Free registration required
Think of the cloud as a far-away town, with its customers occupying houses there. The town may have sensible laws and a diligent police force, but it's up to the home-owners to lock their doors, set up motion detectors and keep the kids from lending out their keys.
How can CIOs create a secure cloud environment? In a recent Ponemon Institute report, over 60% of surveyed US and European cloud service providers said they were unsure if their cloud applications were sufficiently secured. This IBM white paper outlines how the company uses a set of seven security essentials to better guard the cloud.
- Format: PDF
- Size: 855.83 KB