Three Steps to Secure Cloud Computing - Page 2

Jun 13, 2008

Robert McGarvey

But, said Gunn, the solution is simple: enterprises should only permit data to migrate to the cloud where two-factor, strong authentication is in use and, right there, hackers probably are kept at bay. Take just that step, suggests Gunn, and considerable big company opposition to cloud computing would instantly evaporate. Most mainstream cloud providers are hanging back on this but, suggests Gunn, when enough users cry out for safeguards the cloud companies will respond.

Here Today …

A last, big worry, particularly in today’s unstable economy, is how durable is the cloud provider, said Raimund Genes, CTO at Trend Micro, the global security company. “You need a provider that will be in business three years from now. When you give up your IT infrastructure, you need a reliable service provider.” When a cloud provider goes bankrupt how accessible is your info, by whom? Better not to deal with such questions at all by instead going with cloud providers that have the wherewithal for a long-haul contest.

Parting advice for CIOs who are still wringing their hands in worry over data in the cloud comes from Elastra’s Sheynkman who reminds us: “It’s not all or nothing. It does not have to be. Put only the data you are comfortable with on the cloud. That is what most companies seem to be doing. We are still in an era of experimentation.”

Take it in little steps but start taking some steps, that’s the smart way to embrace the cloud.



Page 2 of 2


0 Comments (click to add your comment)
Comment and Contribute

Your comment has been submitted and is pending approval.



 (click to add your comment)

Comment and Contribute

Your name/nickname

Your email


(Maximum characters: 1200). You have characters left.