Everyone has their own reasons for not wanting to experiment in the cloud, but more and more the enterprise is trusting mission critical applications to the cloud. What are your major security concerns for 2011 regarding the cloud, if any? How have those concerns changed or evolved since 2010? We’ll give you 100 knowledge points [...]
Answer Question | December 16, 2011 9:44 PM
Cloud Computing, cloud computing management, Cloud computing security, Cloud Security, Open IT Forum, Security, Security management
During recent DDoS attacks, the hackers are able to bring down all customers hosted on the targeted customer’s service. Suggestions for mitigating that risk?
Answer Question | March 1, 2011 3:59 PM
Cloud Security, Cloud Services, DDOS
Looking for suggestions for a hybrid cloud governance, including performance metrics and ballpark cost.
Answer Question | December 30, 2011 3:57 PM
Cloud Computing, Cloud Security, Cloud Services, Hybrid clouds, Performance Measurement, Performance metrics, SMB
Interested in arguments for either side and pros/cons on cloud hosting versus managed server hosting.
Answer Question | February 3, 2011 3:48 PM
Cloud Computing, Cloud Security, Cloud Services, Hosted servers, Managed Services, Server Hosts
my question is related to security within the cloud. What is the reality of security because any where i see it’s just suggestions to strengthen the security with respect to platform, infrastructure or Information itself. But i want to know what is current security reality in the cloud because of which many IT guru’s call it [...]
Answer Question | January 19, 2011 5:18 PM
AMD, Cloud Computing, Cloud computing security, Cloud Security, Google Chrome, Windows 7, Windows 7 Administration
How you are securing the confidential data? Is there a chance for someone to access or view our confidential data by whoever is maintaining the Server @cloud? How do you ensure what you said above?
Answer Question | May 3, 2010 9:41 PM
Cloud Security, SQL Server R2
It used to be a good design to not only run applications in different tiers, but also physically separate them on different network switches. Network devices have since improved (security wise) and some folks seem to be alright with virtual switches. And then came the cloud infrastructure where security is mostly limited to host based [...]
Answer Question | March 2, 2010 1:01 PM
Cloud Computing, Cloud Computing in 2010, Cloud Security, Knowledge Point Challenge