Ten Critical Questions to Ask Your Cloud Provider - Slide 5

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next Ten Critical Questions to Ask Your Cloud Provider-5 Next

Users expect and require that data remain available and uncorrupted absolutely without fail. For years, data center managers have pursued “five-nines” availability (meaning 99.999%) as the Holy Grail for service-level availability. When it comes to data durability, however, there had better be a lot more than five nines (look for 10 or 11). Think of it this way: The standard RAID mirroring (data stored on two hard drives), provides about “four nines” of durability, meaning you have a one in 10,000 chance of data loss. Given that the average user has 10,000 files in storage, this means they will lose a single file every year. At 11 nines, this same user will lose a single file every 10 million years.

With this in mind, expect your cloud vendor to store all files at least in triplicate at each of several geographically dispersed data centers, and expect those copies to be synchronized automatically and instantaneously. These measures ensure that even if a data center goes down, for any reason, or connectivity to a data center is lost, operation will still continue normally.

There is no question that businesses can benefit from moving data to the cloud. The cloud is elastic and efficient. It can improve user productivity and unburden IT staff, saving time and money. It can accommodate anything from simple file sharing to mission-critical data backup. The question is, just how secure is your cloud? And how do you know?

There are major differences among cloud providers in their approach to security and their use of security technologies, processes, and personnel. These differences can have a major impact on the availability, integrity, accessibility, privacy, and compliance of your data — and can directly impact your business.

This slideshow provides a list of questions, developed by Syncplicity, that you should ask any prospective cloud provider, whether that is your internal IT department or a third-party cloud service provider.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.