Cloud Investigate

Evaluating Cloud Risk for the Enterprise: A Shared Assessments Guide

Download now Free registration required

Executive Summary

The growing adoption of cloud computing has created a pressing need for further analysis and investigation of the controls in distributed environments. Rather than fitting into contained silos protecting the so-called "Four walls" of the building, today's controls need to focus on all of the locations where data resides. One location may be within encrypted storage arrays in data centers, where the data is protected by biometrics, IPS, armed guards and hardened systems, at five o'clock that data may also sit on company laptops in homes, in airports and on the front seat of the car - all locations where perimeter controls are of little or no use.

  • Format: PDF
  • Size: 573.48 KB