This resource is no longer available

Cover Image

The cloud computing effect is becoming reality. Organizations are starting to shift at least some IT processes from a basic "hardware, assets, and license" approach, to an "outsourced, no license, no asset" spending model. These shifts bring real financial benefits and renewed IT flexibility. However, cloud computing, even as it shakes up the old IT model, is not entirely new traditional security questions still apply. As a first step, assessing the risk in security and compliance is imperative. "Old" security topics such as control and manageability, tracking records of actions, trust and incident management, liability and support, and misuse and data leakage are all critical. Until now, no new risks or weaknesses adjacent to cloud computing have been named, documented, and countered. This Technology Spotlight examines security questions and answers in the cloud computing environment. 

Vendor:
Trend Micro
Posted:
Feb 8, 2021
Published:
May 11, 2011
Format:
PDF
Type:
White Paper

This resource is no longer available.