Intel Guidance on Vendor Selection
Choosing a cloud security provider is complicated on many levels. The cloud delivery model you choose dictates what type of solution vendor or cloud services provider you will engage. Even with that decision made, the vendor landscape is characterized by countless interdependencies and relationships, both technological and business related, among vendors. And some companies offer not only software, but also hardware and services. Whether you are implementing a private cloud on- or off-premises or a hybrid model that includes access to public cloud services, security must be a strong component of your solution. You need to evaluate how security is built into your cloud solution and what security measures are provided to protect data, platform, and access to the cloud. General considerations related to security include: • What is the cloud architecture? • Does the solution enable you to meet industry or regulatory compliance requirements? • Does the solution deploy hardware-based security to support trusted server pools? • How are systems, data, networks, management, and provisioning segmented? • What type of attack monitoring and reporting is available? • What is the company’s long-term strategy for the product you are evaluating? • Is the vendor financially stable? In addition, considerations for hosted or managed cloud solutions should also include: • What are the provider’s data center risk management and security practices? • What auditing capabilities are provided? • How does the provider predict and manage system availability and performance? • How quickly does the provider respond to attacks, and what recovery methods are used? • Are the limits of responsibility for security by the provider clearly defined? Cloud Security Planning Guide For more detailed information about choosing the right cloud services provider, and for additional information on planning security in the cloud, see Intel’s Cloud Security Planning Guide. In 2009, Intel IT began moving the Intel enterprise to a private cloud and exploring the use of external cloud services for certain applications. The Cloud Security Planning Guide is the result of our experiences during our ongoing cloud journey, as well as working with cloud providers, virtualization and security solution vendors, OEMs, and large enterprise customers. 5 Intel IT Center Vendor Round Table | Cloud Security
Cloud Security Vendor Round Table - Page 0001.html
Cloud Security Vendor Round Table - Page 0002.html
Cloud Security Vendor Round Table - Page 0003.html
Cloud Security Vendor Round Table - Page 0004.html
Cloud Security Vendor Round Table - Page 0005.html
Cloud Security Vendor Round Table - Page 0006.html
Cloud Security Vendor Round Table - Page 0007.html
Cloud Security Vendor Round Table - Page 0008.html
Cloud Security Vendor Round Table - Page 0009.html
Cloud Security Vendor Round Table - Page 0010.html
Cloud Security Vendor Round Table - Page 0011.html
Cloud Security Vendor Round Table - Page 0012.html
Cloud Security Vendor Round Table - Page 0013.html
Cloud Security Vendor Round Table - Page 0014.html
Cloud Security Vendor Round Table - Page 0015.html
Cloud Security Vendor Round Table - Page 0016.html
Cloud Security Vendor Round Table - Page 0017.html
Cloud Security Vendor Round Table - Page 0018.html
Cloud Security Vendor Round Table - Page 0019.html
Cloud Security Vendor Round Table - Page 0020.html
Cloud Security Vendor Round Table - Page 0021.html
Cloud Security Vendor Round Table - Page 0022.html
Cloud Security Vendor Round Table - Page 0023.html
Cloud Security Vendor Round Table - Page 0024.html
Cloud Security Vendor Round Table - Page 0025.html
Cloud Security Vendor Round Table - Page 0026.html
Cloud Security Vendor Round Table - Page 0027.html
Cloud Security Vendor Round Table - Page 0028.html
Cloud Security Vendor Round Table - Page 0029.html
Cloud Security Vendor Round Table - Page 0030.html
Cloud Security Vendor Round Table - Page 0031.html
Cloud Security Vendor Round Table - Page 0032.html
Cloud Security Vendor Round Table - Page 0033.html
Cloud Security Vendor Round Table - Page 0034.html
Cloud Security Vendor Round Table - Page 0035.html
Cloud Security Vendor Round Table - Page 0036.html
Cloud Security Vendor Round Table - Page 0037.html
Cloud Security Vendor Round Table - Page 0038.html
Cloud Security Vendor Round Table - Page 0039.html
Cloud Security Vendor Round Table - Page 0040.html
Cloud Security Vendor Round Table - Page 0041.html
Cloud Security Vendor Round Table - Page 0042.html
Cloud Security Vendor Round Table - Page 0043.html
Cloud Security Vendor Round Table - Page 0044.html

A javascript error just appeared or you do not have installed a Flash Player plugin in your browser.

Prestimedia, your interactive publications solution provider, invites you to download the latest Adobe Flash plugin by clicking here

This e.print interactive catalogue is made by Prestimedia