herosample6

Sample 9: HP Enterprise

[vc_row full_height=”yes” video_bg=”yes” video_bg_url=”https://www.youtube.com/watch?v=P5_GlAOCHyE” css=”.vc_custom_1448434081855{margin-bottom: 0px !important;background-color: #319e60 !important;}”][vc_column width=”1/2″][vc_empty_space height=”300px”][vc_custom_heading text=”HOW SHOULD CIOS VIEW CLOUD SECURITY?” font_container=”tag:h1|text_align:left|color:%23ffffff” use_theme_fonts=”yes” css=”.vc_custom_1448438960971{margin-top: 0px !important;}”][vc_column_text css_animation=”right-to-left” css=”.vc_custom_1448434784655{padding-bottom: 35px !important;}”]How should CIOs approach cloud security?  Perhaps, from above the stratosphere…

 

A presentation by HP Enterprise[/vc_column_text][/vc_column][vc_column width=”1/2″][/vc_column][/vc_row][vc_row][vc_column][vc_separator][/vc_column][/vc_row][vc_row][vc_column][vc_cta h2=”DOWNLOAD WHITE PAPER” h4=”EITN digital marketing resources provide you with the industry’s best white papers and best practices all in one location.” txt_align=”center” style=”flat” color=”turquoise” css_animation=”appear”]

[/vc_cta][vc_custom_heading text=”HP Enterprise Whitepaper”][/vc_column][/vc_row][vc_row][vc_column width=”2/3″][vc_column_text css_animation=”left-to-right”]Companies using cloud need to understand that they are consuming a shared resource and must, therefore, select the service that provides the levels of security and service that they need. As with most security challenges, technical solutions are only part of the puzzle.

What is needed is a well-rounded approach.

• Establish a risk-based approach • Design or convert applications to securely run in the cloud

• Implement ongoing auditing and management • Assess infrastructure and platform security during service sourcing A risk-based approach is necessary to fully understand the risk impact of moving chosen applications and data to a particular cloud deployment and service model.

This assessment must be undertaken from a viewpoint of how it affects the enterprise. And it must be an holistic approach, not just from the security department viewpoint. An article on security in CoputerWorld makes this clear.

“A risk-based approach is based not on how we perceive security risks, but on how the whole business perceives its security risks”, it says. The primary objective of a risk-based approach.[/vc_column_text][/vc_column][vc_column width=”1/3″][ultimate_heading main_heading=”Paul Muller on innovation”][/ultimate_heading][vc_video link=”https://www.youtube.com/watch?v=yw6sqtGl50M “][/vc_column][/vc_row]




Leave a Reply

Please Login to comment
  Subscribe  
Notify of