{"id":191028,"date":"2025-03-19T13:26:29","date_gmt":"2025-03-19T18:26:29","guid":{"rendered":"https:\/\/www.een.com\/?p=191028"},"modified":"2025-06-12T13:28:40","modified_gmt":"2025-06-12T18:28:40","slug":"how-cloud-architecture-shapes-security","status":"publish","type":"post","link":"https:\/\/www.een.com\/sv\/blog\/how-cloud-architecture-shapes-security\/","title":{"rendered":"How Cloud Architecture Shapes Security"},"content":{"rendered":"\n<p>Dean Drako, CEO of Eagle Eye Networks,discusses the drawbacks and benefits of different cloud architectures.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p>Cloud architecture is streamlining hardware and software management for both the end user and the security dealer\/integrator, offering impressive flexibility and scalability. It also has been able to generate user excitement; integrators say users are approaching them asking to go to the\u00a0<a id=\"\" href=\"https:\/\/www.sdmmag.com\/keywords\/215-cloud\">cloud<\/a>. But at the same time, it can be difficult to navigate when cloud is fully effective, when an on-prem solution may be worth considering, and how exactly to configure a hybrid approach \u2014 which many experts indicate may truly be \u2018the best of both worlds.\u2019<a href=\"https:\/\/twitter.com\/intent\/tweet?url=https:\/\/www.securitysales.com\/news\/2025-security-industry-predictions-dean-drako-eagle-eye-networks\/164701\/&amp;text=2025%20Security%20Industry%20Predictions:%20Dean%20Drako,%20Founder\/CEO,%20Eagle%20Eye%20Networks&amp;via=YourTwitterHandle\" target=\"_blank\" rel=\"noreferrer noopener\"><br><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?url=https:\/\/www.securitysales.com\/news\/2025-security-industry-predictions-dean-drako-eagle-eye-networks\/164701\/&amp;title=2025%20Security%20Industry%20Predictions:%20Dean%20Drako,%20Founder\/CEO,%20Eagle%20Eye%20Networks\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"mailto:?subject=Check%20out%20this%20article&amp;body=Check%20out%20this%20article:%0A%0Ahttps:\/\/www.securitysales.com\/news\/2025-security-industry-predictions-dean-drako-eagle-eye-networks\/164701\/\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.sdmmag.com\/articles\/104063-how-cloud-architecture-shapes-security\" target=\"_blank\" rel=\"noreferrer noopener\">Read the full article<\/a><\/div>\n<\/div>\n\n\n\n<p><br><em>Covered on these news sites. Click the image to read more.<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/www.sdmmag.com\/articles\/104063-how-cloud-architecture-shapes-security\" target=\"_blank\" rel=\"noreferrer noopener\"><img fetchpriority=\"high\" decoding=\"async\" width=\"500\" height=\"334\" src=\"https:\/\/www.een.com\/wp-content\/uploads\/2016\/08\/SDM-Logo-FI.png\" alt=\"SDM security magazine\" class=\"wp-image-13407\" style=\"width:233px;height:auto\" srcset=\"https:\/\/www.een.com\/wp-content\/uploads\/2016\/08\/SDM-Logo-FI.png 500w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/08\/SDM-Logo-FI-300x200.png 300w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/08\/SDM-Logo-FI-100x67.png 100w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/08\/SDM-Logo-FI-195x130.png 195w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/08\/SDM-Logo-FI-200x134.png 200w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/08\/SDM-Logo-FI-400x267.png 400w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/figure>\n\n\n\n\n","protected":false},"excerpt":{"rendered":"<p>Dean Drako, CEO of Eagle Eye Networks,discusses the drawbacks and benefits of different cloud architectures. Cloud architecture is streamlining hardware and software management for both the end user and the &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.een.com\/sv\/blog\/how-cloud-architecture-shapes-security\/\"> <span class=\"screen-reader-text\">How Cloud Architecture Shapes Security<\/span> L\u00e4s mer &raquo;<\/a><\/p>\n","protected":false},"author":3155,"featured_media":13407,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"60097,140951,63432,64727,15010,74277","_relevanssi_noindex_reason":"","footnotes":""},"categories":[73],"tags":[],"class_list":["post-191028","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-company-news"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/posts\/191028","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/users\/3155"}],"replies":[{"embeddable":true,"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/comments?post=191028"}],"version-history":[{"count":0,"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/posts\/191028\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/media\/13407"}],"wp:attachment":[{"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/media?parent=191028"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/categories?post=191028"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/tags?post=191028"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}