The paper will describe the security technologies for meeting the requirements of security in a cloud-based network environment. It will discuss the technologies of security, including virtualization, encryption, data security, and multi-factor authentication. The report will also explain how Drotos Engineering can use these techniques to design a cloud-based network environment.