Skip to main content

Home/ Cloud Computing/ Group items tagged cloud computing security

Rss Feed Group items tagged

Rich Hintz

Cloud Computing Poses E-Discovery, Legal Risks - 0 views

  • Cloud Computing Poses E-Discovery, Legal Risks April 10, 2009By Marty Foltyn ORLANDO, Fla. — Cloud computing was a hot topic at this week's Storage Networking World show, but one attorney sounded a warning note about the rush to the cloud. In a presentation titled "Computing (strike that — Litigation) in the Cloud," Steven Teppler, senior counsel at KamberEdelson in New York, said cloud computing and services are a corporate counsel's nightmare. The 2006 e-discovery amendments to the Federal Rules of Civil Procedure (FRCP) changed the legal and corporate information landscape, putting custody and control at top of mind. "Cloud computing means that data may always be in transit," said Teppler, "never anywhere, always somewhere." And that creates a big challenge for corporate counsel. How can they identify "who, when and where" in the cloud? How can organizations handle document retention? And to add another layer of worry, information targeted for the cloud may also be subject to laws requiring privacy and persistent data integrity, and other requirements that the storage manager may not even be aware of. Teppler spelled out the top cloud computing shortcomings: no native security attributes; inadequate or no security provisioning by providers; the lack of understanding of cloud legal issues (a real problem for not only cloud computing providers, but also corporate counsel and IT consultants); and the failure to recognize potential liability from either legal issues or a lack of security. Teppler told the audience that litigation in the cloud is already here. Users of cloud services will need to insist on service level agreement (SLA) terms with their providers to ensure legal and regulatory compliance, searchability, demonstrable customer care (security), provably persistent data integrity and reliability, and demonstrable storage security and integrity for electronically stored information in the cloud.
Casey Wedge

Connect your Business with Cloud Services for More Security - 0 views

  •  
    Get connected your business with Cloud services for cloud based security, long term data storage, secured network connection and preventing from all possible leaks and attacks. Many business owners choose to employ the Cloud because it is a great cost effective option and it allows their employees to collaborate easily.
  •  
    Get connected your business with Cloud services for cloud based security, long term data storage, secured network connection and preventing from all possible leaks and attacks. Many business owners choose to employ the Cloud because it is a great cost effective option and it allows their employees to collaborate easily.
Mike Gahms

Cloud Computing with Advanced Security Services - 0 views

  •  
    For Secure Cloud Computing 3 main basic considerations are : Security and Privacy, Compliance and Legal Issues offered by Cloud service provider. Cloud Services allow users to instantly and wirelessly share information and data between multiple devices faster than ever with advanced security.
Eric Swanstrom

10 Requirements your Cloud Provider Must Meet - 0 views

  •  
    Cloud Computing has the ability to increase uptime and accessibility, while decreasing the cost of ownership for application and server management. By using a provider's hardware, you only pay for what you use, rather than purchasing expensive equipment. In turn, this translates into an ability to scale up and down depending on your needs. Your Cloud Provider must meet 10 Requirements such as Security, Network Performance and Latency, SLA (Service Level Agreement), Network Connectivity, Available Managed Services, Customer Support, Scalability, Flexibility and Experience. With the Cloud your IT department will become a reliable, quick, and value-adding core to your business.
Richard Boss

Cloud Computing - Created by Weblineindia - 0 views

  •  
    This cloud computing PDF shows an overview of cloud computing. Download PDF and get basic details about cloud computing such advantages, disadvantages, features and many more. If you like then share your feedback!
Rich Hintz

cloud_cube_model_v1.0.pdf (application/pdf Object) - 0 views

  •  
    aim of this paper is to: - point out that not everything is best implemented in clouds; it may be best to operate some business functions using a traditional non-cloud approach - explain the different cloud formations that the Jericho Forum has identified - describe key characteristics, benefits and risks of each cloud formation - provide a framework for exploring in more detail the nature of different cloud formations and the issues that need answering to make them safe and secure places to work in
digitalhydcsg

Cloud computing security in Melbourne - 0 views

  •  
    Three types of Network Services WAN Optimisation, VoIP, Security
Maluvia Haseltine

Cloud Security Alliance (CSA) - security best practices for cloud computing - 1 views

  •  
    To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing.
Rich Hintz

InfoQ: Securing A Cloud Infrastructure - 0 views

  •  
    George Reese discusses the number one challenge faced by cloud computing - security. He discusses transparency, credential management, and identity management, intrusion detection, perimeter security, compliance, and the "biggest security hole in the cloud - the custom Web application."
digitalhydcsg

What is cloud Computing and Why Do I Care on Friday, 13th December 2013 at 4Hoteliers - 0 views

  •  
    Cloud computing is a term used to describe a variety of computing models that involve a collection of computers housed in a secure facility accessed through a network connection, typically the Internet. However, cloud computing isn't new, in fact it has been around since the early 1950s.
digitalhydcsg

Midsize Insider: Cloud Computing Lessons from Federal Agencies - 0 views

  •  
    Cloud computing is growing in use at federal agencies, according to a new survey that found that military, intelligence and civilian groups are rapidly adopting the cloud.
Sophia C.

Google Wants Your Data In The Cloud ... But Only The Google Cloud - 0 views

  •  
    Google has long promoted the idea of cloud computing as safe, secure and productive, but apparently only in its own cloud.
Rich Hintz

Amazon Registers AWS with CSA STAR - 1 views

  •  
    "Security, Trust & Assurance Registry (STAR) is an initiative by the Cloud Security Alliance (CSA) to document security controls offered by cloud computing providers."
Zac Mac

What are the Best Cloud Storage Services? - 0 views

  •  
    Whether you're going to use this for personal file #storage or for business use, the best cloud storage services are the ones that offer #security.
  •  
    Whether you're going to use this for personal file #storage or for business use, the best cloud storage services are the ones that offer #security.
digitalhydcsg

Cloud computing player aims to tap into ASX gold rush - 0 views

  •  
    Perth-based financial services technology provider Decimal is hoping to tap into local investor appetite for cloud computing services, with a back door listing on the Australian Securities Exchange in April.
Erik Reese

Risks and Recommendations When Moving into the Cloud Hosting Environment - 1 views

  •  
    Migrating to the cloud has some risks. Knowing to avoid them is essential for any company that wants to bet on the cloud model. In this article, you will see seven key aspects to follow for those companies that want to opt for the cloud securely.
digitalhydcsg

Cloud computing and security by Cloud Solutions - 0 views

  •  
    From Virtualisation to Cloud Based Environments
Kelly Hair

Cloud security: Feds on cusp of change -- Federal Computer Week - 0 views

  • Virtualization has been setting the stage for many of these issues for years, he said, but “what cloud computing is forcing us to look at is the survivability of systems…and protecting the data,” Hoff said. “While I hear the perimeter is going away [as a security approach], I disagree; it’s multiplying and the diameter is contracting,” Hoff said. “You’re going to outsource responsibility, but not accountability. So we need open standards and better visibility.”
  •  
    Interesting view on depermeterisation. Hoff's view is that the protected assets are in smaller clumps and still have a perimeter.
Right2Left Hosting

Cloud Data Protection - 0 views

  •  
    Our cloud data protection service provides security to your business data from power failures, natural disasters, device crashes and data deletion inadvertently.
digitalhydcsg

The power of on-demand, and the reason cloud providers don't like it - Cloud Tech News - 0 views

  •  
    Inside cloud providers data centers and offices lies a fundamental business risk brought about by on-demand flexibility, a risk which providers are more than keen to place back in the hands of its customers.
1 - 20 of 39 Next ›
Showing 20 items per page