Christian Verstraete, HP Chief Technologist for Cloud Technologies interviews Nir Yitzak, Chief Information Security Officer for HP Software as a Service regarding the state of security on SaaS, what to ask a SaaS vendor regarding security, and how HP SaaS addresses security issues for its customers.
Virtualization is often confused with being a necessary step towards cloud adoption. While there are similarities in the adoption of virtualization on x86 technology-there is a fundamental difference between how cloud is maturing and how it is being adopted across enterprises, large and small.
Privacy. This is more than ensuring the confidentiality of corporate information (a big enough concern in its own right). This is about the legal and business risk ramifications of entrusting Privately Identifiable Information (PII) to a third-party supplier.
This is like putting your money in a bank, rather than buying and protecting your own vault. It is about trust.
Many, if not most, enterprises have strict privacy policies, with procedures in place to ensure that PII is dealt with securely.
Cloud Security is one of the biggest concern when it comes to cloud adoption. In this article we discuss the fundamentals of cloud security and how we can successfuly address the security needs in a comprehensive fashion.
Is your castle wall thick enough to protect your inhabitants? When it comes to Cloud, a thick “castle” wall is not enough. Much ado is made about security in cloud computing. Advocates highlight that enterprise class providers deliver the services that many organisations need. Either they don’t have the resources or investment to provide them or they simply don’t provide these services.
Our desire to feel secure and in control is preventing many from freely embracing SaaS and Cloud. But with HP SaaS and HP Labs, you can sleep better.
In my last entry I talked about the lack of trust many CIO express for public cloud. The origin, lack of transparency. Understanding the need for discression regarding the technologies, processes and procedures used to ensure security of a public cloud, I take the thinking a little further. Could we learn from the hotel business? You're intrigued why I use that title, keep reading, you'll understand.
And if you happen to be at HP Discover, and you enjoy my contributions, don't hesitate to contact me. I'll be there.