What is The Cloud?

When people say “the cloud,” they usually mean one or more of these at once:

 

  • Infrastructure cloud (IaaS): VMs, networks, storage

    – AWS, Azure, GCP

 
  • Platform cloud (PaaS): managed runtimes, databases, functions

    – Azure App Service, AWS Lambda

 
  • Application cloud (SaaS): business apps

    – M365, Google Workspace, Salesforce

 
  • Data cloud: data stored, moved, or processed off-prem

 

Cloud security breaks down by where the control is applied and what it’s protecting.

Security of the cloud

“Is the cloud itself secure?”

This is the part customers don’t control.

 

Owned by the cloud provider

  • Physical data centers

  • Hypervisors

  • Core networking

  • Hardware lifecycle

 

Examples

  • AWS securing its data centers

  • Azure securing the virtualization layer

 

This is not what Network Box USA sells

(But vendors love to blur this line.)

Security in the cloud

“What’s running inside your cloud environment?”

This is where customers are responsible, and where most breaches happen.

Includes these:

  • VM security (EDR/XDR)

  • Cloud workload protection (CWPP)

  • Identity & access (IAM misuse, credential theft)

  • Misconfigurations (open S3 buckets, exposed RDP)

  • East-west traffic inside the cloud

  • Logging, detection, response

 

Tools / Capabilities:

 

Network Box USA absolutely operates here

This is often called:

  • Cloud workload security

  • IaaS / PaaS security

  • Cloud detection & response (CDR)

Security for the cloud

“Controls designed specifically to protect cloud usage”

This is cloud-aware security, not just lifted from on-prem.

 

Includes these:

  • CSPM (Cloud Security Posture Management)

  • Identity-first security

  • Policy enforcement

  • Configuration drift detection

  • Secure baselines across tenants

 

Examples:

  • Detecting misconfigured storage

  • Enforcing MFA

  • Monitoring admin activity

  • Preventing privilege escalation

 

This is the layer people think CASB covers, but this is broader.

Network Box USA does this as outcomes, not buzzwords.

Security through the cloud

“Security that is delivered via cloud infrastructure”

 

This is about how the security service itself is provided.

The cloud is the platform used to deliver protection, visibility, and response.

 

This includes:

  • Cloud-hosted SOC tooling

  • Cloud-native detection engines

  • Centralized cloud analytics

  • Cloud-delivered updates and intelligence

  • Global cloud-based visibility and response

 

Importantly:

  • Security is not tied to a physical appliance
  • Not bound to a customer’s location
  • Delivered as a service
 

This is exactly how NBUSA operates.

 

This is sometimes (poorly) labeled:

  • “Cloud-delivered security”

  • “Security as a Service”

  • “Platform-based security”

Security around the cloud

“What touches the cloud?”

Security that connects users, endpoints, and environments to cloud-delivered protection

  • Endpoints reporting to cloud SOC

  • Hybrid networks

  • Remote users

  • Branch offices

This is where identity + endpoint + network converge.

NBUSA ties this together under one SOC and one response model.

Network Box USA secures workloads in the cloud, enforces controls for the cloud, stops threats through the cloud, and ties it all together under a single 24×7 SOC.
From prevention, to detection and response, we deliver cloud security outcomes across every layer clients control.
Customizable GUI - Network Box

Request a free one-time
Dark Web Monitoring Scan

By clicking the SEND button, you confirm that you are authorized to request this scan for the specified domain as the owner or an authorized executive of the company.

Thank You!

One of our experts will be in touch soon!