Inside the Briefcase

Ironclad SaaS Security for Cloud-Forward Enterprises

Ironclad SaaS Security for Cloud-Forward Enterprises

The 2015 Anthem data breach was the result of...

The Key Benefits of Using Social Media for Business

The Key Benefits of Using Social Media for Business

Worldwide, there are more than 2.6 billion social media...

Gartner IT Sourcing, Procurement, Vendor and Asset Management Summit 2018, September 5 – 7, in Orlando, FL

Gartner IT Sourcing, Procurement, Vendor and Asset Management Summit 2018, September 5 – 7, in Orlando, FL

Register with code GARTITB and save $350 off the...

Infographic: The Three Pillars of Digital Identity: Trust, Consent, Knowledge

Infographic: The Three Pillars of Digital Identity: Trust, Consent, Knowledge

8,434 adults were surveyed to gauge consumer awareness of...

FICO Scales with Oracle Cloud

FICO Scales with Oracle Cloud

Doug Clare, Vice President at FICO, describes how Oracle...

It’s Possible to Be in Cloud and Be Secure

March 2, 2011 No Comments

SOURCE: Anitian Enterprise Security

Anitian Enterprise Security, the oldest information consultancy firm in the nation, announces a new service offering: the Cloud Computing Security Assessment.

Cloud computing and application outsourcing is currently one of the most discussed topics among IT leaders and engineers. Cloud computing offers many business and operational efficiencies that deliver measurable value to any organization. Cloud computing, however, is also fraught with security and operational risks.

“Anitian’s Cloud Computing Security Assessment is the ideal way to evaluate Cloud solutions and obtain an unbiased and honest evaluation of all solutions being considered,” offers Anitian President Andrew Plato. “There’s a lot of hype out there about the Cloud and what it can or can’t do. There’s a lot of misinformation, too.”

Anitian’s Cloud Computing Assessment analyzes the ten primary areas at risk in a Cloud Computing environment:

  1. User access, provisioning, control, and management
  2. Regulatory compliance issues
  3. Data security and integrity
  4. Data, account, and network segregation
  5. Security operations, management, and monitoring
  6. Data forensics and investigation assistance
  7. Data recovery and retention
  8. Communication protocol security
  9. Service level agreements

10.  Business stability and long-term viability

The Assessment service includes an evaluation of the technologies in use, extensive research and interviews with the provider, and an unbiased, scientifically sound risk assessment.

Read More

CLOUD COMPUTING

Leave a Reply

(required)

(required)


ADVERTISEMENT

Gartner