A big company is working on a new project that requires
cloud computing. If they utilize their private network they can reasonably
assume their data to be secure, given that all protocols with remote access are
followed or the private network does not allow remote access.
you can just encrypt everything, and use it as a storage-as-a-service. In other cases, more and more vendors are letting customers deep dive into facilities and to see exactly how the data is being secured. It’s never absolute, but then again, security never is. Just have to determine the acceptable risk and work from there. The Microsoft, Amazon, RackSpace’s of the world likely won’t give you this “inner” peak, but often smaller vendors will.
-Michael
Federated Identity Management, Proper Encryption techniques with Key Management for Data, Network Security measures, Virtualization Security and Physical Security are main areas while considering Cloud Computing.
you can just encrypt everything, and use it as a storage-as-a-service. In other cases, more and more vendors are letting customers deep dive into facilities and to see exactly how the data is being secured. It’s never absolute, but then again, security never is. Just have to determine the acceptable risk and work from there. The Microsoft, Amazon, RackSpace’s of the world likely won’t give you this “inner” peak, but often smaller vendors will.
-Michael
Federated Identity Management, Proper Encryption techniques with Key Management for Data, Network Security measures, Virtualization Security and Physical Security are main areas while considering Cloud Computing.
Very nice blog, you given useful information, Very great article, Thank you for sharing this wonderful article.
ReplyDeleteamazon web services chennai