Blog categories

My blog posts and tweets are my own, and do not necessarily represent the views of my current employer, my previous employers or any other party.

Many of these blogs were originally posted elsewhere on public sites, but have been re-posted here with attributions to the original location -- strictly as a means of a centralized archive of my perspectives.

I do not do paid endorsements, so if I am appear to be a fan of something, it is based on my personal experience with it. If I am not talking about your stuff, it is either because I haven't worked with it enough or because my mom taught me "if you can't say something nice ... "

HOW to Ensure Security when Using Clouds Within your Data Protection Strategy – Part 3 in Series (Video)

Each Wednesday in June, I’ll be exploring an aspect of this through a series of videos and blogs – based on ESG’s Data Protection Cloud Strategies research report

Part 1 – WHY use clouds as part of your data protection strategyJune 7 

Part 2 – WHICH clouds to use within your data protection strategyJune 14 

Part 3 – HOW to ensure security when using clouds within your data protection strategy … June 21

Part 4 – WHAT products or services might you consider when using clouds within your data protection strategy … June 28

So far, this series has discussed WHY the cloud should almost assuredly be part of your data protection strategy and WHICH types of cloud-based services should be part of your strategy, based on what you are trying to solve for. 

BUT, as soon as anyone in your organization suggests a cloud service should be added to your IT strategy, someone else will almost immediately bring up security concerns. You should be concerned; you are putting your data in an outside repository.  And yet, history (and the media) have shown us that many organizations can’t secure their internally stewarded IT infrastructure, so HOW should you look at security for cloud services as part of your data protection strategy? Part 3 of our series addresses that:

 

Please check back next Wednesday for part 4 in this series, where I’ll suggest a few technologies and mechanisms to consider.

As always, thanks for watching.

 

Leave a Reply

@JBuff on Twitter