Five Best Practices for Securing Private Clouds

Share  
1 | 2 | 3 | 4 | 5 | 6
Previous Next

Click through for five best practices IT professionals can use to help secure their private cloud installations, as identified by Logicalis.

The first reason most IT professionals say they are interested in a private cloud solution rather than a public cloud solution is security. Ironically, diligent security is often the last item on the checklist for many organizations when building a private cloud solution. To help IT professionals secure their private cloud installations, Logicalis, an international IT solutions and managed services provider, has created a best practices approach to cloud security.

“Unless an organization is in a regulated industry that is required to provide proof of security – such as PCI, HIPAA, FISMA or ITAR – the level of security in many data centers today could be characterized as ‘not so much,’” laments Von Williams, director of information security for Logicalis.

“A security initiative needs to be a detailed, disciplined process, but it doesn’t have to be overwhelming,” says Williams. “But you do have to have a security policy to apply in the first place.” A best practices approach to upgrading or creating a security policy that is appropriate for most organizations focuses on five basic security components. These five steps form the path for a solid security policy: risk assessment, data ownership, data classification, auditing and monitoring, and incident response.

Williams suggests IT pros ask the following questions while developing their private cloud security policy to help defend their organizations from hackers as well as inadvertent access to confidential data.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Security60-190x128.jpg Five Steps to Integrate SAP into Your Enterprise Defense Framework

In addition to being an enterprise resource planning (ERP) tool, SAP is also a primary storage vault for a vast amount of sensitive and business-critical data. ...  More >>

Risk8-290x195 Survey Reveals Message Supervision Plays a Growing Role in Risk Prevention

Overall, the study found that compliance is taking on a more significant role across organizations – moving beyond traditional archiving and e-discovery efforts, to add value to sales and marketing, HR, risk assessment and cybersecurity. ...  More >>

Gov2-290x195.jpg Study Showcases Biggest Cyber Threat - Feds Trying to Do Their Jobs

Cybersecurity threats are growing. To defend against increasing threats, agencies must comply with various cybersecurity mandates that often fail to take the user experience into account. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date