Securing Data in the Cloud

  • Source: Symantec
  • Written By:
  • Published:
  • (Originally Published On:) )
When considering adopting cloud computing or software-as-a-service (SaaS), a question most potential customers ask vendors is “How secure will our data be in your hands?” Customers are right to ask this question and should closely examine any vendor’s security credentials as part of their cloud/SaaS evaluations. This document is intended to give a broad overview of one vendor’s security policies, processes, and practices.

Featured Software Research:

The Complete Guide to Google Apps Security: Building a Comprehensive Google Apps Security Plan

Innovative cloud technologies require new ways of approaching security when it comes to data; traditional systems may be outdated and no longer suffice. Google Apps for Work does provide security within their system, but every company should check for potential protection gaps that may remain. When used in conjunction with other apps, Google Apps for Work gives your business the best protection and fully secures your company’s data. Ensuring your business has the top security measures in place allows... Read More

Converging Branch IT Infrastructure the Right Way

Many organizations continue to struggle with outdated IT architectures in branch offices. There is a fundamentally better and less costly way to architect your branch IT. Whether driven by a server refresh project, or by the need to solve a more acute problem posed by your branch IT, adopting a branch converged infrastructure solution as your next branch architecture can drive significant dollar savings while securing data and improving recovery.  Read More

Securing Edge Data at the Center

  • Source: IDC
  • Written By:
  • Published:
Even as enterprises focus relentlessly on consolidation of data centers, they continue to aggressively expand the roles and numbers of branch offices, often located in remote locations that are difficult to support and protect. That poses the issue of how to protect data on the edge of the network, which may be subject to a variety of risks. Data centers are built to secure systems and data, and to help ensure business continuity and recovery after interruptions and disasters. Remote offices, on... Read More

You may also be interested in these related documents:

Riverbed Whitewater: Optimizing Data Protection to the Cloud

Riverbed Whitewater leverages WAN optimization technology to provide a complete data protection service to the cloud. The appliance-based solution is designed to integrate seamlessly with existing backup technologies and cloud storage provider APIs to provide rapid data retrieval, and replicate data to the cloud to provide an off-site storage location for disaster recovery. Read the ESG Lab report of the appliance's features. Read More

Combining the Flexibility of Public-Cloud Apps with the Security of Private-Cloud Data

  • Source: Bitglass, Inc.
  • Written By:
  • Published:
Cloud applications are a priority for every business—the technology is flexible, easy-to-use, and offers compelling economic benefits. The challenge is that cloud applications increase the potential for corporate data to leak, raising compliance and security concerns for IT. A primary security concern facing organizations moving to the cloud is how to secure and control access to data saved in cloud applications. Read More

Securing Salesforce

  • Source: Bitglass, Inc.
  • Written By:
  • Published:
Like any cloud service, Salesforce presents a unique data security challenge. While the Salesforce security team is focused on preventing service-impacting events, like denial of service (DOS), there are security threats of equal importance that Salesforce takes no responsibility for stopping. This white paper examines how to overcome data security challenges for Salesforce users, focusing on technology solutions that make security more effective. Read More
 
comments powered by Disqus