Evaluating Cloud Computing Providers News
January 16, 2015
Cloud collaboration firm Ribose became the first company to achieve the Cloud Security Alliance's STAR Attestation process.
January 09, 2015
Cloud Security Alliance findings show many enterprises struggle to identify and control shadow cloud apps and services; half of those surveyed told the CSA they have no program in place manage cloud apps and services.
December 04, 2014
Microsoft is working to improve Azure security, but analysts say Amazon Web Services is still in the lead when it comes to cloud security capabilities.
November 19, 2014
Newly announced Amazon Web Services security features include an encryption key management service intended to boost cloud security and strengthen appeal of AWS to enterprises.
Evaluating Cloud Computing Providers Get Started
Bring yourself up to speed with our introductory content
Expert Dan Sullivan explains the three main factors of a cloud readiness assessment and how it can help enterprises prepare for a cloud migration. Continue Reading
BYOE (bring your own encryption) is a cloud computing security model that allows cloud service customers to use their own encryption software and manage their own encryption keys. Continue Reading
Outlining your enterprise regulatory compliance reporting needs and establishing these needs with cloud providers during SLA negotiations is critical. Ed Moyle outlines steps to help organizations get started. Continue Reading
Evaluate Evaluating Cloud Computing Providers Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Learn what the ISO/IEC 27018 standard is, what it means to PII privacy, and how it should affect cloud provider and product selection. Continue Reading
Google Cloud Platform has its own Web application security scanner, but are in-house scanners better than third-party scanners? Expert Dave Shackleford examines. Continue Reading
Vast private cloud infrastructure can be detrimental to an organization. Expert Ed Moyle looks at how and when to consider cloud consolidation to reduce cloud creep. Continue Reading
Product ReviewsPowered by IT Central Station
Makes many promises but in order to do so, Qualys requires the client to provide a backdoor to the system.Powered by IT Central Station
The QualysGuard Private Cloud Platform (QG PCP) makes many promises, one of which is that vulnerability scan data can be hosted by a private...Continue Reading
Powered by IT Central Station
Confidence is key when it comes to managing large IT systems. The tricky part is when a CIO tries to generate the trust and confidence of a...Continue Reading
Manage Evaluating Cloud Computing Providers
Learn to apply best practices and optimize your operations.
This Security School covers the latest in cloud security providers and in-house IaaS, outlining how enterprises can get the most out of both options. Continue Reading
This IaaS management quiz will test what you have learned from the tip, videos and podcast in this Cloud Security School. Continue Reading
While using the cloud for identity and access management can simplify the task, it is critical to consider a number of factors when implementing cloud IAM products and services. Expert Dave Shackleford explains. Continue Reading
Problem Solve Evaluating Cloud Computing Providers Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The VENOM cloud vulnerability was called the next Heartbleed, but how bad is it? Expert Rob Shapland explains the affect it should have on your enterprise. Continue Reading
The Cloud Security Alliance published its Privacy Level Agreement for Europe v2 to help consumers compare cloud providers. Expert Dan Sullivan explains how it can help U.S. companies as well. Continue Reading
Securing approved cloud applications is hard enough, but what about the apps it can't see? Expert Ed Moyle discusses three strategies for finding enterprise shadow cloud usage. Continue Reading