{"id":68476,"date":"2023-06-30T14:13:53","date_gmt":"2023-06-30T06:13:53","guid":{"rendered":"https:\/\/version-2.com\/?p=68476"},"modified":"2023-06-30T14:18:20","modified_gmt":"2023-06-30T06:18:20","slug":"meet-nord-people-insights-from-our-engineering-managers-2","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2023\/06\/meet-nord-people-insights-from-our-engineering-managers-2\/","title":{"rendered":"Meet Nord People: Insights from our Engineering Managers"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"68476\" class=\"elementor elementor-68476\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5I0vJtZIN66BBJvqRbfoG7\/a6352ce602a2681f59128e1617e1e104\/What-is-Cloud-network-security__web_1400x800_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\" width=\"1400\" height=\"800\" \/>\n<div class=\"nord-col lg:col-8 lg:offset-1 break-words mt-5 text-grey-shuttle\"><article>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Cloud network security is a general term for the <strong>measures needed to secure virtualized cloud environments<\/strong>. It covers policies, processes, controls, and technologies. And it applies to private, public, and hybrid cloud deployments.<\/p>\n\n<h2 id=\"basics-of-cloud-network-security\" class=\"Heading Heading-h2 text-dark-blue\">Basics of cloud network security<\/h2>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Cloud network security resembles traditional on-premises network security but with important divergences related to defending virtualized environments.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Like on-premises security, <strong>cloud network security defends network assets against external threats.<\/strong> Security systems for the cloud assess access requests and authorize users to access resources. They provide visibility for security managers, including real-time alerts and audit logs. And they neutralize malware and illegitimate data transfers.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Unlike standard security solutions, cloud defenses are not based on-site. Cloud security systems function via software-defined networking tools. <strong>Virtual gateways reside in the cloud,<\/strong> where they can protect applications and data from access requests \u2013 wherever users may be.<\/p>\n\n<h3 class=\"Heading Heading-h3 text-dark-blue\">The context: understanding cloud computing<\/h3>\n<div class=\"gatsby-image-wrapper\" data-gatsby-image-wrapper=\"\">\n\n<img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/1iB5WLnccXQ1GYcyMfqPUS\/889d19969546eb73c4ac297dc10ba5b1\/What-is-Cloud-network-security__1400x726_1.png?w=1400&amp;h=726&amp;q=50&amp;fm=webp\" width=\"1400\" height=\"726\" \/>\n\n<picture>Cloud computing is the use of virtualized platforms to host applications and store data. The cloud exists as a worldwide network of servers and is accessible via a standard internet connection.<\/picture>\n\n<\/div>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">The user\u2019s apps and data reside off-site, removing the need for on-premises hardware. Instead, <strong>network resources are \u201cvirtualized\u201d<\/strong>. Resources are accessible to the owner or user, but they are hosted by cloud providers.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Users can choose to access software-as-a-service (SaaS) apps. Or they can build customized cloud deployments via platform-as-a-service (PaaS). In all cases, <strong>security is a shared responsibility between users and cloud service providers (CSPs)<\/strong>.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Providers must secure hardware used to host cloud apps or data. Users must protect any data passing through cloud environments. They are also responsible for managing access to cloud assets.<\/p>\n\n<h3 class=\"Heading Heading-h3 text-dark-blue\">Elements of cloud network security<\/h3>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Cloud network security solutions vary, but could include:<\/p>\n\n<ul class=\"list\">\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Integrated cloud security stacks <\/strong>\u2013 Includes next-generation firewall protection, anti-virus and anti-bot tools, intrusion prevention systems, controls for individual apps, IAM, and data loss prevention tools.<\/p>\n<\/li>\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Sanitization<\/strong> \u2013 Systems can filter low-level traffic and remove potential threats, without the need for full-scale inspection.<\/p>\n<\/li>\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Exploit protection<\/strong> \u2013 Protection against known Zero Day Exploits, with data derived from the latest threat intelligence.<\/p>\n<\/li>\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Traffic inspection <\/strong>\u2013 Inspection of SSL\/TLS traffic passing throughout virtualized environments. Analyzes encrypted traffic without compromising speed.<\/p>\n<\/li>\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Centralized security administration<\/strong> \u2013 Solutions cover all cloud applications and storage assets. They integrate seamlessly with existing resources (including on-premises networks), providing total awareness of network activity.<\/p>\n<\/li>\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Segmentation \u2013<\/strong> Cloud network security applies micro-segmentation to limit user permissions and guard confidential data.<\/p>\n<\/li>\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Remote access <\/strong>\u2013 Ensures secure access for remote workers and third parties. Users can connect to cloud assets safely from any location.<\/p>\n<\/li>\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Automation tools<\/strong> \u2013 Includes automated extension to newly installed cloud services. Automated workflows blend ease of use and security, allowing companies to harness the potential of the cloud.<\/p>\n<\/li>\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Simple integration <\/strong>\u2013 Cloud security tools integrate with legacy applications, operating systems, and third-party security systems.<\/p>\n<\/li>\n<\/ul>\n<h2 id=\"the-importance-of-cloud-network-security\" class=\"Heading Heading-h2 text-dark-blue\">The importance of cloud network security<\/h2>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">The cloud is everywhere in modern life. Businesses, non-profits, and government agencies all rely on cloud infrastructure to deliver services and host workloads. But the rise of the cloud has created new security vulnerabilities. This means that <strong>organizations need to rethink their network security policies.<\/strong><\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Traditional on-premises networks have simple security architecture.<\/strong> Central resources are protected by the network perimeter. Endpoints are few in number and easy to monitor. Access patterns and user communities change slowly, if at all. In this context putting in place firewalls and threat detection systems is relatively simple.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Cloud network security presents a different set of challenges.<\/p>\n\n<ul class=\"list\">\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>In the cloud, there is no standard network perimeter.<\/strong> Users can access cloud gateways anywhere. IT teams rarely manage on-premises resources. Instead, cloud assets are maintained by cloud providers on servers across the world.<\/p>\n<\/li>\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>A public cloud environment can change rapidly<\/strong>. Employees might spin up new SaaS instances or cloud APIs. Staff could bring online new cloud storage containers to backup data or handle overflows.<\/p>\n<\/li>\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Security teams need to maintain awareness, track user activity, and neutralize threats<\/strong>. Organizations need a cloud network security strategy that locks down critical cloud assets while enabling users to take advantage of cloud computing.<\/p>\n<\/li>\n<\/ul>\n<h2 id=\"cloud-network-security-benefits\" class=\"Heading Heading-h2 text-dark-blue\">Cloud network security benefits<\/h2>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Adopting a cloud network security strategy has many advantages. The benefits of retooling your security setup for the cloud include:<\/p>\n\n<h3 class=\"Heading Heading-h3 text-dark-blue\">Improved data security<\/h3>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">The most important benefit of cloud network security is <strong>enhanced protection for sensitive data<\/strong>.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Cloud security solutions encrypt data at rest on the cloud. If files are stolen, cybercriminals will not be able to read data easily. Encryption of data in transit also makes it harder to track information flows and launch targeted interception attacks.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Micro-segmentation separates confidential data from the rest of an organization\u2019s cloud network. Data resides in software-defined compartments that are accessible with the right credentials. Cloud security systems can define these segments at a granular level.<\/p>\n\n<h3 class=\"Heading Heading-h3 text-dark-blue\">Better visibility for administrators<\/h3>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">IT teams need<strong> visibility to monitor threats and user activity.<\/strong> But legacy security solutions are not well-adapted to discovering cloud apps and tracking activity in a cloud environment.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Cloud-native network security systems bring together all virtualized assets. Admins can monitor network activity in real-time via a single pane of glass. And automated alerts deliver information about potential threats before they become critical.<\/p>\n\n<h3 class=\"Heading Heading-h3 text-dark-blue\">Simplified cloud policy management<\/h3>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Security policies should reflect the security needs of network owners and be delivered to all users. But <strong>delivering security policies consistently in cloud settings is a complex task.<\/strong> Unified cloud network security systems solve this problem.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">IT teams can automatically deliver updated security policies to endpoints. Cloud-native solutions also make it easier to deliver policies across hybrid or multi-cloud environments.<\/p>\n\n<h3 class=\"Heading Heading-h3 text-dark-blue\">Threat analysis and neutralization<\/h3>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Cloud resources are vulnerable to data breach attacks. <strong>Compromised remote access devices, phishing emails, and credential theft are common entry methods<\/strong>. Cloud-native security controls are the only effective response.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Robust security systems detect, contain, and neutralize malicious threats before they cause damage.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Cloud network security uses threat intelligence to counter the latest threats. Intrusion detection systems guard cloud gateways and scan network traffic. Anti-bot scanners also track emerging DDoS attacks. This prevents downtime from traffic flood attacks.<\/p>\n\n<h3 class=\"Heading Heading-h3 text-dark-blue\">Security automation<\/h3>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Automation allows IT teams to work efficiently and securely. <strong>Users can automatically extend access controls and threat detection to new cloud resources.<\/strong> There is no need for lengthy manual configuration processes. New services receive instant coverage, limiting the risk of human error.<\/p>\n\n<h2 id=\"cloud-network-security-challenges\" class=\"Heading Heading-h2 text-dark-blue\">Cloud network security challenges<\/h2>\n<div class=\"gatsby-image-wrapper\" data-gatsby-image-wrapper=\"\">\n\n<img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3OGHyA3OSaMjIU8FqNOw0E\/3a3f1f9d2d60d7c7acf5273e327c2de3\/What-is-Cloud-network-security__1400x888_2.png?w=1400&amp;h=888&amp;q=50&amp;fm=webp\" width=\"1400\" height=\"888\" \/>\n\n<picture>Cloud network security systems make sense for organizations that manage pure cloud or hybrid networks. But implementing cloud security is not a simple process. Challenges faced by organizations include:<\/picture>\n\n<\/div>\n<h3 class=\"Heading Heading-h3 text-dark-blue\">Understanding shared responsibility<\/h3>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Under the shared responsibility model, <strong>CSPs and users share responsibility for securing cloud resources<\/strong>. This is accepted by users when they source cloud solutions. But determining areas of security responsibility can be difficult.<\/p>\n\n<ul class=\"list\">\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Cloud users must secure apps and data stored on the cloud. They must manage user access and monitor external threats.<\/p>\n<\/li>\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">CSPs are responsible for securing cloud infrastructure. They harden cloud servers to block data thieves or viruses.<\/p>\n<\/li>\n<\/ul>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">This model leaves scope for overlap and confusion. For example, cloud users may rely on encryption provided by their cloud service provider. As a result, users may not apply encryption for data in transit or use Data Loss Prevention tools.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">It\u2019s essential to define areas of responsibility before activating cloud services. Most SaaS providers build security features into their products. But users always have a role to play, and this varies between different cloud contexts.<\/p>\n\n<h3 class=\"Heading Heading-h3 text-dark-blue\">Managing dynamic cloud environments<\/h3>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Change is a core feature of cloud deployments. Apps come online constantly. Configurations may change to reflect developing workflows. New users connect from home or abroad. And individual employees can connect cloud containers with a few mouse clicks.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Automation can sometimes make this problem worse. For instance, companies may use autoscaling to build cloud deployments quickly. This boosts efficiency, but it also leaves security teams scrambling to catch up.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Cloud network security systems need to adapt to change.<\/strong> Admins must track access requests, respond to alerts, and discover threats if they infiltrate network infrastructure. This is even harder in hybrid environments that mix on-premises systems with extensive public and private cloud deployments.<\/p>\n\n<h2 id=\"cloud-network-security-best-practices\" class=\"Heading Heading-h2 text-dark-blue\">Cloud network security best practices<\/h2>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Achieving cloud security can be challenging. But managing cloud security is far from impossible, even for small businesses. Follow these cloud network security best practices and build a security solution that meets your goals:<\/p>\n\n<h3 class=\"Heading Heading-h3 text-dark-blue\">1. Apply Zero Trust principles<\/h3>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Zero Trust Network Architecture (ZTNA) is a security model that teaches users to trust no one. This is a good rule to apply when securing cloud infrastructure.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Avoid situations where users have global network privileges, and adopt a denial-by-default stance. Require more than one authentication factor when allowing user access. And segment cloud environments to limit east-west movement within the network.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Zero Trust changes the focus of security strategies to meet cloud computing needs<\/strong>. Instead of policing the network edge, admins concentrate on managing identities. This is a good fit for dynamic cloud environments. Deployments may constantly change. But user communities are easier to manage.<\/p>\n\n<h3 class=\"Heading Heading-h3 text-dark-blue\">2. Lock down interfaces between the cloud and the internet<\/h3>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Internet-facing assets are a critical security risk. Access portals, web forms, and email accounts connect with the wider internet. This makes them common vectors for malware and data theft attacks.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Configure cloud apps to minimize contact with the internet.<\/strong> If necessary, leverage threat protection tools to guard vulnerable points. Web Application Firewalls (WAF) can deny access to suspicious network traffic. DDoS and intelligent detection systems handle malicious agents that breach the firewall.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Set automated alerts to inform admins about potential risks. When building cloud network security systems, prioritize internet-facing assets. Carry out enhanced risk assessments, log user activity, and test access controls to secure entry points.<\/p>\n\n<h3 class=\"Heading Heading-h3 text-dark-blue\">3. Use micro-segmentation to protect critical data<\/h3>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Cloud security systems usually include the ability to micro-segment networks. <strong>Micro-segmentation lets you guard critical data with an additional layer of protection<\/strong>. This has security benefits, while also helping companies comply with relevant data security regulations.<\/p>\n\n<h3 class=\"Heading Heading-h3 text-dark-blue\">4. Use private cloud solutions to enhance security<\/h3>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Private clouds allow users to communicate and collaborate without creating links to the external internet. This limits the scope for attackers, whether they use email phishing or malware injection.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Build networks that blend private and public cloud tools without compromising security<\/strong>. Determine which workflows require internet access. Switch everything else to private access technology that does not require external IP addresses.<\/p>\n\n<h3 class=\"Heading Heading-h3 text-dark-blue\">5. Work with partners to establish security responsibilities<\/h3>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">The principle of shared responsibility divides security functions between service providers and consumers.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Before commissioning new SaaS or IaaS products, be clear about security responsibilities. <strong>Create a security policy for each cloud service explaining your areas of responsibility and the security controls you will use<\/strong>. This should complement your cloud partner\u2019s security policy. There should be no areas of ambiguity.<\/p>\n\n<h3 class=\"Heading Heading-h3 text-dark-blue\">6. Write and deliver clear cloud security policies<\/h3>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Robust cloud network security rests upon good documentation and organization.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Cloud security policies define the controls used to secure cloud resources<\/strong>. This could include multi-factor authentication, Identity and Access Management, and data encryption. Policies also inform users about their security responsibilities.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Every SaaS app or cloud-hosted database should have a security policy. Store policies centrally. And use automated delivery to ensure that policies are implemented consistently and rapidly.<\/p>\n\n<h2 id=\"the-role-of-ai-and-machine-learning-in-cloud-network-security\" class=\"Heading Heading-h2 text-dark-blue\">The role of AI and machine learning in cloud network security<\/h2>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Cloud network security is advancing all the time. And one of the most exciting research areas is the application of Artificial Intelligence to secure cloud environments.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">AI harnesses machine learning to assess cloud security threats. Also known as <strong>User and Entity Based Analytics (UEBA)<\/strong>, this technology scans user activity to detect malicious agents. AI engines compare real-time user behavior to logs of previous activity. In theory, this information helps to authenticate legitimate users and unmask intruders.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">However, UEBA faces some challenges before becoming mainstream. For example, <strong>AI requires structured data sets and huge amounts of information <\/strong>to function properly. Generating useful data takes time and <strong>may also breach privacy regulations<\/strong>.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Attackers will also adapt to the use of machine learning. Expect to see Advanced Persistent Threats (APTs) that gather user activity data and build fake profiles to fool UEBA scanners. If IT teams rely too much on AI, this could become a security threat.<\/p>\n\n<h2 id=\"cloud-network-security-key-takeaways\" class=\"Heading Heading-h2 text-dark-blue\">Cloud network security: key takeaways<\/h2>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Legacy security systems were designed for on-premises networking. <strong>Next-generation cloud security tools are built into the cloud, <\/strong>where they operate alongside SaaS apps and cloud infrastructure.<\/p>\n\n<ul class=\"list\">\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Threat detection systems neutralize malware attacks.<\/p>\n<\/li>\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Access management tools block unauthorized users.<\/p>\n<\/li>\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Segmentation keeps high-value assets safe behind additional barriers.<\/p>\n<\/li>\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Encryption conceals data from external intruders<\/p>\n<\/li>\n<\/ul>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">These features work together to mitigate security risks associated with the cloud. In a world where businesses depend on cloud infrastructure, robust cloud network security is essential.<\/p>\n\n<h2 id=\"looking-for-a-cloud-network-security-solution\" class=\"Heading Heading-h2 text-dark-blue\">Looking for a cloud network security solution?<\/h2>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">NordLayer will help you build customized cloud network security architecture. Our products include a range of cloud-native features to protect data and enable secure collaboration. For example, users benefit from:<\/p>\n\n<ul class=\"list\">\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Seamless identity management.<\/p>\n<\/li>\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Threat blocking tools to analyze network traffic and block cloud threats.<\/p>\n<\/li>\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Secure gateways link remote workers to the cloud<\/p>\n<\/li>\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Control access with IP allowlisting.<\/p>\n<\/li>\n<\/ul>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Achieve reliable, comprehensive cloud network security.<a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"\/contact-sales\/\"> Get in touch<\/a> with NordLayer and discuss your options today.<\/p>\n\n<\/article><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63561\" class=\"elementor elementor-63561\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b6aa2c4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1b6aa2c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b283ee5\" data-id=\"1b283ee5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e466f1a elementor-widget elementor-widget-text-editor\" data-id=\"4e466f1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordLayer<br \/><\/strong>NordLayer is an adaptive network access security solution for modern businesses \u2013 from the world\u2019s most trusted cybersecurity brand, Nord Security.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cloud network security is a general term for the measur [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[973,1075,1130,61],"tags":[974,1076,1132],"class_list":["post-68476","post","type-post","status-publish","format-standard","hentry","category-nord-security","category-year2023","category-nordlayer","category-press-release","tag-nord-security","tag-1076","tag-nordlayer"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Meet Nord People: Insights from our Engineering Managers - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordlayer.com\/blog\/what-is-cloud-network-security\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Meet Nord People: Insights from our Engineering Managers - Version 2\" \/>\n<meta property=\"og:description\" content=\"Cloud network security is a general term for the measur [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordlayer.com\/blog\/what-is-cloud-network-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-30T06:13:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-30T06:18:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5I0vJtZIN66BBJvqRbfoG7\/a6352ce602a2681f59128e1617e1e104\/What-is-Cloud-network-security__web_1400x800_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/what-is-cloud-network-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/06\\\/meet-nord-people-insights-from-our-engineering-managers-2\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Meet Nord People: Insights from our Engineering Managers\",\"datePublished\":\"2023-06-30T06:13:53+00:00\",\"dateModified\":\"2023-06-30T06:18:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/06\\\/meet-nord-people-insights-from-our-engineering-managers-2\\\/\"},\"wordCount\":2197,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/what-is-cloud-network-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/5I0vJtZIN66BBJvqRbfoG7\\\/a6352ce602a2681f59128e1617e1e104\\\/What-is-Cloud-network-security__web_1400x800_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\",\"keywords\":[\"Nord Security\",\"2023\",\"NordLayer\"],\"articleSection\":[\"Nord Security\",\"2023\",\"NordLayer\",\"Press Release\"],\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nordlayer.com\\\/blog\\\/what-is-cloud-network-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/06\\\/meet-nord-people-insights-from-our-engineering-managers-2\\\/\",\"url\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/what-is-cloud-network-security\\\/\",\"name\":\"Meet Nord People: Insights from our Engineering Managers - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/what-is-cloud-network-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/what-is-cloud-network-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/5I0vJtZIN66BBJvqRbfoG7\\\/a6352ce602a2681f59128e1617e1e104\\\/What-is-Cloud-network-security__web_1400x800_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\",\"datePublished\":\"2023-06-30T06:13:53+00:00\",\"dateModified\":\"2023-06-30T06:18:20+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/what-is-cloud-network-security\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordlayer.com\\\/blog\\\/what-is-cloud-network-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/what-is-cloud-network-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/5I0vJtZIN66BBJvqRbfoG7\\\/a6352ce602a2681f59128e1617e1e104\\\/What-is-Cloud-network-security__web_1400x800_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\",\"contentUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/5I0vJtZIN66BBJvqRbfoG7\\\/a6352ce602a2681f59128e1617e1e104\\\/What-is-Cloud-network-security__web_1400x800_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/what-is-cloud-network-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Meet Nord People: Insights from our Engineering Managers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Meet Nord People: Insights from our Engineering Managers - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordlayer.com\/blog\/what-is-cloud-network-security\/","og_locale":"zh_HK","og_type":"article","og_title":"Meet Nord People: Insights from our Engineering Managers - Version 2","og_description":"Cloud network security is a general term for the measur [&hellip;]","og_url":"https:\/\/nordlayer.com\/blog\/what-is-cloud-network-security\/","og_site_name":"Version 2","article_published_time":"2023-06-30T06:13:53+00:00","article_modified_time":"2023-06-30T06:18:20+00:00","og_image":[{"url":"https:\/\/images.ctfassets.net\/5natoedl294r\/5I0vJtZIN66BBJvqRbfoG7\/a6352ce602a2681f59128e1617e1e104\/What-is-Cloud-network-security__web_1400x800_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"12 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordlayer.com\/blog\/what-is-cloud-network-security\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2023\/06\/meet-nord-people-insights-from-our-engineering-managers-2\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Meet Nord People: Insights from our Engineering Managers","datePublished":"2023-06-30T06:13:53+00:00","dateModified":"2023-06-30T06:18:20+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2023\/06\/meet-nord-people-insights-from-our-engineering-managers-2\/"},"wordCount":2197,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/what-is-cloud-network-security\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/5I0vJtZIN66BBJvqRbfoG7\/a6352ce602a2681f59128e1617e1e104\/What-is-Cloud-network-security__web_1400x800_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","keywords":["Nord Security","2023","NordLayer"],"articleSection":["Nord Security","2023","NordLayer","Press Release"],"inLanguage":"zh-HK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nordlayer.com\/blog\/what-is-cloud-network-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2023\/06\/meet-nord-people-insights-from-our-engineering-managers-2\/","url":"https:\/\/nordlayer.com\/blog\/what-is-cloud-network-security\/","name":"Meet Nord People: Insights from our Engineering Managers - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordlayer.com\/blog\/what-is-cloud-network-security\/#primaryimage"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/what-is-cloud-network-security\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/5I0vJtZIN66BBJvqRbfoG7\/a6352ce602a2681f59128e1617e1e104\/What-is-Cloud-network-security__web_1400x800_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","datePublished":"2023-06-30T06:13:53+00:00","dateModified":"2023-06-30T06:18:20+00:00","breadcrumb":{"@id":"https:\/\/nordlayer.com\/blog\/what-is-cloud-network-security\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordlayer.com\/blog\/what-is-cloud-network-security\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/nordlayer.com\/blog\/what-is-cloud-network-security\/#primaryimage","url":"https:\/\/images.ctfassets.net\/5natoedl294r\/5I0vJtZIN66BBJvqRbfoG7\/a6352ce602a2681f59128e1617e1e104\/What-is-Cloud-network-security__web_1400x800_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","contentUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/5I0vJtZIN66BBJvqRbfoG7\/a6352ce602a2681f59128e1617e1e104\/What-is-Cloud-network-security__web_1400x800_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/nordlayer.com\/blog\/what-is-cloud-network-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Meet Nord People: Insights from our Engineering Managers"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-hOs","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/68476","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=68476"}],"version-history":[{"count":3,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/68476\/revisions"}],"predecessor-version":[{"id":68479,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/68476\/revisions\/68479"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=68476"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=68476"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=68476"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}