Book description
Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions.
Drawing upon years of practical experience and using numerous examples and case studies, author Ric Messier discusses:
- The evolving nature of information security
- The risks, rewards, and security considerations when implementing SaaS, cloud computing and VoIP
- Social media and security risks in the enterprise
- The risks and rewards of allowing remote connectivity and accessibility to the enterprise network
- Discusses the risks associated with technologies such as social media, voice over IP (VoIP) and cloud computing and provides guidance on how to manage that risk through policy changes and technical solutions
- Presents a detailed look at the risks and rewards associated with cloud computing and storage as well as software as a service (SaaS) and includes pertinent case studies
- Explores the risks associated with the use of social media to the enterprise network
- Covers the bring-your-own-device (BYOD) trend, including policy considerations and technical requirements
Table of contents
- Cover image
- Title page
- Copyright
- Dedication
- Preface
- Acknowledgements
- Chapter 1. The Evolving Nature of Information Security
- Chapter 2. Cloud Computing
- Chapter 3. Software as a Service
- Chapter 4. Storage in the Cloud
- Chapter 5. Virtual Servers and Platform as a Service
- Chapter 6. Social Media
- Chapter 7. Mobile Computing
- Chapter 8. Unified Communications
- Chapter 9. Remote Workers
- Chapter 10. Risk Management and Policy Considerations
- Chapter 11. Future Technology
- Chapter 12. Pulling It All Together
- Index
Product information
- Title: Collaboration with Cloud Computing
- Author(s):
- Release date: April 2014
- Publisher(s): Syngress
- ISBN: 9780124171237
You might also like
book
Data Protection and the Cloud: Are the risks too great?
Applying the Data Protection Act to the Cloud The UK’s Data Protection Act 1998 (DPA) applies …
book
Bring Your Own Devices (BYOD) Survival Guide
Where end-users once queued up to ask the IT department for permission to buy a new …
book
Validating Your Business Continuity Plan: Ensuring your BCP actually works
75% of companies without a business continuity plan fail within three years. Disruptive incidents can affect …
book
Advanced Persistent Training : Take Your Security Awareness Program to the Next Level
Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance …