Gain a Competitive Edge with Encryption in the Cloud

 

 

 

 

 

 

38 Minutes Click Here to Play MP3 Audio (Download MP3 - Right Click, Save Target As) 

The cloud represents a major change in the business model for IT delivery.

Cloud benefits promise to be quite significant: for cloud customers, cost savings, and greater agility through on-demand capacity; for cloud providers, recurring revenues, global markets and attractive profits—if they can differentiate their services and innovate to keep ahead.

Many organizations have already moved mundane activities and low-risk data to the cloud.

Theoretically, of course, any process that runs elsewhere can run in the cloud.

Businesses and governments are certainly attracted to the idea that they could achieve even greater savings were they to use the cloud for storage and processing of their more sensitive data.

After all, sensitive business processes are likely to be the most expensive from an operational perspective and so this is where they have the most to gain.

The big question, though, is how secure is the cloud and when is it safe to move more sensitive operations there?

Outlook Series' Michael Lippis interviews Richard Moulds to gain Thales e-Security's perspective on cloud security.

Richard is a vice president of strategy with Thales e-Security.

Contact Thales e-Security at 954-888-6200 or click here.

Download this white paper to learn more about the Ponemon Institute study results of a new 2012 survey on cloud security that shows an increasing number of organizations transferring sensitive or confidential data to the cloud despite concerns over data protection. The Global Trends in Cloud Encryption study interviewed more than 4,000 organizations in seven countries and was conducted by the Ponemon Institute and commissioned by Thales.

Read the results of the 2012 study that examines perceptions and current practices surrounding the threats and protection issues relating to sensitive or confidential data in the cloud. We’ll reveal surprising attitudes about who is considered responsible for protecting this valuable and often regulated class of data – the cloud service provider or cloud service consumer. The findings are also significant in explaining how that data is protected and where data encryption is applied inside and outside the cloud. Most important is who manages the associated encryption keys and therefore who ultimately controls access to the data.

Enter your email address for your free Outlook Series Newsletter subscription.

Terms of Use | Copyright © 2002 - 2017 CONSTITUENTWORKS SM  CORPORATION. All rights reserved. | Privacy Statement