sponsored by Cisco Systems, Inc.
Posted:  08 Feb 2012
Published:  08 Feb 2012
Format:  PDF
Length:  6  Page(s)
Type:  Presentation Transcript
Language:  English
ABSTRACT:

After auditing the security of the network, an organization needs to coordinate with the cloud provider on configuration issues and security policies. This presentation transcript will look at areas to cover with the cloud provider, including possible adjustments to firewalls and other perimeter defenses such as IPS, and how to ensure the changes don’t violate security policy. It also will discuss the issue of making sure the security provider’s security policies match up to the standards set inside the firewall, and the need to set relevant policies into the contractual agreement.






BROWSE RELATED RESOURCES
Bandwidth Management | Cloud Computing | Cloud Security | Network Architectures | Network Management | SaaS business intelligence | Security Architectures | Security Management

View All Resources sponsored by Cisco Systems, Inc.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement