IDC Technology Spotlight: Leveraging the Benefits of Cloud Computing with Specialized Security

Cover Image

The cloud computing effect is becoming reality. Organizations are starting to shift at least some IT processes from a basic "hardware, assets, and license" approach, to an "outsourced, no license, no asset" spending model. These shifts bring real financial benefits and renewed IT flexibility. However, cloud computing, even as it shakes up the old IT model, is not entirely new traditional security questions still apply. As a first step, assessing the risk in security and compliance is imperative. "Old" security topics such as control and manageability, tracking records of actions, trust and incident management, liability and support, and misuse and data leakage are all critical. Until now, no new risks or weaknesses adjacent to cloud computing have been named, documented, and countered. This Technology Spotlight examines security questions and answers in the cloud computing environment. 

Trend Micro
Feb 8, 2021
May 11, 2011
White Paper
Already a Bitpipe member? Log in here

Download this White Paper!