There are all sorts of fears and concerns swirling around the very idea of cloud computing, and many sound like this: “What about security? Where’s the data? Who’s protecting it?”
The fact is, all these questions were valid--when cloud computing was first introduced and not well understood. Survey after survey showed that companies were concerned about data location, access control, regulatory compliance, encryption, auditing rights, service-level agreements, reliability and disaster recovery.
All those concerns made some organizations hesitate before embracing the cloud. People were simply afraid--especially in highly regulated industries.
The fact is, though, that public cloud services from major providers use leading-edge security technologies to protect the data on their systems, and they offer competitive service-level agreements to guarantee their consistent performance. With a little due diligence, companies can find a service package that meets their IT needs and conforms to their security requirements.
For example, major cloud-computing providers have redundant set-ups in disparate locations for high availability, plus tight physical security for their data center locations. From video surveillance to intrusion-detection systems, and multifactor authentication required to gain access to equipment areas, these service providers make sure that unauthorized personnel aren’t welcome. Read More
The fact is, all these questions were valid--when cloud computing was first introduced and not well understood. Survey after survey showed that companies were concerned about data location, access control, regulatory compliance, encryption, auditing rights, service-level agreements, reliability and disaster recovery.
All those concerns made some organizations hesitate before embracing the cloud. People were simply afraid--especially in highly regulated industries.
The fact is, though, that public cloud services from major providers use leading-edge security technologies to protect the data on their systems, and they offer competitive service-level agreements to guarantee their consistent performance. With a little due diligence, companies can find a service package that meets their IT needs and conforms to their security requirements.
For example, major cloud-computing providers have redundant set-ups in disparate locations for high availability, plus tight physical security for their data center locations. From video surveillance to intrusion-detection systems, and multifactor authentication required to gain access to equipment areas, these service providers make sure that unauthorized personnel aren’t welcome. Read More