Realizing the benefits of cloud-specific security technologies

Companies are increasingly trusting their most valuable information assets to the cloud. The lure of paying for only the computing that is used combined with rapid deployment and unlimited scalability is hard to resist. The risks of using cloud-based systems are often overcomplicated and misunderstood. Cloud computing assets still need protection using the same types of security technologies that have been in use for some time to protect internal computing assets. However, the different levels of risk dictate specific mitigation strategies for the internal and cloud computing models. The cloud offers a variety of security technologies to meet the developing needs of these mitigation strategies.


This webcast will address all this, and seek to answer key questions such as:

• How are the cloud-specific risks addressed by these new technologies?

• Will these new cloud-specific technologies offer the same level of assurance currently enjoyed by internally hosted computing assets?

• To what end can existing technologies be used in new ways to secure cloud systems and data?

View All Videos

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.



  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...