44 Cloud Computing
to be logged into the service for automatic backups to be performed. There
is native file system support on both 32-bit and 64-bit versions of Windows
(Windows 2000, XP, Vista, 2003 and 2008), and Linux. A new download
resume capability has been added for moving large files and performing
restore operations. A time-slice restore interface was also added, allowing
restoration of files from any given point-in-time where a snapshot was
taken. Finally, it supports automatic updates on Windows (built-in) and
Macintosh (using Sparkle).
2.4 Monitoring-as-a-Service (MaaS)
Monitoring-as-a-Service (MaaS) is the outsourced provisioning of security,
primarily on business platforms that leverage the Internet to conduct busi-
ness.
8
MaaS has become increasingly popular over the last decade. Since the
advent of cloud computing, its popularity has, grown even more. Security
monitoring involves protecting an enterprise or government client from
cyber threats. A security team plays a crucial role in securing and maintain-
ing the confidentiality, integrity, and availability of IT assets. However, time
and resource constraints limit security operations and their effectiveness for
most companies. This requires constant vigilance over the security infra-
structure and critical information assets.
Many industry regulations require organizations to monitor their secu-
rity environment, server logs, and other information assets to ensure the
integrity of these systems. However, conducting effective security monitor-
ing can be a daunting task because it requires advanced technology, skilled
security experts, and scalable processes—none of which come cheap. MaaS
security monitoring services offer real-time, 24/7 monitoring and nearly
immediate incident response across a security infrastructure—they help to
protect critical information assets of their customers. Prior to the advent of
electronic security systems, security monitoring and response were heavily
dependent on human resources and human capabilities, which also limited
the accuracy and effectiveness of monitoring efforts. Over the past two
decades, the adoption of information technology into facility security sys-
tems, and their ability to be connected to security operations centers
(SOCs) via corporate networks, has significantly changed that picture. This
means two important things: (1) The total cost of ownership (TCO) for tra-
ditional SOCs is much higher than for a modern-technology SOC; and (2)
8. http://en.wikipedia.org/wiki/Monitoring_as_a_service, retrieved 14 Jan 2009.
Chap2.fm Page 44 Friday, May 22, 2009 11:24 AM