cloud computing

Sun
28
Feb

DRaaS challenges – Trust the vendor, but always verify !!!

DRaaS challenges – Trust the vendor, but always verify !!!

Continuation to what we have discussed in part 1, most of the enterprises are hesitant to trust a service provider primarily due to concerns on availability, performance security and compliance reasons. It is understandable that we need to consider these multiple factors because the solution we opt for plays an important role in assuring the continuation of our organization’s core business activities.

We will start with the availability part.

DRaaS provider in same town?

Sun
21
Feb

DRaaS - Invoke your disaster recovery with confidence

DRaaS - Invoke your disaster recovery with confidence

When we plan our Business Continuity Planning, there are various factors we need to look at. In my earlier article about BCP, I have mentioned about the importance of including cyber security threat in Business Continuity Plan. As we all know, normally we consider disruptive events such as hurricanes and floods. If we go for building our own datacenters, both primary and backup, then we might need to do a lot of research in finding locations that are prone from all the natural disasters and also we need to consider the adaptability of the backup site to recover following a disaster.

Going to cloud – escape from earth quake, floods

Mon
18
Jan

Secure your Cloud with a Security Guard - Select those guards carefully !!

Secure your Cloud with a Security Guard - Select those guards carefully !!

Do you have a cloud based SaaS application? If Yes, Is that SaaS application core to your business? If so, I have the following questions.

(1) How can you enforce your security policies with your cloud connections?  (2) How can you comply with the internal and external regulations such as HIPAA, SOX etc? (3) How would you trust the security controls the service provider offer?  (4) When a user access the application in cloud, how can you get the visibility of what he is doing? (5) How can you ensure that proper authentication and authorization is enforced? (6) How can you ensure that encryption is enforced for both data in transition and data at rest?

Mon
11
Jan

Security Risks and Threats Associated with Cloud Computing

Security Risks and Threats Associated with Cloud Computing

Cloud computing is where software applications, data storage and processing capacity are accessed over internet. Organizations use cloud computing in a variety of different service models like IaaS, PaaS and SaaS. These are the three building blocks of cloud computing:

Pages

Subscribe to RSS - cloud computing