Evaluating Cloud Computing Providers News
January 16, 2015
Cloud collaboration firm Ribose became the first company to achieve the Cloud Security Alliance's STAR Attestation process.
January 09, 2015
Cloud Security Alliance findings show many enterprises struggle to identify and control shadow cloud apps and services; half of those surveyed told the CSA they have no program in place manage cloud apps and services.
December 04, 2014
Microsoft is working to improve Azure security, but analysts say Amazon Web Services is still in the lead when it comes to cloud security capabilities.
November 19, 2014
Newly announced Amazon Web Services security features include an encryption key management service intended to boost cloud security and strengthen appeal of AWS to enterprises.
Evaluating Cloud Computing Providers Get Started
Bring yourself up to speed with our introductory content
A proper evaluation of a cloud access security broker is critical to finding the best match for your enterprise's needs. Expert Dan Sullivan outlines key criteria to keep in mind during CASB assessment. Continue Reading
Cloud access security brokers (CASBs) are tools or services that enforce an organization's security policies in a public cloud environment. Continue Reading
Expert Dan Sullivan explains the three main factors of a cloud readiness assessment and how it can help enterprises prepare for a cloud migration. Continue Reading
Evaluate Evaluating Cloud Computing Providers Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
SaaS vendors bear more of a compliance burden for cloud security. Enterprise responsibilities for services hosted in IaaS are little changed, however. Continue Reading
Before utilizing cloud database services, there are several security considerations to keep in mind and prepare for. Expert Dan Sullivan explains. Continue Reading
Careful consideration must go into choosing the right AWS database for your enterprise. Expert Dan Sullivan discusses the options and security considerations to keep in mind during evaluation. Continue Reading
Product ReviewsPowered by IT Central Station
Makes many promises but in order to do so, Qualys requires the client to provide a backdoor to the system.Powered by IT Central Station
The QualysGuard Private Cloud Platform (QG PCP) makes many promises, one of which is that vulnerability scan data can be hosted by a private...Continue Reading
Powered by IT Central Station
Confidence is key when it comes to managing large IT systems. The tricky part is when a CIO tries to generate the trust and confidence of a...Continue Reading
Manage Evaluating Cloud Computing Providers
Learn to apply best practices and optimize your operations.
Moving HealthCare.gov onto AWS helped the government improve the safety of the site. Expert Dan Sullivan explains which AWS security features were most beneficial. Continue Reading
Database as a service may be easy to deploy and easy to manage, but it is not without its security challenges. Expert Ed Moyle outlines three major steps enterprises should take to secure cloud database services in the enterprise. Continue Reading
While cloud data archiving services can be highly beneficial, careful consideration must be taken to find the service that best suits an enterprise's needs. Expert Ed Moyle outlines three steps to find your ideal cloud data archiving service. Continue Reading
Problem Solve Evaluating Cloud Computing Providers Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The VENOM cloud vulnerability was called the next Heartbleed, but how bad is it? Expert Rob Shapland explains the affect it should have on your enterprise. Continue Reading
The Cloud Security Alliance published its Privacy Level Agreement for Europe v2 to help consumers compare cloud providers. Expert Dan Sullivan explains how it can help U.S. companies as well. Continue Reading
Securing approved cloud applications is hard enough, but what about the apps it can't see? Expert Ed Moyle discusses three strategies for finding enterprise shadow cloud usage. Continue Reading