Securing the Physical, Virtual, Cloud Continuum
sponsored by Juniper Networks, Inc and Plan B Technologies, Inc

The data center is undergoing a radical shift, from virtualization towards internal cloud environments where workloads dynamically move according to real-time performance needs. At the same time, IT practitioners are interested in exploring external cloud computing options--but security and compliance concerns are squelching adoption. A key concern is trust. Moving to a cloud provider shifts the burden of trust onto the provider--something that few providers are able to handle today. To overcome this concern, responsibility for security and compliance needs to stay with the customer.

This requires an overhaul of security practices--all the familiar practices we’ve been using for 15 years. We need new security and compliance controls that span the physical, virtual, cloud continuum (not everything will be virtual so security must continue to protect physical assets). We also need security controls that are location-aware and dynamically enforce policy regardless of workload location. This requires an adaptive perimeter defense and restoration of depth for defense in depth.

Read this white paper to learn more about information security concerns that span physical, virtual, and cloud environments.

(THIS RESOURCE IS NO LONGER AVAILABLE.)
 
See what other users are reading via our Daily Top 50 Report
.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement