Your SlideShare is downloading. ×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Are you afraid of flying into the Cloud?

276

Published on

Cloud Computing offers several advantages of cost and ease. Moving to the cloud however, requires upfront analysis of security, privacy and compliance risks of information breaches. These risks can …

Cloud Computing offers several advantages of cost and ease. Moving to the cloud however, requires upfront analysis of security, privacy and compliance risks of information breaches. These risks can take the wind out of any cloud initiative. Legal contracts and simple encryption appear to be the only options for mitigating these risks but are inadequate at best.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
276
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Are you afraid of flying into the Cloud? Are you afraid of flying into the Cloud?
  • 2. within the information itself and is independent of the cloud platform or access device. The information can be remotelymonitored,controlledandcanevenberemotelydestroyedifrelationshipschange. Seclore (www.seclore.com) is leader in area of Information Rights Management with over 3 Million users worldwide. Seclore has received numerous accolades like being named the Gartner Cool Vendor for 2012 and Deloitte's Technology Fast 50for2012.Seclore'ssolutionisusedbygovernmentagencies,banksandFortune500companiesglobally. SecloreFileSecureprotectsunstructureddatalikeemails&documentswhileitisstoredandsharedon thecloud.Thesecurityisenabledbyembeddingthe"usagepolicy"ofinformationi.e. WHEREcanheuseitfrom Information can be linked to locations e.g. only 3rd floor office by private/publicIPaddresses WHATcaneachpersondo Individual actions like reading, editing, printing, distributing, copy- pasting,screengrabbingetc.canbecontrolled People & groups within and outside of the organization can be defined asrightfulusersoftheinformation WHOcanusetheinformation WHENcanheuseit Information usage can be time based e.g. can only be used by Mr. A till 25thSeptoronlyforthe2days Cloud Computing offers several advantages of cost and ease. Moving to the cloud however, requires upfront analysis of security, privacy and compliance risks of information breaches. These risks can take the wind out of any cloud initiative. Legal contracts and simple encryption appear to be the only options for mitigatingtheserisksbutareinadequateatbest.

×