For example, assets outside the firewall traditionally have not been as protected as those inside the firewall, according to TriCipher VP John Brody. One way to approach this issue is to force users who want to avail themselves of apps in the cloud to come back through the enterprise network to pick up controls and policies and go out again.
As cloud computing has gained acceptance in different markets and in so many parts of the enterprise, experts have raised several different questions that those contemplating making use of the cloud need to address. They run the gamut, from "how do you prove compliance when you don't have access to the logs maintained by a service provider?" to "how do you deal with e-discovery" or "is anything stored in the cloud still considered private?
Culling from the dozens of blog posts and interviews IT Business Edge contributors have done on the subject, our Lora Bentley shares six different pointers that experts such as Proskauer Rose's Nolan Goldberg and Transworld Data CEO Mary Shacklett have given for cloud compliance. Though there are certainly more specific requirements for employing the cloud in certain industries that are highly regulated, these six tips are a good place to start.
Future IT leaders will need to seek technologies that eliminate silos in order to deliver the right information to the right person within the right application environment at the right time. ... More >>