Deploying and Managing Security in the Cloud - An Osterman Research Whitepaper


The growing proportion of sensitive corporate data housed in cloud services and other repositories has created a need for a new way of thinking about security.

Traditional, perimeter-focused security models sufficed in years past, when the majority of data lived on-premises. This simply doesn’t work in a cloud-centric reality, and decision makers must address new and innovative ways of protecting critical data that now resides off-premises, in mobile devices and in the cloud.

In Deploying and Managing Security in the Cloud, we examine:

  • How to best implement security in the cloud era
  • Whether to manage on-premise, in the cloud, or using a combination of both
  • Advantages and disadvantages of each approach
  • The approach that delivers the lowest Total Cost of Ownership (TCO) while providing the maximum level of security