Intel Vision for Cloud Security
One key element of the Intel vision for cloud security is to build in balanced controls instead of designing an environment based primarily on preventive controls. For example, the architecture is designed to dynamically adjust a user’s access privilege as the level of risk changes, taking into account factors such as location and type of device. This new approach is both proactive to minimize occurrences and reactive to minimize damage if a breach occurs. Intel IT uses a hybrid approach that leads with a private cloud as the core strategy. In part based on security concerns, we selectively use a public cloud for nondifferentiated IT services such as staffing, benefits, expense, stock, and travel. We host the vast majority of our applications in our private cloud, such as enterprise, user profile management, productivity, and collaboration applications. We expect that more of our applications could burst to public clouds over time as security and vendor service level agreements (SLAs) improve and overall costs, including transition costs, become more favorable. 9 Intel IT Center Planning Guide | Cloud Security
Cloud Computing Security Planning Guide - Page 0001.html
Cloud Computing Security Planning Guide - Page 0002.html
Cloud Computing Security Planning Guide - Page 0003.html
Cloud Computing Security Planning Guide - Page 0004.html
Cloud Computing Security Planning Guide - Page 0005.html
Cloud Computing Security Planning Guide - Page 0006.html
Cloud Computing Security Planning Guide - Page 0007.html
Cloud Computing Security Planning Guide - Page 0008.html
Cloud Computing Security Planning Guide - Page 0009.html
Cloud Computing Security Planning Guide - Page 0010.html
Cloud Computing Security Planning Guide - Page 0011.html
Cloud Computing Security Planning Guide - Page 0012.html
Cloud Computing Security Planning Guide - Page 0013.html
Cloud Computing Security Planning Guide - Page 0014.html
Cloud Computing Security Planning Guide - Page 0015.html
Cloud Computing Security Planning Guide - Page 0016.html
Cloud Computing Security Planning Guide - Page 0017.html
Cloud Computing Security Planning Guide - Page 0018.html
Cloud Computing Security Planning Guide - Page 0019.html
Cloud Computing Security Planning Guide - Page 0020.html
Cloud Computing Security Planning Guide - Page 0021.html

A javascript error just appeared or you do not have installed a Flash Player plugin in your browser.

Prestimedia, your interactive publications solution provider, invites you to download the latest Adobe Flash plugin by clicking here

This e.print interactive catalogue is made by Prestimedia