Cloud computing security related issues

Asked By 0 points N/A Posted on -
qa-featured

How can a company minimize the cost incurred by tendering cloud computing services to a third party while still maintaining data security for the information stored?

SHARE
Best Answer by Apollyon
Best Answer
Best Answer
Answered By 0 points N/A #85331

Cloud computing security related issues

qa-featured

I am not actually a Cloud expert but I've been studying the Cloud Storage case. As a matter of fact, Cloud Storage is supposed to contribute to cost savings in a significant way BUT not all companies or all types of data are exposed in the same way to this business case.

The logical inflection points that tend to drive the most savings are:

  • Collocation contract renewal
  • On-demand access to resources
  • Hardware refresh
  • Software refreshes
  • Virtualization project
  • Limited use applications
  • Considering Collocation
  • Facilities Move
  • Server Consolidation
  • Citrix Upgrade
  • Disaster Recovery

If a private cloud solution is the desired direction for security reasons, there is a little known but compelling alternative for those CIOs seeking a cost effective and high security solution. There are a very few cloud providers who have the experience and the depth of knowledge to secure multi-tenant infrastructures where the cost of the underlying physical infrastructure is spread across more than one client delivering a fractional ownership model that is very financially appealing…

Bottom line, you don’t have to give up the financial benefits of fractional ownership to have a cost saving SECURE Hosted Private Cloud solution.

Answered By 0 points N/A #85332

Cloud computing security related issues

qa-featured

Dear Wagacira,

Cloud computing security risk can be minimized by taking some preventive or control measures. This is listed below:

1. Deterrent Controls should be used to minimize Cloud computing security risk.

2. Preventative Controls should be used to minimize Cloud computing security risk.

3. Corrective Controls should be used to minimize Cloud computing security risk.

4. Detective Controls should be used to minimize Cloud computing security risk.

5. Data separation should be done.

6. User access control should be controlled.

7. Secure stored data should be ensured.

8. Transfer only Secure data.

Corrective Controls should be used to minimize Cloud computing security risk

If you maintain the above you will able to minimize Cloud computing security risk.

Thanks and Regards,

Louis

Related Questions