Key Security Considerations for Enterprise Cloud Deployments

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next Key Security Considerations for Enterprise Cloud Deployments-4 Next

Review Security Posture of IT Landscape

A thorough vulnerability assessment of cloud-deployed assets should be undertaken periodically to understand, assess and address potential vulnerabilities. IT assets are prone to new attacks and have to be constantly monitored for threats. Application penetration testing along with periodic vulnerability analysis is recommended. It is also recommended that tools monitoring vulnerabilities, such as those from SQL injections, be protected with technology solutions such as Web application firewalls (WAF) until the vulnerabilities are fixed.

Enterprise cloud computing has matured, moving beyond the "what" and the "how" to the "when." Even so, security remains a major concern for organizations considering a move to the cloud. Fortunately, security services and tactics have also matured over the past few years, allowing more and more enterprises to migrate to the cloud.

A review of the enterprise security architecture is an absolute necessity in defining, monitoring and managing enterprise cloud deployments. This includes understanding the current security posture of IT assets, audit and compliance. It also forms the basis of creating security and compliance requirements for mainstream cloud adoption. In this slideshow, Madhavan Krishnan, of IT consulting firm Virtusa Corporation, has identified key security considerations that should be considered when transitioning to the cloud.

 

Related Topics : IBM Looks to Redefine Industry Standard Servers, APC, Brocade, Citrix Systems, Data Center

 
More Slideshows

DataM63-290x195 Data Storage Today: Key Takeaways from VMworld 2016

Survey findings include pain points for secondary storage, average restore times, the growth of hyperconvergence and rate of cloud adoption in enterprises.  ...  More >>

cloud51-190x128 5 Best Practices for Managing Zombie Cloud Infrastructure

IT administrators need to identify zombie assets, verify idle status and shut off anything that is unused. Here's how to get your dormant infrastructure back in shape. ...  More >>

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.