Page 8 - CDM-Cyber-Warnings-March-2014
P. 8
Moving to the Cloud Ultimately, the benefits of moving to the cloud can outweigh the concerns over security. When looking to secure critical workloads, keep in mind these simple questions:  What levels of encryption granularity are supported? For example, block storage, file storage, data volume, boot volume, file, folder, or full application lockdown  Does the solution span private, hybrid and multi-tenant clouds?  How is the solution deployed? Does my company need to modify its workloads or is it transparent?  How is key management supported? Can customers control the keys? Whether your cloud strategy involves simply backing up enterprise data to a service provider or is as elaborate as building a multi-tenant hybrid cloud that includes a mix of private data center and multiple public clouds to support a group of internal departments, data encryption designed specifically for virtualized environments offers a simple and effective approach to securing sensitive data. Commentary provided by: Mike Byrnes, AFORE Director of Marketing Mike Byrnes serves as AFORE Director of Marketing with 20 years’ experience in technology product marketing with a focus on internet security and business communication systems. Prior to AFORE, Mike led product marketing for Entrust multi-factor authentication and fraud detection product lines and held previous roles with Nortel Networks and Mitel Networks. " # % " $ " # ! !
   3   4   5   6   7   8   9   10   11   12   13