Securing Data in the Cloud

When considering adopting cloud computing or software-as-a-service (SaaS), a question most potential customers ask vendors is “How secure will our data be in your hands?” Customers are right to ask this question and should closely examine any vendor’s security credentials as part of their cloud/SaaS evaluations. This document is intended to give a broad overview of one vendor’s security policies, processes, and practices.
  • Written By:
  • Published On:
  • (Originally Published On:) )
 
comments powered by Disqus


Featured publications:

Enabling Real-Time Sharing and Synchronization over the WAN

Driven by increasing business demands and the availability of technologies like in-memory databases, change data capture software, big data storage systems, and complex event processing engines, some organizations are looking to enterprise data grids to accelerate, optimize, and scale their IT infrastructure. Managing big data scale transactional and event stream information is about more than just storing massive amounts of data; it requires the intelligent collection, filtration, sharing and exposure of information via enterprise apps connected by LANs, WANs, and cloud/grid environments.
  • Written By:
  • Published On:

ExecBlueprints: Device-Reliant vs. Data-Reliant: How Mobile and Cloud Technologies Influence Workflow

Cloud computing offers an extremely cost-effective alternative to traditional hardware-based infrastructures, but the advantages in flexibility and price must be weighed against issues of security, reliability, and capability. Business unit leaders must partner with IT to determine their needs, understand the impact of new technologies, and chart a path forward together to facilitate stability and efficiency across the entire organization.  
  • Written By:
  • Published On:

Securing Top Talent: Finding and Retaining Highly Skilled Technology Professionals

Today, highly skilled technology professionals should not only be able to handle day-to-day technology needs, but also understand their company’s business to the extent that they can solve problems and bring new ideas to the table. You can nurture such talent by hiring for cultural fit, exposing people to the broader business and, above all, breaking down silos. Find out how.
  • Written By:
  • Published On:

You may also be interested in these related documents:

Riverbed Whitewater: Optimizing Data Protection to the Cloud

Riverbed Whitewater leverages WAN optimization technology to provide a complete data protection service to the cloud. The appliance-based solution is designed to integrate seamlessly with existing backup technologies and cloud storage provider APIs to provide rapid data retrieval, and replicate data to the cloud to provide an off-site storage location for disaster recovery. Read the ESG Lab report of the appliance's features.
  • Written By:
  • Published On:

Combining the Flexibility of Public-Cloud Apps with the Security of Private-Cloud Data

  • Source: Bitglass, Inc.
Cloud applications are a priority for every business—the technology is flexible, easy-to-use, and offers compelling economic benefits. The challenge is that cloud applications increase the potential for corporate data to leak, raising compliance and security concerns for IT. A primary security concern facing organizations moving to the cloud is how to secure and control access to data saved in cloud applications.
  • Written By:
  • Published On:

Securing Salesforce

  • Source: Bitglass, Inc.
Like any cloud service, Salesforce presents a unique data security challenge. While the Salesforce security team is focused on preventing service-impacting events, like denial of service (DOS), there are security threats of equal importance that Salesforce takes no responsibility for stopping. This white paper examines how to overcome data security challenges for Salesforce users, focusing on technology solutions that make security more effective.
  • Written By:
  • Published On: