Home
 > Research and Reports > White Papers > Securing Data in the Cloud

Securing Data in the Cloud

Source: Symantec
When considering adopting cloud computing or software-as-a-service (SaaS), a question most potential customers ask vendors is “How secure will our data be in your hands?” Customers are right to ask this question and should closely examine any vendor’s security credentials as part of their cloud/SaaS evaluations. This document is intended to give a broad overview of one vendor’s security policies, processes, and practices.


Featured publications:

Employee Central: The New Face of Human Capital Management (HCM)
Source: SuccessFactors Learn about a single platform, deployed in the cloud, that gives small to medium-size businesses greater visibility into their workforce by providing a single employee global system of record. With data supported by employee and manager self-service, human resources (HR) can pull real-time reports with accurate workforce data to make informed talent decisions. Download this business brief. Read More...
Best Practices: Six Questions to Ask Before Moving Core HR into the Cloud
Source: SuccessFactors Mergers and acquisitions, decentralization, and globalization are putting enormous pressure on HR to standardize systems and processes. The lack of a single global system of record for core HR data prevents companies from operating effectively and efficiently. As companies race to expand into new markets quickly, HR leaders must understand the opportunities and challenges that exist with core HR today. The cloud allows for global reach and scale, but you must ask the right questions to determine the cloud solution that is right for you. Read More...
ExecBlueprints: Device-Reliant vs. Data-Reliant: How Mobile and Cloud Technologies Influence Workflow
Source: Skillsoft Cloud computing offers an extremely cost-effective alternative to traditional hardware-based infrastructures, but the advantages in flexibility and price must be weighed against issues of security, reliability, and capability. Business unit leaders must partner with IT to determine their needs, understand the impact of new technologies, and chart a path forward together to facilitate stability and efficiency across the entire organization.   Read More...


You may also be interested in these related documents:

Backing up Data in the Private Cloud: Meeting the Challenges of Remote Data Protection - Requirements and Best Practices
Source: NovaStor This white paper describes some of the common challenges associated with protecting data on laptops and at home and remote offices and portrays proven solutions to the challenges of protecting distributed business data by establishing a private cloud/enterprise cloud. Learn which best practices can ensure business continuity throughout an organization with a distributed information technology (IT) infrastructure. Read More...
A New Frontier in Securing Sensitive Information
Source: Solix Technologies, Inc Every day, sensitive business information finds its way into the wrong hands—through external breaches or internal theft. Such data is highly regulated, and any risks of exposure can result in stiff penalties and legal liabilities. Many of these security risks lie in the test/dev environments, and as such require a solution that protects data application clones from unauthorized access without jeopardizing its integrity. Read More...
Securing Mobile Apps in a BYOD World
Source: SAP The next wave of exploiting the power of mobile devices involves the apps that run on them. Increasingly, enterprise IT organizations will be under pressure to build or purchase mobile apps that meet the requirements of enterprise employees and business units. Firms will need security that can span multiple devices and heterogeneous IT systems and provides protection for the devices and their data. For most organizations, a scarcity of resources for mobile app development and the lack of mobile security expertise can prevent an adequate IT response to this challenge. Read this white paper to learn more about mobile security solutions and how to meet today's mobile app demands and challenges. Read More...

 
comments powered by Disqus



Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others

©2014 Technology Evaluation Centers Inc. All rights reserved.