{"id":33597,"date":"2020-08-12T13:32:00","date_gmt":"2020-08-12T17:32:00","guid":{"rendered":"https:\/\/serviceexpress.com\/uk\/resources\/understanding-on-premises-data-centre-security-vs-cloud-security\/"},"modified":"2024-10-09T20:34:11","modified_gmt":"2024-10-09T19:34:11","slug":"understanding-on-prem-vs-cloud-security","status":"publish","type":"post","link":"https:\/\/serviceexpress.com\/uk\/resources\/understanding-on-prem-vs-cloud-security\/","title":{"rendered":"Understanding On-Premises Data Centre Security vs. Cloud Security"},"content":{"rendered":"\n<div class=\"wp-block-columns has-margin-bottom-large is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column has-margin-bottom-zero is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<h2 class=\"wp-block-heading has-margin-bottom-small has-large-font-size\" id=\"prioritizing-data-center-security\">Prioritising Data Centre Security<\/h2>\n\n\n\n<p class=\"has-margin-bottom-small\">It takes a whole host of resources and knowledge to address the complexities of data centre security. Preventing attacks and securing operations require a substantial budget to keep pace with existing and future challenges.\u00a0<a href=\"https:\/\/www.marketsandmarkets.com\/PressReleases\/datacenter-security.asp\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">A report<\/a>\u00a0from Markets and Markets predicts that\u00a0<strong>data centre security spending will reach $13.77 billion (\u00a310.15 bn) next year<\/strong>. More than 34% of CIO.com\u2019s\u00a0<a href=\"https:\/\/www.idg.com\/tools-for-marketers\/2020-state-of-the-cio\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">2020 State of the CIO<\/a>\u00a0respondents agree, indicating that\u00a0<strong>security and risk management is already \u201cthe number one driver of IT spending\u201d.<\/strong><\/p>\n\n\n\n<p class=\"has-margin-bottom-small\">Increased spending indicates the need for ongoing protection against cyber attacks. In 2019, research conducted by the\u00a0<a href=\"https:\/\/www.ponemon.org\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Ponemon Institute<\/a>\u00a0reported that the average breach cost $3.92 million (\u00a32.89 mn). Reducing security threats, outages and downtime means that pro\ufb01ts and reputations are saved.<\/p>\n\n\n\n<p class=\"has-margin-bottom-small\">Companies must be prepared to invest in the people, processes and technology needed to protect data centres from security breaches.<\/p>\n\n\n\n<p class=\"has-margin-bottom-xsmall\"><strong>Read on to learn more about:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Fundamentals of security for on-premises and cloud data centres<\/li>\n\n\n\n<li>On-premises vs. cloud security comparison<\/li>\n\n\n\n<li>Data centre security requirements and standards\/best practices<\/li>\n\n\n\n<li>How to implement data centre defence<\/li>\n\n\n\n<li>Top 8 on-premises &amp; cloud security controls<\/li>\n\n\n\n<li>What does the future of data centre security hold?<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading has-text-align-center has-margin-bottom-small has-large-font-size\" id=\"compare-contrast-on-premises-vs-cloud-service-security\">Compare &amp; Contrast: On-Premises vs. Cloud Service Security<\/h2>\n\n\n\n<p class=\"has-text-align-center has-margin-bottom-medium\">The on-prem versus cloud security debate continues within the data centre industry. The differences range from minor to substantial, but both on-prem and cloud advocates can agree that countless protections and threats exist in both environments. Beyond focusing solely on meeting IT security priorities, the question is:&nbsp;<strong>which is more secure for my organisation and its business objectives?<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-margin-bottom-small is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading has-text-align-center has-margin-bottom-small has-large-font-size\" id=\"on-prem-security\">On-Prem Security<\/h3>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h4 class=\"wp-block-heading has-text-align-center has-margin-bottom-small has-white-color has-royal-background-color has-text-color has-background\" id=\"pros\" style=\"padding-top:var(--wp--preset--spacing--40);padding-right:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--40);padding-left:var(--wp--preset--spacing--40)\">PROS<\/h4>\n\n\n\n<h4 class=\"wp-block-heading has-margin-bottom-xsmall\" id=\"increased-control\"><strong>Increased Control<\/strong><\/h4>\n\n\n\n<p class=\"has-margin-bottom-small\" style=\"margin-top:var(--wp--preset--spacing--20)\">More control over security is retained when a company manages services with its own on-prem servers.<\/p>\n\n\n\n<h4 class=\"wp-block-heading has-margin-bottom-xsmall\" id=\"in\ufb01nite-customization\"><strong>In\ufb01nite Customisation<\/strong><\/h4>\n\n\n\n<p class=\"has-margin-bottom-small\" style=\"margin-top:var(--wp--preset--spacing--20)\">On-Premises serves to allow network customisation that is tailor-made for a company\u2019s needs.<\/p>\n\n\n\n<h4 class=\"wp-block-heading has-margin-bottom-xsmall\" id=\"more-reliable\"><strong>More Reliable<\/strong><\/h4>\n\n\n\n<p class=\"has-margin-bottom-small\" style=\"margin-top:var(--wp--preset--spacing--20)\">On-prem servers do not rely on an Internet connection.<\/p>\n\n\n\n<h4 class=\"wp-block-heading has-margin-bottom-xsmall\" id=\"quicker-learning-curve\"><strong>Quicker Learning Curve<\/strong><\/h4>\n\n\n\n<p class=\"has-margin-bottom-small\" style=\"margin-top:var(--wp--preset--spacing--20)\">The majority of IT professionals are better equipped to build security processes in this environment.<\/p>\n\n\n\n<h4 class=\"wp-block-heading has-margin-bottom-xsmall\" id=\"lower-total-cost-of-ownership-tco\"><strong>Lower Total Cost Of Ownership (TCO)<\/strong><\/h4>\n\n\n\n<p class=\"has-margin-bottom-small\" style=\"margin-top:var(--wp--preset--spacing--20)\">On-prem servers may require a larger upfront investment in hardware and installation, but in the long run, security is less expensive to maintain with a third-party support strategy.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h4 class=\"wp-block-heading has-text-align-center has-margin-bottom-small has-navy-color has-light-blue-background-color has-text-color has-background\" id=\"cons\" style=\"padding-top:var(--wp--preset--spacing--40);padding-right:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--40);padding-left:var(--wp--preset--spacing--40)\">CONS<\/h4>\n\n\n\n<h4 class=\"wp-block-heading has-margin-bottom-xsmall\" id=\"timely-to-scale\"><strong>Timely To Scale<\/strong><\/h4>\n\n\n\n<p class=\"has-margin-bottom-small\" style=\"margin-top:var(--wp--preset--spacing--20)\">Procurement of IT hardware can take time and research to scale security for on-prem data centres.<\/p>\n\n\n\n<h4 class=\"wp-block-heading has-margin-bottom-xsmall\" id=\"increases-the-need-for-on-site-security\"><strong>Increases The Need For On-Site Security<\/strong><\/h4>\n\n\n\n<p class=\"has-margin-bottom-small\" style=\"margin-top:var(--wp--preset--spacing--20)\">Without the right team and safety controls in place, some businesses may be more vulnerable to physical threats such as damage to physical property.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading has-text-align-center has-margin-bottom-small has-large-font-size\" id=\"h-security-in-the-cloud\">Security In The Cloud<\/h3>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h4 class=\"wp-block-heading has-text-align-center has-margin-bottom-small has-white-color has-dark-blue-background-color has-text-color has-background\" id=\"pros\" style=\"padding-top:var(--wp--preset--spacing--40);padding-right:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--40);padding-left:var(--wp--preset--spacing--40)\">PROS<\/h4>\n\n\n\n<h4 class=\"wp-block-heading has-margin-bottom-xsmall\" id=\"easier-to-scale\"><strong>Easier To Scale<\/strong><\/h4>\n\n\n\n<p class=\"has-margin-bottom-small\" style=\"margin-top:var(--wp--preset--spacing--20)\">Expanding storage for data in the cloud is as straightforward as upgrading a cloud storage package.<\/p>\n\n\n\n<h4 class=\"wp-block-heading has-margin-bottom-xsmall\" id=\"faster-set-up\"><strong>Faster Set-Up<\/strong><\/h4>\n\n\n\n<p class=\"has-margin-bottom-small\" style=\"margin-top:var(--wp--preset--spacing--20)\">Cloud-based security is more automated, which means that set-up takes minutes rather than days.<\/p>\n\n\n\n<h4 class=\"wp-block-heading has-margin-bottom-xsmall\" id=\"flexible-pricing-structure\"><strong>Flexible Pricing Structure<\/strong><\/h4>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--20)\">Cloud computing often has a more \ufb02exible pricing structure with \u201cpay-as-you-grow\u201d fees.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h4 class=\"wp-block-heading has-text-align-center has-margin-bottom-small has-navy-color has-light-blue-background-color has-text-color has-background\" id=\"cons\" style=\"padding-top:var(--wp--preset--spacing--40);padding-right:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--40);padding-left:var(--wp--preset--spacing--40)\">CONS<\/h4>\n\n\n\n<h4 class=\"wp-block-heading has-margin-bottom-xsmall\" id=\"increased-vulnerabilities\"><strong>Increased Vulnerabilities<\/strong><\/h4>\n\n\n\n<p class=\"has-margin-bottom-small\" style=\"margin-top:var(--wp--preset--spacing--20)\">The cloud\u2019s larger attack surface can make it particularly vulnerable to cyberattacks.<\/p>\n\n\n\n<h4 class=\"wp-block-heading has-margin-bottom-xsmall\" id=\"limited-control\"><strong>Limited Control<\/strong><\/h4>\n\n\n\n<p class=\"has-margin-bottom-small\" style=\"margin-top:var(--wp--preset--spacing--20)\">An issue with one cloud-based data centre customer could compromise another customer\u2019s data.<\/p>\n\n\n\n<h4 class=\"wp-block-heading has-margin-bottom-xsmall\" id=\"limited-customization\"><strong>Limited Customisation<\/strong><\/h4>\n\n\n\n<p class=\"has-margin-bottom-small\" style=\"margin-top:var(--wp--preset--spacing--20)\">Traditional monitoring and security tools do not always work in cloud environments.<\/p>\n\n\n\n<h4 class=\"wp-block-heading has-margin-bottom-xsmall\" id=\"regulation-issues\"><strong>Regulation Issues<\/strong><\/h4>\n\n\n\n<p class=\"has-margin-bottom-small\" style=\"margin-top:var(--wp--preset--spacing--20)\">Some regulations require that the shared responsibility of multi-tenant hardware is not used.<\/p>\n\n\n\n<h4 class=\"wp-block-heading has-margin-bottom-xsmall\" id=\"more-expensive\"><strong>More Expensive<\/strong><\/h4>\n\n\n\n<p class=\"has-margin-bottom-small\" style=\"margin-top:var(--wp--preset--spacing--20)\">Cloud computing often has a more flexible pricing structure with \u201cpay-as-you-grow\u201d fees, but is less predictable for forecasting unforeseen costs and is more expensive in the long term.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<p class=\"has-text-align-center\">\u201cThe biggest challenge to data center security today is not physical threats but rather cyber threats. The proliferation of applications and burgeoning mounds of intellectual property and private information often governed by regulators\u2014makes data centers a central target for cybercriminals and even nation-states\u2026the cyber-attack surface for the data center is expanding and becoming increasingly harder to defend. <\/p>\n\n\n\n<p class=\"has-text-align-center\">These threats can target physical devices and systems used to manage cooling and video surveillance, among others. They can also target personnel through spear phishing, gaps in authentication protocols, and other malicious means.\u201d<br><br>\u2013 Digital Reality<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading has-text-align-center has-margin-bottom-small has-large-font-size\" id=\"data-center-security-requirements-standards\">Data Centre Security Requirements &amp; Standards<\/h2>\n\n\n\n<p class=\"has-text-align-center has-margin-bottom-small\">The requirements should be reviewed to understand how they will ensure and impact data centre safety. Many industries demand unique security standards involving a formal third-party auditing process to demonstrate compliance. Alhough complying with standards and requirements with all their details and steps appears daunting, these established best practices do shape a security response that can protect you from potential harm, downtime and data loss.<\/p>\n<\/div>\n\n\n<div class=\"carousel-block wp-block-serviceexpress-carousel\">\n\t<div class=\"carousel-block__container\">\n\t\t<div class=\"\">\n\t\t\t\n<div class=\"carousel-block__slide has-testimonial-image wp-block-serviceexpress-carousel-slide\">\n\t<div class=\"carousel-block__slide-wrap\">\n\t\t\t\t\t<div class=\"carousel-block__image-author-wrap\">\n\t\t\t\t<div class=\"carousel-block__image-wrap\">\n\t\t\t\t\t<img decoding=\"async\" width=\"364\" height=\"364\" data-src=\"https:\/\/serviceexpress.com\/uk\/wp-content\/uploads\/sites\/5\/2022\/05\/cody-male-employee-headshot.jpg\" class=\"carousel-block__image lazyload\" alt=\"Cody | Service Express\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 364px; --smush-placeholder-aspect-ratio: 364\/364;\" \/>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"carousel-block__quote-author\">\n\t\t\t\t\t\t<div class=\"carousel-block__quote-icon\">\n\t\t\t\t\t\t\t<svg class=\"icon icon-user\" viewBox=\"0,0,18,18\" width=\"18\" height=\"18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M14.853 14.723c0 .43-.347.777-.777.777H4.277a.776.776 0 0 1-.777-.777v-1.151c0-.753.483-1.553 1.48-2.188.99-.632 2.436-1.06 4.197-1.06 1.76 0 3.206.428 4.196 1.06.997.635 1.48 1.435 1.48 2.188v1.151ZM7.034 3.387a3.03 3.03 0 1 1 4.284 4.285 3.03 3.03 0 0 1-4.284-4.285Z\" stroke=\"currentColor\" \/><\/svg>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<p class=\"carousel-block__quote-author-details\">\n\t\t\t\t\t\t\t<span class=\"carousel-block__person-name\">\n\t\t\t\t\t\t\t\tCody Poltrock\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"carousel-block__job-title\">Supply Chain Director at Service Express<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\n\t\t<div class=\"carousel-block__content\">\n\t\t\t<div class=\"carousel-block__content-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"carousel-block__text \">\n\t\t\t\t\t\tRecently one of our internal tools showed user readable data still resided on the disk platters even after completing an OEM documented procedure for zeroing out storage media. In response, we developed our own additional processes to ensure that data is being destroyed correctly. We not only follow\u00a0<a href=\"https:\/\/www.nist.gov\/publications\/nist-special-publication-800-88-revision-1-guidelines-media-sanitization\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">NIST procedures<\/a>, we also verify results.\t\t\t\t\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading has-margin-bottom-xsmall has-medium-font-size\" id=\"industry-security-standards-include\">Industry security standards include:<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>NIST 800-88 Guidelines for Media Sanitization<\/li>\n\n\n\n<li>HIPAA in healthcare<\/li>\n\n\n\n<li>FERPA in educational institutions<\/li>\n\n\n\n<li>PCI DSS for credit cards<\/li>\n\n\n\n<li>ISAE 3402 for data center \ufb01nancial reporting<\/li>\n\n\n\n<li>ISO 27001 Information Security Management System<\/li>\n\n\n\n<li>Standard &#8211; most widely accepted certi\ufb01cation for supporting information security, physical security and business continuity<\/li>\n<\/ul>\n\n\n\n<p class=\"has-margin-bottom-medium\">Regardless of the industry, IT professionals should at a minimum be familiar with\u00a0<a href=\"https:\/\/www.lockheedmartin.com\/content\/dam\/lockheed-martin\/rms\/documents\/cyber\/Gaining_the_Advantage_Cyber_Kill_Chain.pdf\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">data centre\u00a0tiers<\/a>\u00a0and the kill chain standards. The Uptime Institute\u2019s\u00a0<strong>Tier Classi\ufb01cation System<\/strong>\u00a0serves as a benchmark for ensuring maximum uptime. Lockheed Martin\u2019s six-step\u00a0<a href=\"https:\/\/www.lockheedmartin.com\/content\/dam\/lockheed-martin\/rms\/documents\/cyber\/Gaining_the_Advantage_Cyber_Kill_Chain.pdf\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Cyber Kill Chain\u00ae<\/a>\u00a0helps to align defence strategies against cybercriminals.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignwide has-margin-bottom-medium has-navy-color has-text-color is-layout-flow wp-block-group-is-layout-flow\">\n<h2 class=\"wp-block-heading has-text-align-center has-margin-bottom-small has-large-font-size\" id=\"implementing-data-center-defense\">Implementing Data Centre Defence<\/h2>\n\n\n\n<p class=\"has-text-align-center has-margin-bottom-small\">To protect data centres from new and expanding threats, IT leaders should layer security defences for overlapping on-premises and cloud-based environments.&nbsp;<strong>Layering<\/strong>&nbsp;is a relatively simple concept. The idea is that any individual should be forced to breach several layers of security before they reach data. In doing so, the \u201cZero Trust\u201d framework is upheld: everyone is subject to the same high level of scrutiny.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized has-margin-bottom-zero\"><img decoding=\"async\" data-src=\"https:\/\/serviceexpress.com\/uk\/wp-content\/uploads\/sites\/5\/2023\/08\/security-controls-chart@2x.png\" alt=\"Top 8 On-Premises &amp; Cloud Security Controls | Service Express\" class=\"wp-image-28464 lazyload\" style=\"--smush-placeholder-width: 686px; --smush-placeholder-aspect-ratio: 686\/628;width:686px;height:628px\" width=\"686\" height=\"628\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignwide has-margin-bottom-large has-navy-color has-light-blue-background-color has-text-color has-background is-layout-flow wp-block-group-is-layout-flow\">\n<h2 class=\"wp-block-heading has-text-align-center has-margin-bottom-small has-large-font-size\" id=\"top-priority-strengthening-security-privacy\">Top Priority: Strengthening Security &amp; Privacy<\/h2>\n\n\n\n<p class=\"has-text-align-center has-margin-bottom-zero\">According to our&nbsp;<a href=\"https:\/\/serviceexpress.com\/uk\/resources\/read-it-data-center-infrastructure-report-2021\/\">2021 Data Centre &amp; Infrastructure Report<\/a>,&nbsp;<strong>48%<\/strong>&nbsp;of respondents identified strengthening security and privacy as a top priority.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading has-text-align-center has-margin-bottom-small has-large-font-size\" id=\"what-does-the-future-of-data-center-security-look-like\">What Does the Future of Data Centre Security Look Like?<\/h2>\n\n\n\n<p class=\"has-text-align-center has-margin-bottom-medium\">Cloud technology is trending now, but factors such as rising costs and security vulnerabilities are having an impact on its adoption. With more experience and a better understanding of the pros and cons, IT leaders are looking to a&nbsp;<strong>hybrid model<\/strong>&nbsp;for bringing together the scalability of the cloud with the control of on-premises data centres.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Prioritising Data Centre Security It takes a whole host of resources and knowledge to address the complexities of data centre security. Preventing attacks and securing operations require a substantial budget to keep pace with existing and future challenges.\u00a0A report\u00a0from Markets and Markets predicts that\u00a0data centre security spending will reach $13.77 billion (\u00a310.15 bn) next year. [&hellip;]<\/p>\n","protected":false},"author":32,"featured_media":77201,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"freeform":false,"hero_image_id":33159,"show_author":false,"table_of_contents":[],"footnotes":""},"categories":[737,739],"tags":[],"resource":[568],"class_list":["post-33597","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-infrastructure","category-security","resource-articles-insights"],"featured_image_src":"https:\/\/serviceexpress.com\/uk\/wp-content\/uploads\/sites\/5\/2024\/08\/Understanding-On-Premises-Data-Centre-Security-vs.-Cloud-Security_Meta-Image.jpg","yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Understanding On-Premises Data Centre Security vs. Cloud Security | Service Express<\/title>\n<meta name=\"description\" content=\"Understand the differences in on-prem vs cloud security. Find a pros\/cons comparison, implementing data centre defence, &amp; the future of data centre security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/serviceexpress.com\/uk\/resources\/understanding-on-prem-vs-cloud-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding On-Premises Data Centre Security vs. Cloud Security | Service Express\" \/>\n<meta property=\"og:description\" content=\"Prioritising Data Centre Security It takes a whole host of resources and knowledge to address the complexities of data centre security. Preventing attacks\" \/>\n<meta property=\"og:url\" content=\"https:\/\/serviceexpress.com\/uk\/resources\/understanding-on-prem-vs-cloud-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Service Express UK\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/weareserviceexpress\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-12T17:32:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-09T19:34:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/serviceexpress.com\/uk\/wp-content\/uploads\/sites\/5\/2024\/08\/Understanding-On-Premises-Data-Centre-Security-vs.-Cloud-Security_Meta-Image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jackie Kirkwood\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ServiceExpress\" \/>\n<meta name=\"twitter:site\" content=\"@ServiceExpress\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jackie Kirkwood\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/resources\\\/understanding-on-prem-vs-cloud-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/resources\\\/understanding-on-prem-vs-cloud-security\\\/\"},\"author\":{\"name\":\"Jackie Kirkwood\",\"@id\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/#\\\/schema\\\/person\\\/c3c8f554ab1d5e7713b62782cfce8f1d\"},\"headline\":\"Understanding On-Premises Data Centre Security vs. Cloud Security\",\"datePublished\":\"2020-08-12T17:32:00+00:00\",\"dateModified\":\"2024-10-09T19:34:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/resources\\\/understanding-on-prem-vs-cloud-security\\\/\"},\"wordCount\":996,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/resources\\\/understanding-on-prem-vs-cloud-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2024\\\/08\\\/Understanding-On-Premises-Data-Centre-Security-vs.-Cloud-Security_Meta-Image.jpg\",\"articleSection\":[\"IT infrastructure\",\"Security\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/resources\\\/understanding-on-prem-vs-cloud-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/resources\\\/understanding-on-prem-vs-cloud-security\\\/\",\"url\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/resources\\\/understanding-on-prem-vs-cloud-security\\\/\",\"name\":\"Understanding On-Premises Data Centre Security vs. Cloud Security | Service Express\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/resources\\\/understanding-on-prem-vs-cloud-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/resources\\\/understanding-on-prem-vs-cloud-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2024\\\/08\\\/Understanding-On-Premises-Data-Centre-Security-vs.-Cloud-Security_Meta-Image.jpg\",\"datePublished\":\"2020-08-12T17:32:00+00:00\",\"dateModified\":\"2024-10-09T19:34:11+00:00\",\"description\":\"Understand the differences in on-prem vs cloud security. Find a pros\\\/cons comparison, implementing data centre defence, & the future of data centre security.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/resources\\\/understanding-on-prem-vs-cloud-security\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/resources\\\/understanding-on-prem-vs-cloud-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/resources\\\/understanding-on-prem-vs-cloud-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2024\\\/08\\\/Understanding-On-Premises-Data-Centre-Security-vs.-Cloud-Security_Meta-Image.jpg\",\"contentUrl\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2024\\\/08\\\/Understanding-On-Premises-Data-Centre-Security-vs.-Cloud-Security_Meta-Image.jpg\",\"width\":1200,\"height\":628,\"caption\":\"Clouds in Server Room Representing Cloud Security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/resources\\\/understanding-on-prem-vs-cloud-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources\",\"item\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/resources\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Understanding On-Premises Data Centre Security vs. Cloud Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/#website\",\"url\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/\",\"name\":\"Service Express UK\",\"description\":\"Global Data Center Solutions &amp; Support\",\"publisher\":{\"@id\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/#organization\",\"name\":\"Service Express UK\",\"url\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2022\\\/01\\\/service-express-meta.jpg\",\"contentUrl\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2022\\\/01\\\/service-express-meta.jpg\",\"width\":1200,\"height\":628,\"caption\":\"Service Express UK\"},\"image\":{\"@id\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/weareserviceexpress\\\/\",\"https:\\\/\\\/x.com\\\/ServiceExpress\",\"https:\\\/\\\/www.instagram.com\\\/serviceexpress\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/service-express-inc\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCa1MO2iHOytlWx_xCX9uoug\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/#\\\/schema\\\/person\\\/c3c8f554ab1d5e7713b62782cfce8f1d\",\"name\":\"Jackie Kirkwood\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3ec414fe340887ec3bd598cb173da2e304f308f682481ea454838e0f1148410b?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3ec414fe340887ec3bd598cb173da2e304f308f682481ea454838e0f1148410b?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3ec414fe340887ec3bd598cb173da2e304f308f682481ea454838e0f1148410b?s=96&r=g\",\"caption\":\"Jackie Kirkwood\"},\"url\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/author\\\/jkirkwood\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Understanding On-Premises Data Centre Security vs. Cloud Security | Service Express","description":"Understand the differences in on-prem vs cloud security. Find a pros\/cons comparison, implementing data centre defence, & the future of data centre security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/serviceexpress.com\/uk\/resources\/understanding-on-prem-vs-cloud-security\/","og_locale":"en_GB","og_type":"article","og_title":"Understanding On-Premises Data Centre Security vs. Cloud Security | Service Express","og_description":"Prioritising Data Centre Security It takes a whole host of resources and knowledge to address the complexities of data centre security. Preventing attacks","og_url":"https:\/\/serviceexpress.com\/uk\/resources\/understanding-on-prem-vs-cloud-security\/","og_site_name":"Service Express UK","article_publisher":"https:\/\/www.facebook.com\/weareserviceexpress\/","article_published_time":"2020-08-12T17:32:00+00:00","article_modified_time":"2024-10-09T19:34:11+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/serviceexpress.com\/uk\/wp-content\/uploads\/sites\/5\/2024\/08\/Understanding-On-Premises-Data-Centre-Security-vs.-Cloud-Security_Meta-Image.jpg","type":"image\/jpeg"}],"author":"Jackie Kirkwood","twitter_card":"summary_large_image","twitter_creator":"@ServiceExpress","twitter_site":"@ServiceExpress","twitter_misc":{"Written by":"Jackie Kirkwood","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/serviceexpress.com\/uk\/resources\/understanding-on-prem-vs-cloud-security\/#article","isPartOf":{"@id":"https:\/\/serviceexpress.com\/uk\/resources\/understanding-on-prem-vs-cloud-security\/"},"author":{"name":"Jackie Kirkwood","@id":"https:\/\/serviceexpress.com\/uk\/#\/schema\/person\/c3c8f554ab1d5e7713b62782cfce8f1d"},"headline":"Understanding On-Premises Data Centre Security vs. Cloud Security","datePublished":"2020-08-12T17:32:00+00:00","dateModified":"2024-10-09T19:34:11+00:00","mainEntityOfPage":{"@id":"https:\/\/serviceexpress.com\/uk\/resources\/understanding-on-prem-vs-cloud-security\/"},"wordCount":996,"commentCount":0,"publisher":{"@id":"https:\/\/serviceexpress.com\/uk\/#organization"},"image":{"@id":"https:\/\/serviceexpress.com\/uk\/resources\/understanding-on-prem-vs-cloud-security\/#primaryimage"},"thumbnailUrl":"https:\/\/serviceexpress.com\/uk\/wp-content\/uploads\/sites\/5\/2024\/08\/Understanding-On-Premises-Data-Centre-Security-vs.-Cloud-Security_Meta-Image.jpg","articleSection":["IT infrastructure","Security"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/serviceexpress.com\/uk\/resources\/understanding-on-prem-vs-cloud-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/serviceexpress.com\/uk\/resources\/understanding-on-prem-vs-cloud-security\/","url":"https:\/\/serviceexpress.com\/uk\/resources\/understanding-on-prem-vs-cloud-security\/","name":"Understanding On-Premises Data Centre Security vs. Cloud Security | Service Express","isPartOf":{"@id":"https:\/\/serviceexpress.com\/uk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/serviceexpress.com\/uk\/resources\/understanding-on-prem-vs-cloud-security\/#primaryimage"},"image":{"@id":"https:\/\/serviceexpress.com\/uk\/resources\/understanding-on-prem-vs-cloud-security\/#primaryimage"},"thumbnailUrl":"https:\/\/serviceexpress.com\/uk\/wp-content\/uploads\/sites\/5\/2024\/08\/Understanding-On-Premises-Data-Centre-Security-vs.-Cloud-Security_Meta-Image.jpg","datePublished":"2020-08-12T17:32:00+00:00","dateModified":"2024-10-09T19:34:11+00:00","description":"Understand the differences in on-prem vs cloud security. Find a pros\/cons comparison, implementing data centre defence, & the future of data centre security.","breadcrumb":{"@id":"https:\/\/serviceexpress.com\/uk\/resources\/understanding-on-prem-vs-cloud-security\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/serviceexpress.com\/uk\/resources\/understanding-on-prem-vs-cloud-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/serviceexpress.com\/uk\/resources\/understanding-on-prem-vs-cloud-security\/#primaryimage","url":"https:\/\/serviceexpress.com\/uk\/wp-content\/uploads\/sites\/5\/2024\/08\/Understanding-On-Premises-Data-Centre-Security-vs.-Cloud-Security_Meta-Image.jpg","contentUrl":"https:\/\/serviceexpress.com\/uk\/wp-content\/uploads\/sites\/5\/2024\/08\/Understanding-On-Premises-Data-Centre-Security-vs.-Cloud-Security_Meta-Image.jpg","width":1200,"height":628,"caption":"Clouds in Server Room Representing Cloud Security"},{"@type":"BreadcrumbList","@id":"https:\/\/serviceexpress.com\/uk\/resources\/understanding-on-prem-vs-cloud-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/serviceexpress.com\/uk\/"},{"@type":"ListItem","position":2,"name":"Resources","item":"https:\/\/serviceexpress.com\/uk\/resources\/"},{"@type":"ListItem","position":3,"name":"Understanding On-Premises Data Centre Security vs. Cloud Security"}]},{"@type":"WebSite","@id":"https:\/\/serviceexpress.com\/uk\/#website","url":"https:\/\/serviceexpress.com\/uk\/","name":"Service Express UK","description":"Global Data Center Solutions &amp; Support","publisher":{"@id":"https:\/\/serviceexpress.com\/uk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/serviceexpress.com\/uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/serviceexpress.com\/uk\/#organization","name":"Service Express UK","url":"https:\/\/serviceexpress.com\/uk\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/serviceexpress.com\/uk\/#\/schema\/logo\/image\/","url":"https:\/\/serviceexpress.com\/uk\/wp-content\/uploads\/sites\/5\/2022\/01\/service-express-meta.jpg","contentUrl":"https:\/\/serviceexpress.com\/uk\/wp-content\/uploads\/sites\/5\/2022\/01\/service-express-meta.jpg","width":1200,"height":628,"caption":"Service Express UK"},"image":{"@id":"https:\/\/serviceexpress.com\/uk\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/weareserviceexpress\/","https:\/\/x.com\/ServiceExpress","https:\/\/www.instagram.com\/serviceexpress\/","https:\/\/www.linkedin.com\/company\/service-express-inc\/","https:\/\/www.youtube.com\/channel\/UCa1MO2iHOytlWx_xCX9uoug"]},{"@type":"Person","@id":"https:\/\/serviceexpress.com\/uk\/#\/schema\/person\/c3c8f554ab1d5e7713b62782cfce8f1d","name":"Jackie Kirkwood","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/3ec414fe340887ec3bd598cb173da2e304f308f682481ea454838e0f1148410b?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3ec414fe340887ec3bd598cb173da2e304f308f682481ea454838e0f1148410b?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3ec414fe340887ec3bd598cb173da2e304f308f682481ea454838e0f1148410b?s=96&r=g","caption":"Jackie Kirkwood"},"url":"https:\/\/serviceexpress.com\/uk\/author\/jkirkwood\/"}]}},"_links":{"self":[{"href":"https:\/\/serviceexpress.com\/uk\/wp-json\/wp\/v2\/posts\/33597","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/serviceexpress.com\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/serviceexpress.com\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/serviceexpress.com\/uk\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/serviceexpress.com\/uk\/wp-json\/wp\/v2\/comments?post=33597"}],"version-history":[{"count":0,"href":"https:\/\/serviceexpress.com\/uk\/wp-json\/wp\/v2\/posts\/33597\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/serviceexpress.com\/uk\/wp-json\/wp\/v2\/media\/77201"}],"wp:attachment":[{"href":"https:\/\/serviceexpress.com\/uk\/wp-json\/wp\/v2\/media?parent=33597"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/serviceexpress.com\/uk\/wp-json\/wp\/v2\/categories?post=33597"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/serviceexpress.com\/uk\/wp-json\/wp\/v2\/tags?post=33597"},{"taxonomy":"resource","embeddable":true,"href":"https:\/\/serviceexpress.com\/uk\/wp-json\/wp\/v2\/resource?post=33597"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}