Ten Critical Questions to Ask Your Cloud Provider - Slide 9

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next Ten Critical Questions to Ask Your Cloud Provider-9 Next

In the past, IT departments segregated the files and data of various constituencies by putting them on separate physical servers. There were multiple problems with this approach, including “server sprawl,” underutilized resources, administrative complexity, excessive cost, and downtime or even data loss due to single points of failure.

Virtualization technology makes it possible to encapsulate multiple types of data, applications, and content within the same physical server and to distribute copies of those assets quickly and easily among multiple servers. The content itself is electronically isolated or “partitioned” from all other content on the servers. The result is a more secure and more flexible access model that lowers operating costs and simplifies desktop administration and management.

So, when evaluating prospective vendors, be sure to get a detailed description of their use of virtualization and, if you’re not conversant in the technology yourself, consider having it appraised by an expert.

There is no question that businesses can benefit from moving data to the cloud. The cloud is elastic and efficient. It can improve user productivity and unburden IT staff, saving time and money. It can accommodate anything from simple file sharing to mission-critical data backup. The question is, just how secure is your cloud? And how do you know?

There are major differences among cloud providers in their approach to security and their use of security technologies, processes, and personnel. These differences can have a major impact on the availability, integrity, accessibility, privacy, and compliance of your data — and can directly impact your business.

This slideshow provides a list of questions, developed by Syncplicity, that you should ask any prospective cloud provider, whether that is your internal IT department or a third-party cloud service provider.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.