NOV 5, 2012 9:06am ET

Related Links

IBM Watson Takes Computing Capabilities to Next Level
August 29, 2014
Data Governance in Insurance Carriers
August 28, 2014
Frost & Sullivan: RFID Systems ‘Indispensable’ to Manufacturing
August 28, 2014
strategy

Keeping a Cloud Secure

Print
Reprints
Email

November 5, 2012 – Security is often described as being like an onion - it's got to be provided in layers, such that even if a miscreant manages to get past one or two barriers, there are still several more that could repel him (or her). When a company consumes compute resources over a cloud, there are even more layers required, as the bank's IT and security departments are a few steps removed from the data and applications they're charged with protecting.

Get access to this article and thousands more...

All Information Management articles are archived after 7 days. REGISTER NOW for unlimited access to all recently archived articles, as well as thousands of searchable stories. Registered Members also gain access to:

  • Full access to information-management.com including all searchable archived content
  • Exclusive E-Newsletters delivering the latest headlines to your inbox
  • Access to White Papers, Web Seminars, and Blog Discussions
  • Discounts to upcoming conferences & events
  • Uninterrupted access to all sponsored content, and MORE!

Already Registered?

Twitter
Facebook
LinkedIn
Login  |  My Account  |  White Papers  |  Web Seminars  |  Events |  Newsletters |  eBooks
FOLLOW US
Please note you must now log in with your email address and password.