TITLE

Lost in the Clouds

AUTHOR(S)
Zalud, Bill
PUB. DATE
May 2011
SOURCE
Security: Solutions for Enterprise Security Leaders;May2011, Vol. 48 Issue 5, p58
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on the use of cloud computing technology for security services that was featured in the International Security Conference (ISC) West in Las Vegas, Nevada in April 2011. It says that cloud computing is a computation, software and data access and storage service that does not require the knowledge of end user on the location and configuration of the system. It discusses the impact of cloud computing on disaster recovery, which was explored in the study by Neverfail Inc.
ACCESSION #
60798308

 

Related Articles

  • BUILDING A SECURE ENTERPRISE MODEL FOR CLOUD COMPUTING ENVIRONMENT. Srinivasan, Meena // Academy of Information & Management Sciences Journal;2012, Vol. 15 Issue 1, p127 

    Security is a major concern for enterprises and a good information security framework is essential for the continued success of enterprises that use cloud computing services with vendors. The ISO/IEC 27002 security standard is based on a management systems approach and is the choice of many...

  • Understanding the two types of security virtualization. Freeze, Jim // Database & Network Journal;Jun2010, Vol. 40 Issue 3, p16 

    A conference paper on security virtualization which helps companies to dynamically manage the capacity of security infrastructure and apply the right combinations of security in the event of attack in traffic is presented. It discusses the types of security virtualization which combines software...

  • Markt wächst und polarisiert.  // Die Bank;jun2013, Issue 6, p58 

    The article discusses cloud computing in Germany, particularly in businesses.

  • POINT CLOUD SERVER (PCS) : POINT CLOUDS IN-BASE MANAGEMENT AND PROCESSING. Cura, Rémi; Perret, Julien; Paparoditis, Nicolas // ISPRS Annals of Photogrammetry, Remote Sensing & Spatial Informa;8/19/2015, Vol. 2 Issue 3-W5, p531 

    In addition to the traditional Geographic Information System (GIS) data such as images and vectors, point cloud data has become more available. It is appreciated for its precision and true three-Dimensional (3D) nature. However, managing the point cloud can be difficult due to scaling problems...

  • It's 2010: Be Careful with your Convergence. Jensen, Joel // Security: Solutions for Enterprise Security Leaders;Mar2010, Vol. 47 Issue 3, p56 

    The article presents the author's views regarding his preferences on security solutions. He stresses that companies should be cautious in choosing the kind of security management system to use in order to address the problem of non-compatibility. He also stresses that he is much inclined with...

  • Development of Maturity Model Evaluation Support Tool for EA(Enterprise Architecture) System. Kab-Seung Kou; Yong-Min Kim // Journal of Security Engineering;Oct2011, Vol. 8 Issue 5, p525 

    Information along with information about the development of increased investment, but in the systematic organization, promotion, the lack of comprehensive information and information systems with the introduction of the center unit features redundant investment and is a waste of resources...

  • INFORMATION SYSTEMS IN HR MANAGEMENT WITHIN INTERIOR AUTHORITIES AND THEIR IMPACT ON BUSINESS SECURITY. Blyok, Nataliya V.; Zhyvko, Mykhailo O.; Zhyvko, Oleksandra M. // Actual Problems of Economics / Aktual'ni Problemi Ekonomìki;2013, Vol. 149 Issue 11, p172 

    The paper examines the concept of "information" and the role of information systems within HR management of interior authorities along with their impact on business security provision. The functions of information systems and the process of working with information at police departments are...

  • Forming a culture of security. VICTOR, ADAM // New Hampshire Business Review;9/4/2015, Vol. 37 Issue 19, p24 

    The article offers tips for small businesses on how to create and maintain security culture which include establishing a policy, documenting internal information security policy, and adopting a security approach.

  • The Cause Is Also the Cure. Malcolm Harkins // People & Strategy;Winter2016, Vol. 39 Issue 1, p7 

    The author discusses the information security issues within the organization caused by the people. He emphasizes the results of the statistics concerning people's actions towards the implementation of information security in the organization. He also mentions several ways on how to manage...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics