Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Adapting Security Management Best Practices for Public / Hybrid Clouds
Adapting Security Management Best Practices for Public / Hybrid Clouds
Adapting Security Management Best Practices for Public / Hybrid Clouds
Adapting Security Management Best Practices for Public / Hybrid Clouds
Adapting Security Management Best Practices for Public / Hybrid Clouds
Adapting Security Management Best Practices for Public / Hybrid Clouds
Adapting Security Management Best Practices for Public / Hybrid Clouds
Adapting Security Management Best Practices for Public / Hybrid Clouds
Adapting Security Management Best Practices for Public / Hybrid Clouds
Adapting Security Management Best Practices for Public / Hybrid Clouds
Adapting Security Management Best Practices for Public / Hybrid Clouds
Adapting Security Management Best Practices for Public / Hybrid Clouds
Adapting Security Management Best Practices for Public / Hybrid Clouds
Adapting Security Management Best Practices for Public / Hybrid Clouds
Adapting Security Management Best Practices for Public / Hybrid Clouds
Upcoming SlideShare
Loading in …5
×

Adapting Security Management Best Practices for Public / Hybrid Clouds

775 views

Published on

UP 2010 Cloud Computing Conference Session on "Adapting Security Management Best Practices for Public / Hybrid Clouds."

Successful cloud adoption will depend on organizations assessing data center and cloud management controls that will ensure a more reliable and secure delivery of private/hybrid cloud services. Beyond virtualization and powering network elements to support the delivery of on-demand provisioned IT services, managing security and compliance risks will be paramount.

Tap into leading industry sources for guidance on this timely topic by joining this expert panel, led by cloud security expert and author Tim Mather, as they discuss the issues, legalities, controls and technologies to address security and protect the cloud-extended data center.

Published in: Technology
  • Be the first to comment

×