{"id":8736,"date":"2015-04-09T07:00:43","date_gmt":"2015-04-09T14:00:43","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=8736"},"modified":"2015-04-08T16:20:40","modified_gmt":"2015-04-08T23:20:40","slug":"lets-design-a-secure-cloud-together","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2015\/04\/lets-design-a-secure-cloud-together\/","title":{"rendered":"Let\u2019s Design A Secure Cloud Together"},"content":{"rendered":"<p>Securing cloud environments has never been more challenging. Cyberattacks are on the rise and attackers are targeting critical datacenter assets using applications commonly found on your network. It is now an imperative that you control what\u2019s on your network, while preventing known and unknown threats.<!--more--><\/p>\n<p>Fortunately, there are tools to keep your cloud safe and your data secure. <a href=\"http:\/\/connect.paloaltonetworks.com\/securecloud\" target=\"_blank\">Read through our recommendations<\/a> for building a secure cloud.<\/p>\n<p><center><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/secure-cloud.png\"><div style=\"max-width:100%\" data-width=\"230\"><span class=\"ar-custom\" style=\"padding-bottom:131.3%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-8737 size-medium lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/secure-cloud-230x302.png\" alt=\"secure cloud\" width=\"230\" height=\"302\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/secure-cloud-230x302.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/secure-cloud-228x300.png 228w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/secure-cloud-30x40.png 30w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/secure-cloud.png 469w\" sizes=\"auto, (max-width: 230px) 100vw, 230px\" \/><\/span><\/div><\/a><\/center><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Securing cloud environments has never been more challenging. Cyberattacks are on the rise and attackers are targeting critical datacenter assets using applications commonly found on your network. It is now an imperative &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[113,155],"tags":[585],"coauthors":[716],"class_list":["post-8736","post","type-post","status-publish","format-standard","hentry","category-cloud-computing-2","category-cybersecurity-2","tag-whitepaper"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8736","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=8736"}],"version-history":[{"count":1,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8736\/revisions"}],"predecessor-version":[{"id":8738,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8736\/revisions\/8738"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=8736"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=8736"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=8736"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=8736"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}