You would want to implement a Cloud Token. Try to make the Token Provider the same as your Cloud Provider if applicable. With a Token the Administrator will have direct control over what computers and users can log into the cloud. Tokenization is ideal since it is based on a look up instead of a formula like encryption. I do not name a specific product since as I said you should use one that works with your hoster or provider. A great artical is <a href="https://www.issa.org/Library/Journals/2010/December/Mattsson-Next%20Generation%20Tokenization.pdf">Tokenization
Last Wiki Answer Submitted: February 16, 2011 6:03 pm by RamseyB2,045 pts.