The 10 Step Action Plan: Meeting Your Shared Security Responsibility with Microsoft Azure

Thumb original wp01 azure csp 150721us

Cloud adoption is increasing at a rapid rate, introducing unique and complex security considerations for users. Security is no longer solely under the control of an organization. It’s an inherent partnership between the organization and the cloud service provider. And organization may not have complete visibility into all aspects or their security. So they need to understand how adopting a cloud-computing model will affect their risk profile related to data security, privacy, and availability. And if they don’t get it right, organizations can compromise the benefits of going to the cloud. Choosing a strong cloud service provider is the first step.

With its Azure offering, Microsoft has built a solid foundation that addresses security with comprehensive administrative, physical, and logical controls— from strict policies for physical access to its data centers, to well thought-out configuration change management procedures. However, a secure foundation is just the start and to build an end-to-end secure computing environment, organizations must still take an active role in protecting systems, applications and data to fulfill their part of a shared security model.

This paper will discuss what part of the shared responsibility equation customers are responsible for and what some of the recommended security practices are that can help create a secure cloud-computing environment.

View whitepaper
Date: 14 September 2015, 9:36 am   |   Provider: Trend Micro (EMEA) Limited   |   Size: 3.97 MB   |   Language: English
This may interest you too:
Thumb original dealing with the growing problem of targeted email attacks

Dealing With the Problem of Targeted Email Attacks

Targeted email attacks are a serious issue for organizations of all sizes and across every industry. Trend Micro’s and other industry research have shown that these focused emails are by far the number one initial attack vector for targeted attacks on enterprise data. In fact, they account for more than 95% of initial intrusions that lead to important data breaches. Moreover, Osterman Research found in a survey conducted during September 2014 that 47% of organizations considered targeted email attacks to be a very high priority to address and p ...

To the download
Thumb original cs2001g0057 003 gl cs cm 3rd pclm innovation drives competitive differentiation

PCLM Innovation Drives Competitive Differentiation In 2020

Cloud-based PC management, PC-as-a-service (PCaaS), and digital workspaces are gaining traction as modern approaches to end user computing. Why? They enable organizations to support a great employee experience (EX), alleviate IT management pressure, and enhance the security posture of the enterprise. Above all though, cloud-based management stands out as the backbone of all of these innovations, enabling faster device refresh, better access to apps and data, and a more automated employee onboarding process.

Organizations are ready for cloud- ...

To the download
Thumb original en forrester the balanced security cs2001g0056 006 gl cs mb 3rd dell mid market tlp

The Balanced Security Imperative

Balanced security requires firms to transition from treating privacy and data security as compliance requirements to one that champions privacy and uses its technology prowess to differentiate the brand.

Investing in your security infrastructure and controls is a critical component of your security program. However, technology investments alone are insufficient. Determine the right level of balanced security for your organization, based on your specific needs and risk tolerance.

Download this Forrester Study to discover the security t ...

To the download
Thumb original es forrester the balanced security imperative

La importancia de la seguridad equilibrada

La seguridad equilibrada requiere que las empresas pasen de tratar la privacidad y la seguridad de los datos como requisitos de cumplimiento normativo a defender la privacidad y utilizar su pericia en tecnología para diferenciar la marca. Cualquier traspié relacionado con la tecnología informática o un cambio que se realice en su infraestructura puede agravar la complejidad y lo hará, por lo cual la creación de una estrategia de seguridad equilibrada es muy importante. Una estrategia de seguridad equilibrada no da lugar a la complejidad, ...

To the download
Thumb original nl forrester managing security risk and compliance

Beveiligingsrisico's en naleving van de regelgeving in een uitdagend landschap beheren - Hoe belangrijke technology partners meegroeien met uw organisatie

Leidinggevenden die vóór hun toetreding tot de raad van bestuur en de uitvoerende comités, werkzaam waren op het gebied van beveiliging, weten dat beveiliging statistieken die controletools weergeven of het aantal malware aanvallen tellen, van relatief weinig waarde zijn voor degenen die strategische en budgettaire beslissingen moeten nemen. Het beschermen van gevoelige data van het bedrijf, de medewerkers en hun klanten is niet alleen het naleven van de regelgeving. Het is bittere noodzaak voor het bedrijf. Beheer van de beveiliging van het ...

To the download