provider combines resources to serve a large number of consumers into a single pool in order to dynamically distribute power among consumers as demand for capacity constantly changes. Thus, clients monitor only the basic parameters (data volume, access speed, etc.), and the actual distribution of resources is monitored by the service provider.

2. MODELS OF DEPLOYMENT AND MAINTENANCE OF CLOUD TECHNOLOGIES

2.1 Cloud deployment models

Typically, the following cloud deployment models are distinguished: private, public and hybrid cloud.

The main models are public cloud and private cloud. A public cloud provides cloud services and resources to a large number of customers using public data centers. A private cloud provides the organization’s own infrastructure. Speaking about the public cloud, it is worth noting that it allows you to convert all relevant costs into operational costs and ensures a quick and budget-friendly launch of an IT solution. With a private cloud, capital investment is saved while maintaining full control of the IT infrastructure.

If we talk in more detail about the private cloud, it should be noted that a private cloud is an infrastructure that is located within one organization. The private cloud is designed to meet the needs of internal workers while providing a high level of data security.

Today, businesses are placing more and more demands on IT technologies. A private cloud allows you to solve problems such as providing a large number of business services and optimizing costs. By deploying a private cloud, a company reduces risks associated with information security and guarantees high availability of IT resources, despite the possible high load on servers.

Speaking about the advantages of a private cloud, we can note the following:

1. Compared to the public cloud, the company has more opportunities to control the IT infrastructure, because all its components remain on the company’s side.

2. High level of security. This is ensured by the fact that the service is consumed by one organization, so the infrastructure can be optimally configured to meet the data protection requirements of that organization.

3. High performance. It is connected, in particular, with the fact that all operations take place within the framework of internal firewalls and means of protecting the perimeter of the corporate network. Thanks to this, data transfer is fast.

4. When implementing a private cloud, the efficiency of the IT department increases - at any time it can quickly deploy the required service. IT specialists only need to “pick up” the virtual machine from the template and install the required service.

Despite their advantages, private clouds have a number of disadvantages:

1. Significant costs at all stages of the cloud life cycle. The deployment phase requires investment in hardware and software.

In addition, a private cloud must be managed, which entails administration and specialist costs.

2. Compared to the public cloud, the risks of service failure or data loss due to physical threats are much more significant.

3. The company may face a lack of space in the cloud when infrastructure resources may not be enough.

Analyzing the above, we can conclude that the most significant disadvantage of a private cloud is the need to spend a significant amount of human and material resources for its creation and further operation. This significantly affects the financial condition of the organization.

Moving on to the public cloud, it is worth saying that a public cloud is an infrastructure designed for free use by several organizations. This cloud model can be owned by multiple companies. Despite this, the word “public” does not mean that user data is available to absolutely everyone. The public cloud implements security mechanisms to control access. Ease of configuration and low cost are the main advantages of public cloud deployment. The provider does all the work associated with creating the cloud, and the client only configures the amount of resources he needs.

In the case of a public cloud, the consumer uses the infrastructure of a third-party provider, which creates many opportunities for efficient use and redistribution of resources. Public cloud services are easy and efficient to use, as clients require nothing more than a stable Internet connection to access applications.

Speaking about the advantages of the public cloud, it is worth noting the following:

1. Ease and efficiency of use.

2. To access applications, you only need a stable Internet connection.

3. Using a public cloud makes it possible to reduce IT costs due to the absence of expenses for hardware and software.

4. Flexibility and scalability: the public cloud allows you to pay for exactly as many resources as are required at the moment, and adjust this parameter up or down.

5. Reducing time for infrastructure maintenance.

6. The risk of business process downtime due to server failures is eliminated, since application servers are located in the cloud. Providers' virtual servers are most often configured on a powerful physical base and located in large data centers, where possible downtime amounts to minutes per year.

7. The use of public clouds and the lack of user contact with complex computer equipment makes it possible to refuse the services of additional IT specialists.

However, the public cloud model has some disadvantages:

1. The main disadvantage of the public cloud is the lack of control on the part of the organization, since the performance of services is completely subordinate to the service provider.

2. Slow speed: The performance of public cloud services directly depends on the stability of the Internet connection, so in some cases data transfer may be slow. When handling large volumes of data, public clouds are inferior in performance to private clouds.

3. Poor data security is a characteristic feature of public cloud environments. Private cloud security is much more reliable.

In addition to private and public clouds, there is a hybrid cloud.

Hybrid cloud is a cloud infrastructure deployment model that provides a combination of private and public clouds and combines the benefits of each separately. The combination of these two models allows a company that already has a private cloud to leverage the resources of the public cloud. Thus, the organization has the opportunity, if necessary, to expand its own infrastructure using the computing resources of the public cloud.

Therefore, when choosing a hybrid cloud, a company gains the control and security of a private cloud with the scale and benefits of a public cloud.

Hybrid cloud features:

1. Expanding the capabilities of the private cloud. Hybrid cloud allows network users to access the applications they need in a private cloud through a public cloud, while the security of the private cloud remains the same.

2. Load redistribution. A hybrid cloud allows, if necessary, to transfer part of the load from a private cloud to a public one, which ensures a high level of performance.

3. Data security. To increase the level of data security, a hybrid cloud allows, if necessary, to store “backups” from a private cloud in encrypted form in a public cloud.

4. Mobility. Thanks to the ability to organize access to certain applications from a private cloud through a public cloud, it is possible to work with these applications from anywhere in the world as long as you have an Internet connection.

2.2 Cloud technology service models (IaaS, PaaS, SaaS)

The cloud computing concept is characterized by service models (layers) that perform specific functions. The cloud provides the following service levels:

Infrastructure as a Service (IaaS)

Platform as a Service (PaaS)

Software as a Service (SaaS)

Figure 1. Cloud technology service models

Infrastructure as a service, IaaS is the provision of computer infrastructure as a service based on the concept of cloud computing? This service model consists of physical assets - network devices, servers, disks, etc. When interacting with IaaS, the user does not control the underlying infrastructure. It manages the data stores, operating system, deployed applications, and network components.

IaaS relieves a company of the need to maintain complex IT infrastructures, data centers, client and network infrastructures. This helps reduce associated capital costs and operating costs.

Platform as a service, PaaS - is it the provision of an integrated service? platforms for developing, testing, deploying and maintaining web applications? as services.

PaaS is a service model where the client is given the opportunity to use a cloud infrastructure to host basic software and then host applications on it. Such a platform includes tools for creating and testing application software. These tools are provided by the cloud provider.

PaaS, as an integrated platform for developing, testing, deploying and supporting web applications, allows the entire range of operations? for developing, testing and deploying a web application? run in one integrated environment. This approach eliminates the cost of maintaining separate environments for each stage of application development.

Does the ability to create and share source code within the development team significantly improve productivity in creating an application? based on PaaS.

Service as a Service, SaaS, is an application deployment model that involves providing the application to the end user as an on-demand service. The SaaS concept makes it possible to use software as a service and do it remotely over the Internet. This allows the client not to buy a software product, but only temporarily use it when the need arises. In this case, the main advantage of the SaaS model for the client is the absence of costs associated with installing, updating and maintaining the equipment and software running on it.

The SaaS model is characterized by the following:

the application can be used remotely

The application is charged either as a monthly subscription fee or based on total transaction volume

no additional payment is required for application support

regular automatic updates

The application can be used by several clients at the same time

The target audience of SaaS is end consumers.

To more accurately describe the three service models, Table 1 describes their characteristics, advantages, disadvantages and risks.

Table 1. Service models. Features, Advantages, Disadvantages and Risks

Service models

Characteristics

Advantages

Disadvantages and risks

1. Typically platform independent;

2. Reduced infrastructure costs;

3. Pay as you go;

4. Automatic scaling.

3. Low threshold for implementation;

4. Smooth scaling.

1. Efficiency and performance vary by service provider;

2. Potentially large long-term costs;

3. Centralization requires new methods of protection and security.

1. Uses cloud infrastructure;

2. Provides dynamic project management techniques.

Seamless version deployment.

Centralization requires new security and protection methods that ensure that malware cannot exploit vulnerabilities in the software platform.

1. User interface;

2. Interaction via API (application programming interface);

3. Semantic compatibility.

1. Reduced costs for hardware and labor resources;

2. Reducing the risk of loss of investment;

3. Regular updates.

Centralization requires new methods of protection and security that are related to the confidentiality of client data.

3. APPLICATION OF CLOUD TECHNOLOGY IN BUSINESS

3.1 Selecting an IT infrastructure for small and medium-sized businesses

A company may have a choice between the following IT infrastructures:

Internal IT infrastructure with self-support

Managed services: IT infrastructure functions are transferred to services that are managed by third parties

Cloud IT infrastructure

In the case where the equipment is owned by the company, the company has an IT infrastructure with internal management. If we compare internal and cloud infrastructure, it is worth noting that cloud infrastructure has a significant advantage in terms of financial performance: when using a cloud IT infrastructure, there is no need for capital investments that are necessary for its use.

When using internal IT infrastructure, a company purchases expensive equipment and pays for the services of people who maintain this equipment. When one of the servers fails, the company must bear the financial costs of repairing and replacing equipment.

When transferring IT infrastructure functions to third-party companies, the following happens: the organization pays a third-party company that owns the servers. The company pays for equipment rental and maintenance.

If one of the servers fails, the third-party company that provides this service takes care of its repair and replacement. This company also makes sure that the necessary operating systems are installed on the servers and manages the network infrastructure on which the servers operate.

A comparative analysis of these IT infrastructures can be carried out by considering the following aspects taken into account when choosing an IT infrastructure:

investment

ongoing operating costs

commissioning time

flexibility

personnel qualification requirements

reliability

Investments. The choice of internal IT infrastructure involves high capital investments, because... The company itself purchases expensive equipment. With managed services, the company has a more modest investment: the company must pay an initial fee to use the third party's equipment. Cloud IT infrastructure requires low capital investment: as a rule, organizations do not incur any initial costs or mandatory payments.

Ongoing operating costs. Ongoing operating costs for on-premises infrastructure consist of the costs of salaries for personnel who maintain and operate the equipment and the costs of space provided by the hosting provider, as well as real estate, energy and utility costs.

For managed services, ongoing operating costs vary depending on the terms of the contract. Often the fees for using a third-party service can be expensive, but in this case the company usually knows how much it will have to spend each month. This amount usually does not change. When considering cloud IT infrastructure, it is worth noting that it can be expensive or cheap: it depends on the needs of the company itself, because cloud infrastructure means that the company pays only for the resources and capacity consumed.

Time of putting into use. The internal IT infrastructure is characterized by a long time to put a new component into use. This is because when using internal infrastructure, a company that wants to add a new component to its infrastructure must plan this work in advance, place an order for the new component, wait for it to be delivered, and implement it in its data center. When a company uses the services of a third-party service provider, the time to bring a new component into use is usually shorter because such third-party companies purchase equipment in advance. With cloud infrastructure, a company can “spinning up” a new server in a matter of minutes if the organization decides it needs one.

Flexibility. The internal IT infrastructure has poor flexibility because... this type of infrastructure has severe limitations. There are common cases where there is an increase in resource demands and there is not enough disk space. The company can eliminate these needs only through new financial costs. Third party service providers have moderate flexibility. They can offer the company a temporary increase in disk space and resources. Cloud infrastructure is highly flexible. This is because such an infrastructure provides the company with resources as needed. A company may not use resources when it does not need them.

Requirements for personnel qualifications. Internal IT infrastructure requires highly qualified personnel. In this case, employees perform the following functions: understand the company’s IT infrastructure, support and replace equipment, monitor the current state of operating systems, install updates to operating systems and software. When a company uses the services of a third-party service provider, the requirements for personnel qualifications are minimal. All issues related to IT infrastructure are resolved by a third-party company that is paid for it. When using cloud infrastructure, personnel requirements vary and depend on how and what exactly the company uses.

Reliability. In the case of internal IT infrastructure, reliability depends on a number of circumstances. Whether an information environment has high fault tolerance primarily depends on the qualifications of the company's employees and the investment in IT infrastructure. Third-party service providers provide high reliability. When comparing third-party service providers with cloud infrastructure, it is worth noting that the latter lacks stability and service levels. Thus, the reliability of the cloud infrastructure can be either moderate or high: it largely depends on the service provider.

Based on the above, we can conclude that for small and medium-sized companies having their own IT infrastructure is not advisable, because This type of infrastructure requires large capital investments and equipment maintenance costs. The choice of such an infrastructure is justified only if the company, from the point of view of confidentiality and security, cannot store its data on the side.

Thus, today it is profitable for companies to use the services of service providers or switch to using cloud infrastructure.

3.2 Benefits of using cloud technologies in business

Cloud technologies have a number of advantages. Next I will consider each of them.

Availability. Cloud technologies make it possible to access products and services from any computer that has Internet access.

Client computers. When using cloud services, a company does not need to purchase equipment with a large amount of memory and disks. Using programs via the Internet does not require a company to have a large number of such computers. Also, the company does not need a large number of storage media, because all programs, services and documents are stored in the cloud.

Reduce damage from data loss or equipment theft. When data is stored in the cloud, copies of this data are distributed across several servers, which may be located in different countries. This way, if equipment is stolen or fails, the company does not lose valuable data.

Reliability. Data centers are managed by qualified specialists who provide ongoing support for the operation of equipment and services. This fact indicates a fairly high level of reliability and fault tolerance of the system.

Economical. The company pays only for those services that it uses. Cloud technologies make it possible to pay only for the resources actually used.

Rental of resources. The need for computing resources is not constant: at some period of time the company needs additional computing resources, at some period of time they are not necessary, that is, the resources are simply not used. Cloud technologies enable companies to use only the required amount of computing resources, thereby reducing the cost of equipment and its maintenance.

Software rental. Cloud technologies make it possible not to purchase software packages for each company employee. Instead, the company buys only the software it needs in the cloud. Purchased programs are used only by those employees who need these programs for work. It is worth noting that the cost of programs that are available via the Internet is lower than their local counterparts for the PC. If the programs are not used frequently by users, then they can be rented at an hourly rate rather than purchased. One of the main advantages of renting software from cloud providers is that the company does not need to spend money and time on updating programs and maintaining them in working order at each workplace.

Service. With the introduction of cloud technologies, there are fewer physical servers, so it becomes easier and faster to maintain them. When considering the software, it is worth noting that it is installed and configured in the cloud. Its update takes place there. The company always makes sure that the latest version of the program is used. In addition, there is no need to spend money on software updates.

Open interfaces. Clouds typically have standard APIs (application programming interfaces) for communicating with existing applications and for developing new ones.

Flexibility and scalability. This implies unlimited computing resources (memory, processors, disks, etc.). Cloud technologies are elastic and scalable because resources are allocated and released based on need.

Performance computing. Compared to a regular PC, the computing power available to cloud computing users is limited only by the number of remote servers. This means employees can tackle more complex tasks that require large amounts of memory and storage space. In other words, employees have the opportunity to work with a powerful computer without the company actually purchasing it. Scalability manifests itself in the ability to run a large number of copies of the application on many virtual machines. The number of application copies can increase on demand, depending on the load.

Data storage. Personal computers have limited memory. When using cloud technologies, a company has the amount of data storage that it needs at a particular moment. There is no risk of running out of memory space because... cloud technologies provide a huge number of gigabytes of free space.

Technology for a young company. Cloud technologies are a financially viable solution for a young company, because... there is no need to purchase various expensive equipment and software, as well as to hire people who will support it.

3.3 Disadvantages of using cloud technologies in business

Despite the large number of advantages, cloud technologies have a number of disadvantages, including:

The need for a constant connection to the network. Cloud technologies almost always require a constant Internet connection. This may cause some inconvenience to the company and affect the continuity of business processes, because... If there is no access to the network, then there are no programs or documents. In addition, often cloud-based applications require a stable and good Internet connection with high bandwidth, which leads to the fact that programs can run slower than if they were located locally rather than in the cloud.

Data security. When choosing a cloud provider, you must take into account that not all third-party providers can be trusted with your data. The company must be sure that the provider provides high-quality cloud services, has been working in this service market for many years and has a good reputation. Otherwise, the company may be at risk of losing confidential data.

The state in whose territory the data center is located may have access to any information stored in it. For example, in the USA (the country with the largest number of data centers at the moment), the provider company can disclose the fact of transfer of confidential information only to its lawyers. This problem is key to the issue of storing confidential information in the cloud, which can be solved in several ways: encrypt the information and not store the most valuable information with the provider. One way or another, companies using cloud technologies must take this point into account.

Functionality of cloud programs. Not all programs or their features are accessible remotely. Today, if we compare the functionality of local and cloud programs, the latter are inferior to the former (for example, Google Docs and Microsoft Excel: the latter has more functions and capabilities).

Dependency on cloud provider. There is a risk that the provider may not back up the data and it may be lost. However, this risk is no greater than the risk that employees themselves may lose valuable data by losing a device or failing to back up data on their PC in a timely manner.

Thus, the advantages of using cloud technologies outweigh the disadvantages. However, before making a choice whether to use cloud computing in its IT infrastructure, a company must competently build an IT security strategy, taking into account all the risks when using cloud technologies.

4. PRACTICAL PART

4.1 Problem statement

The main part of the work defined cloud technologies, examined their main characteristics, and studied deployment and maintenance models. In addition, the advantages and risks of using cloud technologies were identified. In the practical part of the work, it is necessary to study a specific cloud solution for business and evaluate its effectiveness.

For my research, I chose the Kaspersky Endpoint Security Cloud cloud solution from Kaspersky Lab, which ensures the company’s information security. The problem of effectively ensuring information security always remains relevant, because... the company's lack of proper attention to the protection of confidential data leads to an increased risk of information security incidents that can cause significant damage to the company.

The purpose of the practical part of the work is to determine the effectiveness of using cloud solutions offered for small and medium-sized businesses.

To achieve this goal, it is necessary to complete the following tasks:

Explore the capabilities of the Kaspersky Endpoint Security Cloud cloud solution

Identify the benefits of this cloud solution

Assess the effectiveness of using this cloud solution in small and medium businesses

The practical part of the work contains a description of the cloud solution under study, its capabilities and advantages, as well as an assessment of its effectiveness in small and medium-sized businesses.

4.2 Problem solution

Today, the number of cyber threats is constantly increasing. Enterprise data protection, efficient use of work time and high-performance IT infrastructure are vital to the success of any business, regardless of its size or location. Information security requirements are similar for companies of any size: protection of confidential data, continuity of business processes, security of work devices. The result of a cyber attack on a poorly protected company can lead to serious consequences:

Loss of valuable data, including information constituting intellectual property

Leakage of confidential information about clients and employees

Violation of business processes, which directly affects business profitability.

Not all companies can hire a qualified full-time IT administrator, let alone an IT security specialist. While large companies have the resources to efficiently and effectively protect their data, small and medium-sized companies often cannot always afford to allocate sufficient funds for information protection. According to Kaspersky Lab, small and medium-sized businesses suffer losses from information security incidents, but despite this, such companies often do not take effective measures to counter cyber threats. This leads to the fact that small and medium-sized businesses become the target of attackers, because... there is no due attention to the protection of company data and information. Challenges inherent to small and medium-sized businesses typically include:

limited time for IT security

insufficient resources for administering complex solutions; small (compared to large companies) IT budget

As a result, it is precisely those companies that cannot devote a large amount of resources to information security that need a software solution that does not require significant time and effort to deploy within the company, is easy to manage and does not require additional expensive resources. Kaspersky Endpoint Security Cloud (hereinafter KES) is just such a product, the main advantage of which is the cloud management console. In this cloud-based solution, access to all necessary management functions is in the cloud. For small and medium-sized businesses, it is important that Kaspersky Endpoint Security Cloud is an easy-to-manage product that does not require special technical knowledge. In particular, this is a big plus for small companies, which often cannot have several highly qualified IT specialists on their staff. Kaspersky Endpoint Security Cloud can be customized to the client's needs using predefined scripts adapted to the standard needs of any company. This includes creating multiple user groups with different access rights, blocking access to entertainment sites, blocking the use of USB drives, linking users' corporate and mobile devices to their accounts, and much more. The choice of available scenarios can be expanded, allowing clients to use different functions depending on the number of employees, number of offices and business processes of the company.

4.3 Product Description

Kaspersky Endpoint Security Cloud is a solution that meets the needs of small and medium businesses, providing reliable protection for personal computers, mobile devices and file servers from a cloud-based management console. By choosing this solution, the company does not need to purchase additional expensive equipment. Kaspersky Endpoint Security Cloud allows you to manage your information security system at any time, from any location and device that is connected to the Internet. This solution makes it possible to protect up to 250 jobs.

The product consists of a cloud console designed for centralized management and client applications. To work with the Kaspersky Endpoint Security Cloud cloud console, you need an Internet connection and a browser:

Internet Explorer 10.0 and higher;

Microsoft Edge 13.0 and higher;

Chrome 36.0 and above;

Firefox 35 and above;

Safari 8.0 and above.

During operation, Kaspersky Endpoint Security Cloud uses the following Kaspersky Lab programs:

Kaspersky Endpoint Security 10 for Windows.

Kaspersky Security 10 for mobile devices.

The hardware and software requirements of your computer or mobile device meet the requirements of the programs and browsers listed above.

Kaspersky Endpoint Security Cloud supports the following platforms:

Windows based computers

Windows File Servers

Android and iOS mobile devices

Thus, KES is a software solution, the essence of which is the centralized management and protection of devices (PCs, mobile phones, tablets, etc.) of company employees.

Fig 2. Architecture of Kaspersky Endpoint Security Cloud

Key features of Kaspersky Endpoint Security Cloud include:

centralized installation and updating of Kaspersky Lab programs on the PCs and mobile devices of company employees.

Manage device settings and protect them using security profiles

managing user data, creating user groups, and assigning rights to users from the cloud.

Kaspersky Endpoint Security Cloud has a number of characteristic features:

1. The fastest possible deployment and simple management from the cloud console, flexible cloud administration. The Kaspersky Endpoint Security Cloud cloud console is always ready for use. Centralized management is supported from the cloud console, which allows the administrator to manage the security of the corporate network at any time from any device that has access to the Internet. This is convenient if the company does not have a system administrator who can be regularly present in the office. Thanks to remote protection, a company may not need to hire a second administrator if the company has several offices, which saves the organization money. Due to the fact that the console is cloud-based, the company does not need to purchase and maintain additional equipment, which also makes it possible to save financial resources. Initial setup is quick, so deploying Kaspersky Endpoint Security Cloud does not require much time or effort.

Figure 3. Remote management of company devices

2. High level of protection for all types of devices. Multi-level protection of all devices used in the company is provided regardless of their geographical location. The main requirement is that the device can access the Internet.

Recognized Kaspersky Lab technologies protect Windows-based workstations, laptops and file servers from a variety of threats, including ransomware and other ransomware. Device security is ensured at many levels - protecting files from malware, protecting mail servers and Internet traffic. Protection is complemented by such effective Laboratory technologies as Firewall, Protection against network attacks and System Monitor. The default solution is configured taking into account the recommendations of Kaspersky Lab specialists. Device protection functions of Kaspersky Endpoint Security Cloud for Windows-based workstations and file servers, as well as for smartphones and tablets, are presented in Tables 2-3.

Table 2. Security features for Windows-based workstations and file servers

Windows-based workstations and file servers

Malware protection

Firewall

Web protection

Mail antivirus

System monitoring

Blocking network attacks

Controls

Web control

Device Control

Table 3. Security features for mobile devices

Smartphones and tablets

Malware protection

Anti-Phishing / Safe Browser

Call and SMS filtering

Password settings

Setting up corporate mail

Wi-Fi and Bluetooth control

Built-in camera control

Anti-Theft (remote data blocking/wiping)

iOS feature management

Not available

3. Centralized management. All protection functions can be configured and deployed from a single console on all devices - Windows-based workstations, laptops, file servers and Androis/iOS-based mobile devices. Thanks to a simple and user-friendly interface, an employee responsible for IT security can quickly set up policies and apply them to all workstations.

4. Preset security settings. There are preset settings based on recommendations from Kaspersky Lab employees. Such settings allow you to provide full protection immediately after implementation.

5. A profitable solution for small and medium-sized companies. This solution allows companies to save money by eliminating the need to purchase additional equipment. All company devices can be protected remotely, eliminating the need to hire additional IT specialists. As a result, the protection of geographically distributed offices and branches of the company is simplified.

The main features of this cloud solution include the following:

1. Control access to devices and the Internet. Device control tools make it possible to determine which devices are allowed access to a company's corporate network. At the same time, Web Control allows you to set security policies regarding the Internet, as well as monitor the use of web resources by employees. The administrator can prohibit or restrict access to certain websites or categories of websites (for example, social networks).

2. Fast deployment from the cloud. Due to the fact that all protection functions are managed from the cloud, there is no need to install a management console on a local server. The cloud console is always available on the website https://cloud.kaspersky.com/, which makes it possible to deploy the necessary software directly from the cloud to all company devices (computers, file servers, mobile devices).

3. Easy management of mobile devices. Mobile device management (MDM, master data management) tools include functions that allow you to define access parameters for smartphones and tablets to the corporate network, set Wi-Fi and Bluetooth settings, control camera use, and adjust other parameters. To manage iOS devices, you don't need to purchase a separate management solution because the iOS device management server is already deployed in the cloud.

4. Protection against mobile threats. Modern mobile device security technologies from Kaspersky Lab help protect mobile devices from various cyber threats, including ransomware. Anti-phishing tools (a set of technologies used to protect against online fraud and identity theft) protect against the theft of sensitive information or credentials on fake sites. Attempts at unauthorized flashing are immediately detected, and access to the corporate network is blocked for such devices.

5. Protect valuable data, including on lost devices. If an employee's mobile device is lost or stolen, the administrator can remotely lock the device from the cloud console or delete all corporate data from it, thereby avoiding the loss of important information.

The key functionality of the KES cloud console is presented in Table No. 4.

Table 4. Cloud console functionality

Functionality

Actions available to the administrator

User Account Management

View user accounts

Creating Account Groups

Changing your account information

Moving accounts between groups

Deleting accounts

Removing account groups

User Rights Management

Granting a user administrator rights

Revoking administrator rights from a user

Device management

View a list of devices and device properties

Connecting Windows devices

Connecting mobile devices

Sending commands to mobile devices

Assigning an owner to a Windows device

Removing a device from the device list

Security Profile Management

Creating and configuring a security profile

Assign a security profile to a user account or group of user accounts

Delete a security profile

Managing files in the Quarantine section

Viewing files in the Quarantine section

Recovering files from the Quarantine and Backup categories

Deleting files from the Quarantine section

Configuring general settings for Kaspersky Endpoint Security Cloud

Similar documents

    History and development factors of cloud computing. The role of virtualization in the development of cloud technologies. Service models and operating principles of cloud services. Advantages of the cloud for Internet startups. Application of cloud computing technology in business.

    abstract, added 03/18/2015

    Implementation of cloud technologies in corporate information systems. Application of "cloud" technologies at RUE "Belorusneft". Commissioning, installation and launch of a cloud service, initial configuration and scaling proposals.

    course work, added 07/24/2014

    The history of cloud technologies. The essence and objectives of cloud technologies, their classification, advantages and disadvantages. Study of the use of cloud technologies using the example of Google Drive. Comparison of Google Drive with Apple's analogue (iCloud).

    course work, added 12/05/2016

    Creation and implementation levels of cloud computing. Advantages and disadvantages of using cloud technologies in organizing a unified information space. Assessing the importance of criteria using the method of “Paired comparison”, “Heat maps”, “Expert assessments”.

    thesis, added 04/08/2014

    The evolution of cloud services. Characteristics and classification of cloud services. Analysis of the capabilities of cloud services offered for use in small businesses. Analysis of the cost of ownership of a local solution for automating accounting activities.

    course work, added 05/10/2015

    Analysis of cloud services for business automation and justification of the benefits of switching to cloud data processing. Types and models of cloud services for business, principles of their operation and characteristics. Business automation tasks using the example of cloud solutions.

    thesis, added 09/06/2017

    Analysis of the structure and content of the company's marketing plan. The cloud computing market and the possibility of their application. Selection of information sources and presentation of the results obtained. Development of a software toolkit for cloud computing.

    thesis, added 11/12/2013

    The concept of cloud computing, its advantages and disadvantages; types of clouds. Comparative analysis of the risks of using cloud services in Russia and the EU. Regulators in the field of information security, their concepts, features and regulatory authorities.

    course work, added 05/14/2014

    History of the emergence of computer science. Apple products. Main categories, distinctive features, levels of cloud services. Characteristics of public and private clouds. Advantages and disadvantages of cloud computing, prospects for their development.

    test, added 08/06/2013

    The concept of cloud technologies is a convenient environment for storing and processing information that combines hardware, licensed software, communication channels and technical support for users. Disadvantages and advantages of Dropbox.