Download Now Free registration required
Enterprises increasingly recognize cloud computing compelling economic and operational benefits. Vitalizing and pooling IT resources in the cloud enables organizations to realize significant cost savings and accelerates deployment of new applications. However, those valuable business benefits cannot be unlocked without addressing new data security challenges posed by cloud computing. Deploying confidential information and critical IT resources in the cloud raises concerns about vulnerability to attack, especially because of the anonymous, multi-tenant nature of cloud computing. Applications and storage volumes often reside next to potentially hostile virtual environments, leaving information at risk to theft, unauthorized exposure or malicious manipulation. Moreover, it is possible for remnant data to persist when consumers vacate cloud volumes but vendors do not recycle storage devices securely.
- Format: PDF
- Size: 294.6 KB