Solving the enigma of effective network security management in cloud environments