Securing Data in the Cloud

  • Source: Symantec
  • Written By:
  • Published:
  • (Originally Published On:) )
When considering adopting cloud computing or software-as-a-service (SaaS), a question most potential customers ask vendors is “How secure will our data be in your hands?” Customers are right to ask this question and should closely examine any vendor’s security credentials as part of their cloud/SaaS evaluations. This document is intended to give a broad overview of one vendor’s security policies, processes, and practices.

Featured Software Research:

Cloud Communications Services: Five Questions You Need to Address for Success

Many businesses have been successfully using cloud-based applications for years, but following this path for communications is much more recent. For some businesses cloud communications just means VoIP telephony, while others include applications such as video, text, chat, messaging, email, conferencing, etc. This guide addresses five key questions to help you determine how the cloud aligns with your business communications needs—including reasons to use the cloud, who the cloud is best for, whom... Read More

The Power of Cloud ERP on the Food Processing Plant Floor

For food processing companies, a comprehensive enterprise resource planning (ERP) solution offers a clear view of what is happening on the plant floor so they can track complete genealogies. Real-time data and flexible barcode functions enable efficiencies and productivity improvements. Download this white paper to learn more about the value of using a cloud/software-as-a-service (SaaS) ERP system on the food processing plant floor. Read More

You may also be interested in these related documents:

Riverbed Whitewater: Optimizing Data Protection to the Cloud

Riverbed Whitewater leverages WAN optimization technology to provide a complete data protection service to the cloud. The appliance-based solution is designed to integrate seamlessly with existing backup technologies and cloud storage provider APIs to provide rapid data retrieval, and replicate data to the cloud to provide an off-site storage location for disaster recovery. Read the ESG Lab report of the appliance's features. Read More

Securing Your Mobile Workforce

This three-part report describes how all businesses can benefit from software-as-a-service (SaaS) services and, in particular, a variety of hosted services. It also provides advice, best practices, and insight on how to create security and management policies for a distributed workforce. Read More

Securing Your Online Data Transfer with SSL: A Guide to Understanding SSL Certificates, How They Operate, and Their Application

Secure socket layer (SSL) secures data transmissions across the Internet, and is an integral part of most Web browsers and Web servers. To make an SSL connection, SSL protocol requires that a server have a digital certificate installed—which is typically signed by an independent and trusted third party to ensure its validity. Find out more about SSL and how to know if you need to deploy an SSL certificate. Read More
 
comments powered by Disqus