Evaluating multifactor authentication options in the cloud

Public Cloud Computing Security

Email Alerts

Register now to receive SearchCloudSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • BYOE (bring your own encryption)

    BYOE (bring your own encryption) is a cloud computing security model that allows cloud service customers to use their own encryption software and manage their own encryption keys.  

  • encryption as a service (EaaS)

    Encryption as a Service (EaaS) is a subscription model that allows cloud service customers to take advantage of the security that encryption offers without having to install and use encryption on their own.  

  • homomorphic encryption

    Homomorphic encryption is the conversion of data into ciphertext that can be analyzed and worked with as if it were still in its original form.  Homomorphic encryptions allow complex mathematical operations to be performed on encrypted data without c... 

  • multi-tenancy

    Multi-tenancy is an architecture in which a single instance of a software application serves multiple customers. 

  • cloud computing

    A cloud service has three distinct characteristics that differentiate it from traditional hosting. It is sold on demand, typically by the minute or the hour; it is elastic -- a user can have as much or as little of a service as they want at any given... 

About Public Cloud Computing Security

Companies are justifiably concerned about the security of their data in a multi-tenant public cloud computing environment, but public clouds can enable cost savings and flexibility. Learn about the challenges involved in securing public cloud environments and ways to overcome public cloud security obstacles.