Evaluating Cloud Computing Providers News
January 16, 2015
Cloud collaboration firm Ribose became the first company to achieve the Cloud Security Alliance's STAR Attestation process.
January 09, 2015
Cloud Security Alliance findings show many enterprises struggle to identify and control shadow cloud apps and services; half of those surveyed told the CSA they have no program in place manage cloud apps and services.
December 04, 2014
Microsoft is working to improve Azure security, but analysts say Amazon Web Services is still in the lead when it comes to cloud security capabilities.
November 19, 2014
Newly announced Amazon Web Services security features include an encryption key management service intended to boost cloud security and strengthen appeal of AWS to enterprises.
Evaluating Cloud Computing Providers Get Started
Bring yourself up to speed with our introductory content
Outlining your enterprise regulatory compliance reporting needs and establishing these needs with cloud providers during SLA negotiations is critical. Ed Moyle outlines steps to help organizations get started. Continue Reading
Cloud computing is a general term for anything that involves delivering hosted services over the Internet. These services are broadly divided into three categories: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and ... Continue Reading
Securing approved cloud applications is hard enough, but what about the apps it can't see? Expert Ed Moyle discusses three strategies for finding enterprise shadow cloud usage. Continue Reading
Evaluate Evaluating Cloud Computing Providers Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Google Cloud Platform has its own Web application security scanner, but are in-house scanners better than third-party scanners? Expert Dave Shackleford examines. Continue Reading
Vast private cloud infrastructure can be detrimental to an organization. Expert Ed Moyle looks at how and when to consider cloud consolidation to reduce cloud creep. Continue Reading
Organizations can opt to allow Amazon Elastic Transcoder to generate AES-128 encryption keys or do the job in-house -- which is more secure? Expert Dan Sullivan explains. Continue Reading
Product ReviewsPowered by IT Central Station
Makes many promises but in order to do so, Qualys requires the client to provide a backdoor to the system.Powered by IT Central Station
The QualysGuard Private Cloud Platform (QG PCP) makes many promises, one of which is that vulnerability scan data can be hosted by a private...Continue Reading
Powered by IT Central Station
Confidence is key when it comes to managing large IT systems. The tricky part is when a CIO tries to generate the trust and confidence of a...Continue Reading
Manage Evaluating Cloud Computing Providers
Learn to apply best practices and optimize your operations.
This Security School covers the latest in cloud security providers and in-house IaaS, outlining how enterprises can get the most out of both options. Continue Reading
This IaaS management quiz will test what you have learned from the tip, videos and podcast in this Cloud Security School. Continue Reading
While using the cloud for identity and access management can simplify the task, it is critical to consider a number of factors when implementing cloud IAM products and services. Expert Dave Shackleford explains. Continue Reading
Problem Solve Evaluating Cloud Computing Providers Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The Cloud Security Alliance published its Privacy Level Agreement for Europe v2 to help consumers compare cloud providers. Expert Dan Sullivan explains how it can help U.S. companies as well. Continue Reading
Calculating and monitoring cloud resiliency is critical to preventing cloud downtime or lessening its effects. Expert Ed Moyle discusses the two main steps to start reducing cloud concerns. Continue Reading
Expert Dave Shackleford explains how new cloud firewall management and automation tools can be harnessed to better monitor systems and enact rules. Continue Reading