Realizing the Benefits of Cloud-Specific Security Technologies
sponsored by HP Enterprise Security
Companies are increasingly trusting their most valuable information assets to the cloud. The lure of paying for only the computing that is used combined with rapid deployment and unlimited scalability is hard to resist. The risks of using cloud-based systems are often overcomplicated and misunderstood. Cloud computing assets still need protection using the same types of security technologies that have been in use for some time to protect internal computing assets. However, the different levels of risk dictate specific mitigation strategies for the internal and cloud computing models. The cloud offers a variety of security technologies to meet the developing needs of these mitigation strategies.
This videocast will address all this, and seek to answer key questions such as:
- How are the cloud-specific risks addressed by these new technologies?
- Will these new cloud-specific technologies offer the same level of assurance currently enjoyed by internally hosted computing assets?
- To what end can existing technologies be used in new ways to secure cloud systems and data?
(THIS RESOURCE IS NO LONGER AVAILABLE.)