sponsored by Trend Micro
Posted:  15 May 2011
Published:  11 May 2011
Format:  PDF
Length:  6  Page(s)
Type:  White Paper
Language:  English
ABSTRACT:

The cloud computing effect is becoming reality. Organizations are starting to shift at least some IT processes from a basic "hardware, assets, and license" approach, to an "outsourced, no license, no asset" spending model. These shifts bring real financial benefits and renewed IT flexibility. However, cloud computing, even as it shakes up the old IT model, is not entirely new traditional security questions still apply. As a first step, assessing the risk in security and compliance is imperative. "Old" security topics such as control and manageability, tracking records of actions, trust and incident management, liability and support, and misuse and data leakage are all critical. Until now, no new risks or weaknesses adjacent to cloud computing have been named, documented, and countered. This Technology Spotlight examines security questions and answers in the cloud computing environment. 






BROWSE RELATED RESOURCES
Cloud Computing | Cloud Security | Data Security | Encryption Standards | Security Management | Virtualization Security

View All Resources sponsored by Trend Micro

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement