Trending November 2023 # How Endpoint Security In A Cloud # Suggested December 2023 # Top 12 Popular

You are reading the article How Endpoint Security In A Cloud updated in November 2023 on the website We hope that the information we have shared is helpful to you. If you find the content interesting and meaningful, please share it with your friends and continue to follow and support us for the latest updates. Suggested December 2023 How Endpoint Security In A Cloud

This article was published as a part of the Data Science Blogathon.


Historically, most organizations used conventional security products such as firewalls, VPNs, endpoint management solutions, and antivirus programs to protect sensitive information, prevent unauthorized access to critical applications and I.T. systems, and protect against malware and other vulnerabilities.

However, businesses are increasingly adopting mobile applications and cloud services, disrupting the once well-defined perimeter of the enterprise network. Cyber ​​attackers are becoming more sophisticated and are increasingly able to evade traditional security measures. Many enterprises are now taking an in-depth approach to endpoint protection and implementing a wider range of security controls to protect against a wider range of threats.

Endpoint Security An in-depth Approach to Endpoint Security

Originally designed by the U.S. National Security Agency, the defense-in-depth approach uses multiple layers of security to close gaps, reduce attack surfaces, and limit threats.

A complete endpoint security-in-depth strategy includes five key endpoint security and management measures:

Patching the operating system to mitigate common vulnerabilities and threats (CVEs). All major operating system manufacturers routinely release software updates to address known security issues. Enterprise I.T. and security organizations can reduce risks by implementing automated O.S. updating and other systems and procedures to ensure that all corporate computers, servers, and mobile devices are running the latest version of the operating system.

Application patching Organizations can improve their security by ensuring that all enterprise desktop, server, and mobile applications are up-to-date.

Permission management grants users and processes the minimum permissions they need to perform required tasks. Also known as the principle of least privilege (POLP), privilege management removes local administrator rights on servers and P.C.s. It limits access permissions to authorized users and applications to reduce risk.

Why should the Endpoint be Secure?

Productive endpoint security is a must for modern businesses – locking every door in your corporate house is no longer a matter of choice. Data is the fuel of business, and protecting it is paramount to an organization’s success.

With the shift to mobility, security must now occur at all points within the network. Centralized security systems have proven ineffective in today’s dispersed landscape. Jose-Miguel Maldonado, Vice President of Business Ops & Security at Rubica, explains: “People are outside the corporate security fabric and today’s attacks are extremely sophisticated. Traditional solutions such as on-premise firewalls and antivirus are simply not enough anymore.”

On-point Security

This enables based on securing all network endpoints from a solution hosted and managed on internal servers. The user bears all costs – this includes cooling, staff, space, and electricity. On-point software usually requires a large initial investment and can require lengthy installation. For these reasons, they may not be the best choice for organizations on a tight budget looking for a faster solution.

Cloud-based Endpoint Security

This option includes securing all network endpoints from a solution hosted and managed on the vendor’s cloud. Often referred to as “endpoint protection,” this solution provides a cost-effective and agile option that can be deployed in minutes. Cloud solutions offer several benefits, starting with access to vendor databases and monitoring that provides a quick response to threats. In addition, for a reasonable monthly fee, users get automatic data backup, faster repairs even for remote devices, and remote system control.

Types of Endpoint Security

Endpoint security uses specific procedures to block threats and secure your network.

Endpoint Encryption: Involves encoding and scrambling data, making it indecipherable without a key. Encryption is the last and perhaps most important layer of security as it protects data even if the wrong person has it.

Forensic Analysis: Works in parallel with EDR by monitoring all endpoint activity and creating a digital trail of all incidents. All information and evidence related to the attack – what happened, who is responsible, and the resulting consequences – is collected and analyzed to prevent future incidents.

IoT Security: Many IoT devices lack adequate security after installation. Start by installing an EDR system to find vulnerabilities, manage and monitor. Be sure to remove legacy devices, install next-generation solutions, monitor access by all apps and devices, encrypt communications, and segment your network to isolate problems.

Email Gateways: Email is the most common way criminals spread spam; that’s why email software is not safe today. Safe emails continue through the system while potential threats go to quarantine.

Quarantine Protection: This is separating dangerous files to prevent damage to devices and networks. Rapid isolation of dangerous files is essential for endpoint security, and quarantine also allows valuable files to be cleaned, not thrown away.

Demonstrating Sufficient Endpoint Security

If there’s one thing more important than securing your endpoints, it’s evidence. Reporting your organization’s ability to control risk and protect sensitive data offers many benefits, from avoiding regulatory fines to maintaining an attractive supplier reputation.

SOC 2 reports are unique to every organization, with fluid requirements and custom controls. Your organization can set its criteria but must ensure that controls are in place to meet the requirements and then effectively document the auditor’s success – not always an easy task. Other related content: SOC 2 compliance: What you need to know and do. Hyper proof’s SOC framework supports endpoint security with Hyper proof’s operational compliance software.

Endpoint Security is Critical to your Business

In today’s mobile world, security is evolving rapidly – ​​endpoints now form the new perimeter, and organizations need to secure their data across various networks. As organizations grow, so do their endpoint, and vulnerability security is a must for all businesses, regardless of size or status.

Smart organizations of all sizes will strengthen the new perimeter and protect every device as if it were the key to their entire house with robust endpoint solutions. They’ll avoid the financial and reputational blow of costly breaches—and their CISOs will sleep better at night knowing their endpoint network is secure.

Benefits of Endpoint Privilege Management

Endpoint privilege management solutions help strengthen security and reduce risk by removing unnecessary local administrator privileges from endpoint devices and limiting malicious applications and other threats on the endpoint. An essential component of an endpoint security-in-depth strategy, an endpoint privilege management solution provides a critical layer of protection when an attack evades traditional perimeter and endpoint security controls.

Endpoint authorization management solutions enable enterprise I.T. operations, security, and compliance teams to:

Provide least privilege access for end devices and strengthen security.

Secure and rotate local administrator passwords to prevent credential theft.

Prevent end users from installing unapproved applications and limit exposure.

Run unknown apps in restricted mode and prevent corporate assets or confidential data access.

Protect against, block, and contain malware and endpoint attacks, prevent lateral movement and spread of malware, and reduce risk.

Automatically escalate permissions base, increase user productivity while reducing I.T. burden.


Let’s see What we have Learned today; Cyber ​​attackers are becoming more sophisticated and are increasingly able to evade traditional security measures. Many enterprises are now taking an in-depth approach to endpoint protection and implementing a wider range of security controls to protect against a wider range of threats.

Productive endpoint security is a must for modern businesses – locking every door in your corporate house is no longer a matter of choice. Data is the lifeblood of business, and protecting it is paramount to an organization’s success.

SOC 2 reports are unique to each organization, with fluid requirements and custom controls. Your organization can set its criteria but must ensure that controls are in place to meet the requirements and then effectively document the auditor’s success – not always an easy task. Other related content: SOC 2 compliance:

Endpoints now form the new perimeter, and organizations must protect their data across networks. As organizations grow, so do their vulnerabilities, and endpoint security is a must for all businesses, regardless of size or status. Jose-Miguel Maldonado emphasizes this point: “Whether you’re a small or large business today, you need to spend time and effort securing your business with a strong endpoint security solution.”

The media shown in this article is not owned by Analytics Vidhya and is used at the Author’s discretion. 


You're reading How Endpoint Security In A Cloud

Bitlocker Encryption Using Aad/Mdm For Cloud Data Security

With Windows 10’s new features, the productivity of users has increased leaps and bounds. That’s because Windows 10 introduced its approach as ‘Mobile first, Cloud first’. It is nothing but the integration of mobile devices with the cloud technology. Windows 10 delivers the modern management of data using cloud-based device management solutions such as Microsoft Enterprise Mobility Suite (EMS). With this, users can access their data from anywhere and anytime. However, this kind of data also needs good security, which is possible with Bitlocker.

Bitlocker encryption for cloud data security

Bitlocker encryption configuration is already available on the Windows 10 mobile devices. However, these devices needed to have InstantGo capability to automate the configuration. With InstantGo, the user could automate the configuration on the device as well as backup the recovery key to the user’s Azure AD account.

But now the devices will not require the InstantGo capability anymore. With Windows 10 Creators Update, all Windows 10 devices will have a wizard where users are prompted to start the Bitlocker encryption regardless of the hardware used. This was mainly the result of users’ feedback about the configuration, where they wished to have this encryption automated without having the users do anything. Thus, now the Bitlocker encryption has become automatic and hardware independent.

How does the Bitlocker encryption work

When the end-user enrolls the device and is a local admin, the TriggerBitlocker MSI does the following:

Deploys three files into C:Program Files (x86)BitLockerTrigger

Imports a new scheduled task based on the included Enable_Bitlocker.xml

The scheduled task will run every day at 2 PM and will do the following:

Run Enable_Bitlocker.vbs which the main purpose is to call Enable_BitLocker.ps1 and make sure to run minimized.

In its turn, Enable_BitLocker.ps1 will encrypt the local drive and store the recovery key into Azure AD and OneDrive for Business (if configured)

The recovery key is only stored when either changed or not present

Users who are not part of the local admin group, need to follow a different procedure. By default, the first user that joins a device to Azure AD is a member of the local admin group. If a second user, who is a part of the same AAD tenant, logs on to the device, it will be a standard user.

This bifurcation is necessary when a Device Enrollment Manager account takes care of the Azure AD join before handing over the device to the end-user. For such users modified MSI (TriggerBitlockerUser) has been given Windows team. It is slightly different from that of local admin users:

The BitlockerTrigger scheduled task will run in the System Context and will:

Copy the recovery key to the Azure AD account of the user who joined the device to AAD.

Copy the recovery key to Systemdrivetemp (typically C:Temp) temporarily.

A new script chúng tôi is introduced and runs daily via a scheduled task called MoveKeyToOD4B. This scheduled task runs in the users’ context. The recovery key will be moved from systemdrivetemp to the OneDrive for Businessrecovery folder.

For the non-local admin scenarios, users need to deploy the TriggerBitlockerUser file via Intune to the group of end-users. This is not deployed to the Device Enrollment Manager group/account used to join the device to Azure AD.

To get the access to the recovery key, users need to go to either of the following locations:

Azure AD account

A recovery folder in the OneDrive for Business (if configured).

For more information on how to enable the Bitlocker encryption, read the complete blog on Microsoft TechNet.

The Dod’s New Cloud Security Requirements: What Hosts Should Know

Towards the middle of January, the Defense Information Systems Agency – a subdivision of the United States Department of Defense – released a new cloud computing security requirements guide, which we first heard talk of back in November. The primary purpose of this SRG is to make the process of acquiring commercial cloud services more efficient for DoD agencies (without undermining security, of course). Not surprisingly, this means that the SRG effectively renders obsolete the DoD’s original Cloud Security Model, under which only a few select vendors received authorization.

“In plain language, the new guide explains that components “remain responsible for determining what data and missions are hosted” by cloud service providers,” writes Frank Konkel of Nextgov. “Each use of cloud services will also require an enterprise IT business case analysis, with each analysis required to consider DISA-provided cloud services such as DISA’s milCloud offering.”

Cloud Storage and Backup Benefits

Protecting your company’s data is critical. Cloud storage with automated backup is scalable, flexible and provides peace of mind. Cobalt Iron’s enterprise-grade backup and recovery solution is known for its hands-free automation and reliability, at a lower cost. Cloud backup that just works.


It’s a significant step forward for the organization, and one that cloud providers should pay close attention to. If you’ve the time, I’d recommend reading over the document (you can find it here). In the meantime, I’m going to offer up a few of the key takeaways hosts should draw from all of this.

You Are Responsible For Keeping Client Data Safe

At the end of the day, it’s your responsibility as a host to keep whatever information your clients store and manage in your cloud secure. That’s one of the first things laid out in the SRG – and it’s a principle that every host should understand. While you cannot control whether or not your clients bring in unsafe vendors or engage in unsafe security practices (you don’t have the same level of power as the DISA), your core platform nevertheless needs to be properly hardened.

Requirements Should Always Be Discussed – Security And Otherwise

As anyone who follows the organization well knows, the Department of Defense has something of a rocky relationship with the cloud. Back in 2013, the DISA axed a $450 million cloud computing contract due to a lack of follow-through and demand from the DoD. The deal would originally have required ten cloud providers to develop database hosting, web hosting, storage, and virtual servers.

It would have been a great deal for the chosen providers – but unfortunately, it never came to be.

“Initial indications are the demand will not require a contract with the ceiling estimated in this draft solicitation,” explained contracting officer Scott M. Stewart. “We are currently revising our acquisition strategy for satisfying requirements for hosting public non-sensitive data in commercial cloud environments. This strategy may result in a solicitation for a new contract at a significantly lowered ceiling or the leveraging of contracts previously awarded which contain the appropriate scope for meeting this demand.”

It goes without saying that someone should have seen this coming – government spending on IaaS offerings has, historically, been quite low. Somewhere along the line, communication must have broken down – someone didn’t accurately convey the DoD’s requirements (or the organization simply misunderstood them). As a hosting provider, this isn’t a mistake you can afford to make – resource and security requirements need to be hashed out with the client beforehand.

There Are Different “Levels” Of Security

One of the most noteworthy features of the draft document is that it takes care to distinguish between several different security levels where the cloud is concerned, based both on the scale of a particular system and the sensitivity of the data it manages. It’s worth mentioning that the DoD did already have a categorization system in place – the primary changes in the new SRG are differentiation in terms of scale. The new classification system will, for example, distinguish between national security systems and non-national ones.

So…what does all this mean for you as a host?

Easy – you need to understand what sort of clients your cloud serves. Chances are pretty good you’ve a fairly diverse client base; it also follows that each of your clients has their own unique set of security requirements. Be certain that you account for those requirements.

Security Is Nothing Without The Capacity To Follow Through

A bevy of cloud security measures looks great on paper – but as we touched on above, they’re more or less useless if one’s organization doesn’t have the capacity to enforce them. As a cloud provider, you cannot afford to be “all talk.” Security measures need to be strictly enforced to ensure that client data is kept safe and secure.

In Closing

Historically, government organizations such as the Department of Defense haven’t had the best relationship with cloud security. An examination of their struggles – and the methods by which they overcome them – is a valuable case study for any cloud provider. Learn from their mistakes, and take stock of their successes, and your business will be better for it.

Photo courtesy of Shutterstock.

Fostering A Feeling Of Security In Young Students

There are many ways to implement simple modifications to everyday routines in the pre-kindergarten and elementary classroom that can result in significant gains for your students.

The following suggestions and supports offer options to further nurture academic skills in a way that all members of your classroom community can utilize (in the least restrictive manner). I hope you’ll find you can easily embed them into your already busy schedule, resulting in greater consistency, flow, and follow-through.

Setting the Scene for Enriched Learning

Use natural or incandescent lighting: An incandescent light bulb, with a fuller spectrum of light, emits a warm glow that’s notably less harsh than fluorescent lighting. Fluorescent lighting has a limited spectrum and emits a poorer quality of light. Lack of exposure to a broad spectrum of light can affect our bodily functions, such as our circadian rhythm (think sleep).

If changing the lighting isn’t an option, try to open blinds or shades and turn off one of the fluorescent lights.

Provide a variety of soft pillows, mats, and cushions: These should be of different sizes, shapes, and textures for children to access during reading, writing, interactive play, etc. Children spend too much time sitting upright. Consider allowing them to attend to instruction, complete schoolwork, and play lying prone (belly on the floor), standing, or in alternate positions.

Ensure that students aren’t sitting longer than they’re developmentally able to: A good strategy is to use a visual timer set to approximately one minute per year of age (e.g., if the children are age 8, set the timer for 8 minutes). After 8 minutes, allow them to get up and engage in a controlled movement-based activity that incorporates proprioception, crossing midline and vestibular inputs, like cross crawls.

“Mirror-me” movements: Tell the children to copy your movements so exactly that it’s as if they’re your mirror. This process not only forces them to slow down and work on body control but activates mirror neurons in the brain, which are important for overall improved attention.

Consider having your students perform large movement exercises or yoga poses: This can be part of a consistent classroom routine. Large movement exercises are defined as static (holding the body against gravity) or dynamic (movement-based) supports involving the entire body; that is, the child cannot complete these exercises from a seated position. One example of a static large movement exercise would be the downward dog yoga pose; an example of a dynamic large movement exercise would be jumping jacks.

Try implementing this as part of a morning classroom schedule, as an after-lunch/recess cool-down classroom activity, to break up independent work times, etc. This will not only improve overall physical and emotional regulation but provide the consistency and feeling of safety that come with predictable routines.

Think about having  a “proud board” in your classroom: Place students’ names on it, with space to showcase their favorite work that they’re most proud of. Note: If you make it magnetic, they can easily put on and take off their “proud pieces.”

Have a cool-down/sensory area within the classroom and larger school setting: When signs of decreased physical or emotional regulation begin to emerge, direct the child to this area. Some items to possibly include are bean bags (to provide a bean bag “squish”), putty, a lava lamp or aquarium light, a drawing pad and crayons, lavender- or vanilla-scented materials (calming scents), a weighted lap pad/blanket, a sealed glitter jar, a box of kinetic sand, etc.

This area can also be a place for your students to work independently on schoolwork and for them to go when they’re feeling emotionally dysregulated (not able to manage emotional responses well).

Create an emotional-control toolbox: You can stock this with items like putty or Play-Doh, a small notepad and a few crayons, a mini-glitter jar, a small stress ball, etc., for your students to take to certain environments that you know may prove to be triggers—lunch, recess, field trips, etc. Give them the toolbox when you notice the first signs of emotional dysregulation, and coach them in how to use it, with fading prompts. As your students become more familiar with and independent in utilizing this tool on their own, you can decrease the amount of visual/verbal prompts you provide.

Positive affirmations jar: This can provide students with a tangible way to access growth-mindset and emotional regulation supports. In my office, I have a jar with student-generated cards of different positive affirmations, and students can easily access them, as they’re in a place that students can visit frequently.

Using these strategies regularly with your students just might help them to feel more secure and ready to learn.

Logitech G Cloud Review: Head In The Cloud


Comfortable and lightweight

Clear and bright display

Excellent battery life


Not as good value as rivals

Requires lots of subscriptions

Powerful mobile games are laggy

Our Verdict

The Logitech G Cloud offers great hardware and is ideal for those who are happy to subscribe to cloud gaming services, but it is pretty expensive for a console that requires Wi-Fi for most of its features.

Best Prices Today: Logitech G Cloud




View Deal

Handheld gaming has always been popular, with brands such as Nintendo long dominating the market with the Gameboy, DS and Switch. In recent years there have been a surge of handheld gaming PCs, including the Steam Deck and the Asus ROG Ally.

The Logitech G Cloud offers something a little different, combining cloud gaming with an Android experience that is similar to what you’d find on a basic tablet.

Dominik Tomaszewski / Foundry

What is the Logitech G Cloud?

Cloud gaming device

Controls inspired by Xbox

The Logitech G Cloud is a handheld gaming console in the style of the Nintendo Switch, with a twist. The console is designed specifically with cloud services like Xbox Game Pass and Nvidia GeForce Now in mind.

The console isn’t packed with powerful hardware like you’d find on the Steam Deck or Asus ROG Ally. Instead, the heavy lifting in games is done elsewhere via various cloud services. This way, the price and weight can be kept down.

Dominik Tomaszewski / Foundry

The look is pretty familiar to other modern handheld consoles, with the display in the centre, and the buttons and levers on the side.

The layout of the buttons mimics what you’ll find on an Xbox control, and the asymmetrically placed joysticks, ABXY buttons, trackpad, triggers and bumper buttons are also pretty much the same. This is perhaps not surprising when Microsoft’s Xbox Game Pass is one of the main gaming sources for the console.

Design and build


One colour option

Ergonomic build

One of the most important aspects of a portable console is how it feels in your hand. Fortunately for the Logitech G Cloud, it is just right.

The rounded bottom corners sit comfortably in the palm, whilst the lightly textured materials on either side allow it to be gripped securely. Most of the buttons are easy to reach without having to adjust too much, and those that are a little more out of the way are the two buttons you’ll likely use the least.

Dominik Tomaszewski / Foundry

The weight of the console is crucial for comfort. You don’t want to drop what feels like a brick on your face when you’re lying in bed playing. At 463g, the G Cloud weighs almost a third less than both ROG Ally and Steam Deck, but slightly more than a regular Nintendo Switch with Joy-Cons connected – it varies slightly between different models of the Switch.

Playing on the G Cloud for long periods of time shouldn’t be a problem, you just need to make sure you find a good sitting or lying position to play in. The light weight and slim profile also means its great for slipping into a bag for travel.

One of the most important aspects of a portable console is how it feels in your hand. Fortunately for the Logitech G Cloud, it is just right

Display, speakers and battery

7in LCD panel

60Hz refresh rate

Stereo speakers

The Logitech G Cloud’s 7in screen is largely impressive. The resolution is the same as the ROG Ally, 1080p, which is better than both the Nintendo Switch’s 720p and Steam Deck’s 800p. The 60Hz refresh rate is on par with Steam Deck, but falls behind the 120Hz refresh rate on the ROG Ally.

The G Cloud uses an LCD panel. Whilst the colours aren’t as rich as what you’ll find on a console with an OLED panel, they’re still impressive and pop well enough.

Dominik Tomaszewski / Foundry

In terms of brightness, the panel is 450 cd/m2. For reference, the Steam Deck’s screen is 400 cd/m2, whilst the ROG Ally can reach 500 cd/m2. In practical terms, this means its just bright enough to use outside when turned up to full.

The console features dual stereo speakers on the bottom. Whilst these are reasonably loud and punchy, their placement means that they’re easy to muffle if you’re leaning the console against something. There’s also a headphone jack located on the bottom if you want a more personal audio experience.

Under the hood there is a 6,000mAh battery, which should be able to keep the G Cloud going for 12 hours of play “under normal gaming conditions.” This is reflected during testing, with the console only requiring a few charges during numerous days of testing.

Charging is done via the USB-C port (a cable and brick is included), and it takes just over two hours to juice the console from flat to full.

Cloud gaming

Works with Xbox Game Pass, Nvidia GeForce Now, Steam Link and more

Some games may leave libraries at short notice

The longevity of any games console is the largely dependent on the range of games available. The Switch has Nintendo’s proprietary masterpiece, whilst the Steam Deck and the ROG Ally can install large parts of the Steam library and many other PC titles.

The Logitech G Cloud ends up in a bit of a strange position here, as it is more or less dependent on the cloud services available – though you can certainly play some of the games you already own on PC via features like Steam Link.

Microsoft’s Xbox Cloud Gaming, which is part of Xbox Game Pass, has a really wide range of games to choose from, from Assassin’s Creed: Origins to Star Wars Jedi: Survivor. However, there are drawbacks to the service. For starters, it’s a subscription. In addition to paying for the console, you must fork out every month to play the titles available.

Kristian Kask

Xbox Cloud Gaming also has a rotating library, with titles being removed from time to time. Like your favourite series on Netflix, your favourite game could be gone from the service before you’ve finished playing it.

However, the storage of saves in the cloud is really cool. It allows you to seamlessly switch from playing something on your Xbox console on the TV to handheld on the G Cloud without losing any progress.

Kristian Kask

Nvidia’s GeForce Now lets you play lots of games you have on various libraries, such as Steam or Epic Games Store. There is a free version, but this comes with lots of drawbacks – so again, you’ll likely want to pay a monthly subscription. In addition, you need to already own the games on one of the other services to be able to play them.

One of the new services added to the Logitech G Cloud with the launch in Europe is Shadow PC, a cloud service that gives you access to an entire virtual PC in the cloud. The service can be used for most things a regular PC can do, including gaming.

For example, you can play modified versions of games via the cloud computer. Mods for games like The Elder Scrolls V: Skyrim have been an incredible part of its popularity over the past 12 years, and are often cited as a major benefit of PC gaming. But yet again, it’s another subscription.

Playing on the Logitech G Cloud may be great, but there’s no escaping the fact that you’ll face a pretty hefty bill every month to get the most out of the console. The only gaming that doesn’t require a subscription are some Android titles – more on that later.

…there’s no escaping the fact that you’ll face a pretty hefty bill every month to get the most out of the console


Wi-Fi needed

Slow internet speeds can affect cloud gaming

There’s been a lot of talk about cloud services, but there’s one thing they all require: a network connection. How much you get out of a Logitech G Cloud depends on your internet speeds.

Dominik Tomaszewski / Foundry

The faster your internet is, the better your gaming experience will be – slow speeds will lead to lag. During testing, we found that 100mbps was fast enough for smooth cloud gaming, providing that nobody else was doing anything taxing such as downloading large files. If you don’t have that luxury, you can hotspot using your smartphone.

This is the only way to play cloud games on the Logitech G Cloud while travelling, which rules it out of being used on planes and the underground, where connections are limited. For longer sessions, you may need to invest in a power bank to ensure your phone doesn’t run out of juice.

The fact that it is not possible to connect G Cloud to a mobile network directly is a shame. Inserting a SIM card and playing using a 5G network on the bus or train would have been perfect. As it is, G Cloud can only handle the most basic of games without a Wi-Fi connection.

Android experience and specs

Android 11

Qualcomm Snapdragon 720G processor

64GB worth of storage

The Logitech G Cloud can also function as an Android tablet. However, finding the button to switch to tablet mode is a bit tricky and requires digging around in the settings. To return to console mode, there is a large button right on the home screen.

With this, you can browse the internet and download traditional smartphone apps like Twitter, Gmail and YouTube. Oddly, it runs on the slightly older Android 11.

Dominik Tomaszewski / Foundry

You can download games and apps from the Google Play store and play them when you’re offline. Despite being a dedicated gaming device, the Qualcomm Snapdragon 720G processor is not the most powerful on the market.

As a result, Genshin Impact can only run on low graphics settings without overclocking, and even then there is some stuttering. More casual games like Animal Crossing: Pocket Camp will work just fine.

An interesting feature that the G Cloud got for the European launch is that you can map the physical buttons to points on the screen in some mobile games, so you can play with a more ergonomic grip instead of tapping the screen.

In addition to the Snapdragon processor, the console has an internal storage of 64GB, and has room for a microSD card to expand it if you really want to go heavy on mobile gaming.

Dominik Tomaszewski / Foundry

Price and availability

The Logitech G Cloud costs $349/£329, though at the time of writing the console has a $50 discount in the US. American readers can get it from Logitech, Amazon and Best Buy. Those in the UK can get it from Logitech, Amazon and Currys.

If we just take into account the RRP, this is expensive for a console that largely relies on Wi-Fi. It undercuts the base version of the Steam Deck ($399/£349), but this console can play PC games offline once they’re installed.

It’s also more expensive than all the Nintendo Switch consoles, two of which offer a hybrid way of gaming with the option of being used with your TV. Granted, you’re limited to Nintendo’s library with these consoles – but once you own a game, you’ll have it for life.

On top of that, you have the monthly subscriptions – Xbox Games Pass is priced at $10.99/£8.99 per month. There is a free tier of GeForce Now, but you’ll have to put up with queuing. The next tier up, Priority, costs $9.99/£8.99 per month.

Overall, this results in quite a pricey portable console to run. Other than the mobile games, you won’t own titles that you purchase, so there’s also a big question mark surrounding the longevity of this device in comparison to rivals.


The Logitech G Cloud is not the easiest console to rate. On the one hand, it is an incredibly comfortable handheld gaming device that lasts for hours on end on a single charge. The tablet mode also gives it another edge when it comes to versatility.

On the other hand, the reliance on cloud gaming puts a serious hindrance on it. You can’t really play it without Wi-Fi, and you’re beholden to the titles that are available in the cloud libraries that could be taken away at any point. Powerful mobile games also struggle on the G Cloud.

If you’re a big cloud gamer and love idea of trying out numerous titles every month, then it is still worth considering the Logitech G Cloud. Otherwise, there are other portable consoles that you can use anywhere on the go for a more affordable price.

This review has been translated and localised by Hannah Cowton for Tech Advisor, who also added in her own opinions after testing the Logitech G Cloud. The original article was written by Kristian Kask for M3.

Dominik Tomaszewski / Foundry


Processor: Qualcomm Snapdragon 720G

Storage: 64GB

OS: Android 11

Display: 7in IPS LCD, 1920 x 1080 pixels, 60Hz, multitouch

Wireless: Dual band Wi-FI 2.4 GHz & 5 GHz, Bluetooth 5.1

Battery life: 6,000mAh cell, 12 hours of game play under “normal gaming conditions”

Dimensions: 256.84 x 117.21 x 32.95mm

Weight: 463g

Pov: Redefining Us National Security In A Divided And Unequal Nation

POV: Redefining US National Security in a Divided and Unequal Nation

Photo by Joshua Hoehne/Unsplash


POV: Redefining US National Security in a Divided and Unequal Nation “Our strategic tunnel vision is clouding our thinking on what it means to keep America safe”

The primary responsibility of the US government is to keep every American safe from harm. China, Russia, North Korea, and Iran are all focused and determined on changing the post–World War II order. While America’s eyes are focused on the long-term challenge posed by China, Russia’s unprovoked invasion of Ukraine highlights the volatility of today’s strategic environment. America needs to stop looking through the myopic lens of enormous defense budgets as the sole barometer of our security. By negating other key items that should classify under the broad umbrella of national security, we are sacrificing the future safety of our children and grandchildren.

America’s defense strategy is focused on one major assumption—the next conflict will be an away game. Our entire defense establishment, capabilities, and organization is based on this core concept. This naiveté in strategy has paralyzed us into thinking that it is incomprehensible that the next war could be fought on our own shores. We are accustomed to watching wars unfold on cable news with virtually no impact to most of our citizens—Afghanistan and Iraq, and now Ukraine, are prime examples. While the best defense is a strong offense, our strategic tunnel vision is clouding our thinking on what it means to keep America safe. While adequately resourcing the US military is important, it isn’t the only requirement in our collective security. 

We’re living in the “Boy Who Cried Wolf” world. Senior defense and military leaders continually complain that they don’t have enough resources. Yet the United States spends an astronomical amount on its military and national-security enterprise. The fiscal year 2023 Congressional-approved defense budget was a staggering $782 billion. The House Armed Services Committee recently approved its version of the fiscal year 2023 defense bill, with a top-line of nearly $840 billion. While the bipartisan nature of the Senate and House Armed Services Committees is a welcome respite from the partisan knife fights on Capitol Hill, pouring money into the Defense Department isn’t the cure-all of American security. It is impossible to have a strong defense, while on the other hand elected leaders are chipping away at the very fabric of our democracy on unfounded claims of fraud in the last election.

We’re spending nearly a trillion dollars per year on our defense budget, at the same time that we’re missing critical components of a comprehensive security strategy. The Biden administration has failed to produce a National Security Strategy and the Department of Defense has failed to produce an unclassified version of the National Defense Strategy and the Nuclear Posture Review. While most Americans don’t read or care about these documents, it is a fundamental right in our democracy that we understand the policies and guidance that are aligned to the trillions of dollars spent on national defense. Blindly following a leader’s will isn’t a democratic principle. Questioning our leaders is a moral obligation in our democracy.

Resourcing education as a national imperative

America needs a highly educated and highly trained workforce to compete against the Chinese juggernaut; however, we’re already losing that battle. According to a paper published in 2023 by the Center for Security and Emerging Technology at Georgetown University’s Walsh School of Foreign Service, “We find that China has consistently produced more STEM doctorates than the United States since the mid-2000s, and that the gap between the two countries will likely grow wider in the next five years…by 2025 Chinese universities will produce more than 77,000 STEM PhD graduates per year compared to approximately 40,000 in the United States. If international students are excluded from the US count, Chinese STEM PhD graduates would outnumber their US counterparts more than three-to-one…” 

It is impossible to develop the complex weapon systems we need without a strong science and engineering workforce. Additionally, operating these weapon systems requires an equally educated force.

Allocating resources to America’s 16,800 school districts is a national security imperative. A high-quality education, regardless of where you live and how much money you make, must be a fundamental right in this country. In this same vein, making community colleges free and tackling the abhorrent cost of higher education is another imperative. Without the brilliance of NASA’s African American female leaders in the 1960s, we would not have beaten the Soviets in the Space Race. Today’s competition against China is equally as fierce. In a country whose population pales in comparison to China’s, we can’t leave anyone behind.

Education in America demands we understand our country and the world around us. Banning books is the antithesis to an educated populace. Nearly 140 school districts in 32 states issued more than 2,500 book bans during the 2023-22 school year, affecting nearly four million students across 5,000 schools, according to the [PEN America] report “Banned in the USA: The Growing Movement to Censor Books in Schools.” If our schoolchildren can’t distinguish opinion from fact and can’t embrace different cultures and beliefs, it will be impossible for them to develop the solutions to America’s most pressing problems. In some places in this country, ignorance is a badge of honor.

Acknowledging America’s broken democracy

The “Big Lie” in the 2023 election is indeed the biggest lie perpetrated on the American public. The hallmark of our democracy used to be the peaceful transition of power—our recent one-term presidents (Carter and Bush) showed the world the strength of our democracy. Winning at all costs and putting party above all has pitted Americans against Americans. It is in our normal vernacular to discuss red states versus blue states. But we’ve been here before and the outcome was America’s bloodiest war. I never understood why the road I took from my home in Virginia to the Pentagon was called the Jefferson Davis Highway—there isn’t an Adolph Hitler Highway in Germany. Seriously, we’re exalting the president of the Confederacy on the way to the headquarters of the US military.

Some governors are now attacking other states and using migrants as the weapon. Instead of embracing migrants that come to this country, they fly them (without their approval or knowledge) to blue states, and then they bask in the warm embrace of their constituents. The strength of a nation isn’t measured by the number of nuclear weapons or aircraft carriers they have, but on how they take care of the less fortunate in their communities.

Our democracy is broken when the legitimacy of an election is questioned when your candidate doesn’t win.

Our democracy is broken when instead of addressing the problem on immigration we use people as the weapon. 

Our democracy is broken when the Nazi flag is displayed in the US Capitol and there isn’t an outcry from 535 members of Congress. 

Our democracy is broken when women can no longer control their bodies.

Our democracy is broken when we make it difficult or impossible for every American to vote.

Our democracy is broken when we believe that this behavior is normal.

Repairing our democracy is a national security imperative.

Affluent to impoverished—all need to be  treated equal

The recently approved Infrastructure Investment and Jobs Act is a foundational component of national security. Our nation is weakened when some Americans don’t have clean water to drink, comprehensive healthcare, access to high-speed internet or are forced to live near an EPA superfund site. Every American community—from the most affluent to the most impoverished—needs basic services. To compete in a highly competitive world, every American needs the opportunity to be successful. This nation doesn’t have a resource problem—it has a priority problem. We always find the resources needed for the Pentagon, but taking care of Americans takes a back seat. Allocating some of these precious resources to communities of color is a national security imperative.

For America to compete in this new world order, we need to open our eyes and realize that our strength is more than our military. The path we’re on is weakening our nation. Only by broadening what we consider national security will we have a fighting chance in a complicated world. Putting the American flag on the back of your pickup truck isn’t patriotic. Treating everyone in America with respect is the most patriotic thing we can do.

Explore Related Topics:

Update the detailed information about How Endpoint Security In A Cloud on the website. We hope the article's content will meet your needs, and we will regularly update the information to provide you with the fastest and most accurate information. Have a great day!