Key Security Considerations for Enterprise Cloud Deployments

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Previous Key Security Considerations for Enterprise Cloud Deployments-1 Next

Cloud Security Checklist

Click through for seven security issues organizations should consider when deploying assets to the cloud, as identified by Madhavan Krishnan, Virtusa Corporation.

Enterprise cloud computing has matured, moving beyond the "what" and the "how" to the "when." Even so, security remains a major concern for organizations considering a move to the cloud. Fortunately, security services and tactics have also matured over the past few years, allowing more and more enterprises to migrate to the cloud.

A review of the enterprise security architecture is an absolute necessity in defining, monitoring and managing enterprise cloud deployments. This includes understanding the current security posture of IT assets, audit and compliance. It also forms the basis of creating security and compliance requirements for mainstream cloud adoption. In this slideshow, Madhavan Krishnan, of IT consulting firm Virtusa Corporation, has identified key security considerations that should be considered when transitioning to the cloud.


Related Topics : IBM Looks to Redefine Industry Standard Servers, APC, Brocade, Citrix Systems, Data Center

More Slideshows

Holiday20-190x128 5 Ways to Protect Your Data Center from a 'Zombie' Server Attack

It's easy to forget about the ghosts of servers past that are hiding in the background, continuing to consume electricity and potentially exposing organizations to malicious attacks. ...  More >>

cloud50-190x128.jpg How to Use the Cloud to Become a High-Velocity Business

Cloud SaaS adoption allows organizations to gain the flexibility and scalability necessary for creating a high-velocity business. ...  More >>

DynCloudInternetVisibility0x 8 Reasons the Enterprise Needs More Visibility into the Cloud

IT executives need the right tools to monitor and control their cloud infrastructure to maximize the positive impacts and mitigate security threats. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.