The 10 Step Action Plan: Meeting Your Shared Security Responsibility with Microsoft Azure

Thumb original wp01 azure csp 150721us

Cloud adoption is increasing at a rapid rate, introducing unique and complex security considerations for users. Security is no longer solely under the control of an organization. It’s an inherent partnership between the organization and the cloud service provider. And organization may not have complete visibility into all aspects or their security. So they need to understand how adopting a cloud-computing model will affect their risk profile related to data security, privacy, and availability. And if they don’t get it right, organizations can compromise the benefits of going to the cloud. Choosing a strong cloud service provider is the first step.

With its Azure offering, Microsoft has built a solid foundation that addresses security with comprehensive administrative, physical, and logical controls— from strict policies for physical access to its data centers, to well thought-out configuration change management procedures. However, a secure foundation is just the start and to build an end-to-end secure computing environment, organizations must still take an active role in protecting systems, applications and data to fulfill their part of a shared security model.

This paper will discuss what part of the shared responsibility equation customers are responsible for and what some of the recommended security practices are that can help create a secure cloud-computing environment.

View whitepaper
Date: 14 September 2015, 9:36 am   |   Provider: Trend Micro (EMEA) Limited   |   Size: 3.97 MB   |   Language: English
This may interest you too:
Thumb original dealing with the growing problem of targeted email attacks

Dealing With the Problem of Targeted Email Attacks

Targeted email attacks are a serious issue for organizations of all sizes and across every industry. Trend Micro’s and other industry research have shown that these focused emails are by far the number one initial attack vector for targeted attacks on enterprise data. In fact, they account for more than 95% of initial intrusions that lead to important data breaches. Moreover, Osterman Research found in a survey conducted during September 2014 that 47% of organizations considered targeted email attacks to be a very high priority to address and p ...

To the download
Thumb original produkt1 okta gettingstartedwithzerotrust final

Getting Started with Zero Trust

Zero Trust security throws away the idea that we should have a “trusted” internal network and an “untrusted” external network. The adoption of mobile and cloud means that we can no longer have a network perimeter-centric view of security; instead, we need to securely enable access for the various users (employees, partners, contractors, etc.) regardless of their location, device or network. There is no silver bullet when it comes to achieving a Zero Trust security architecture, but identity and access management is the core technology that orga ...

To the download
Thumb original en vmware forbes exec summary v6

SPECIAL REPORT: Enterprises Across Europe, the Middle East and Africa Slowly Embrace Cybersecurity Challenges

This report, which is based on a Forbes Insights survey of 451 enterprises across Europe, and another 200 within the Middle East and Africa, explores the state of cybersecurity in these regions and how the perceptions of business leaders and security practitioners vary on these issues. We focus primarily on the European findings but have noted where there are noticeable differences among the regions. We also provide recommendations on how companies in Europe and in the Middle East and Africa can better protect their businesses.
...

To the download
Thumb original forrester tei ibm svs app mig and mod to hybrid multicloud environment

Forrester TEI Of IBM Services For Application Migration And Modernization To A Hybrid Multicloud Environment

IBM Services commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential ROI enterprises may realize by using IBM Services for migrating and modernizing their applications to a multicloud environment. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of leveraging IBM Services for application migration and modernization services for their organization. ...

To the download
Bildschirmfoto 2019 12 19 um 15.48.03

Three keys to maximize application migration

Proven to deliver speed and simplicity, open source cloud technologies, like containers, Kubernetes, APIs and microservices, are being adopted rapidly. Mission-critical apps need to move to open and secure hybrid clouds, requiring solutions that run anywhere, without vendor lock-in. Enterprises need simplified management and access to innovations for faster digital transformation. IDC reports how IBM’s application migration and modernization services can help. ...

To the download