Deploying and Managing Security in the Cloud - An Osterman Research Whitepaper
The growing proportion of sensitive corporate data housed in cloud services and other repositories has created a need for a new way of thinking about security.
Traditional, perimeter-focused security models sufficed in years past, when the majority of data lived on-premises. This simply doesn’t work in a cloud-centric reality, and decision makers must address new and innovative ways of protecting critical data that now resides off-premises, in mobile devices and in the cloud.
In Deploying and Managing Security in the Cloud, we examine:
- How to best implement security in the cloud era
- Whether to manage on-premise, in the cloud, or using a combination of both
- Advantages and disadvantages of each approach
- The approach that delivers the lowest Total Cost of Ownership (TCO) while providing the maximum level of security