Privacy & Security contains 1 article.

Consider the Dimensions of Cloud Deployment to Achieve Secure Collaboration
Posted by Doug Walters on 8th April 2014
Problem
In an attempt to simplify the picture to aid business-leaders' understanding, consultants often present a two-dimensional picture of cloud topologies (Private -> Public; IaaS -> SaaS.) It's my opinion that by doing so, they do their clients a disservice - failing to grasp that there are FOUR dimensions to the cloud-scape only causes confused conversations and leads to inappropriate decisions.

There are several “cloud formations” - or forms of cloud computing. Each offers different characteristics, varying degrees of flexibility, different collaborative opportunities, and different risks. Thus a key challenge when considering cloud computing as an option is to determine how to choose the cloud formation best suited to our various types of business operations.

The objective is to enable secure collaboration in the appropriate cloud formations best suited to the business needs.

The aim of this paper is to:

• Explain that not everything is best implemented in clouds; it may be best to operate some business functions using a traditional non-cloud approach
• Explain the different cloud formations
• Describe key characteristics, benefits and risks of each cloud formation
• Provide a framework for exploring in more detail the nature of different cloud formations and the issues that need answering to make them safe and secure places to work in.

Read the full article...

Sign up for extra content

Register here to access premium content - the only information we require is your user name and a valid email address

Follow me

Latest private posts

Latest public posts

—1st July 2014
—18th April 2014
—9th April 2014