2

Click here to load reader

Security strategy roadmap for cloud computing - IBM€¦ · Do you have a clear understanding of the various security and privacy risks associated with cloud computing? Is ... Security

  • Upload
    vominh

  • View
    217

  • Download
    3

Embed Size (px)

Citation preview

Page 1: Security strategy roadmap for cloud computing - IBM€¦ · Do you have a clear understanding of the various security and privacy risks associated with cloud computing? Is ... Security

IBM Global Technology ServicesData Sheet

Security strategyroadmap for cloud computingAugment your cloud computing strategy with asound security approach

Highlights● Guides you through the security and

privacy concerns of your unique cloudinitiative

● Helps identify and prioritize cloud com-puting scenarios for your specific secu-rity requirements and business needs

● Leverages IBM expertise to help assessyour risks and develop a high-levelroadmap for risk mitigation

Are security and privacy risk concerns inhibiting you from adopting orproviding cloud services? Do you have a clear understanding of thevarious security and privacy risks associated with cloud computing? Isit a challenge to optimize your security spending while taking completeadvantage of your cloud initiatives? Does your organization lack asound security strategy that aligns with your corporate or customersecurity requirements?

IBM Professional Security Services Cloud Computing – cloud securityconsulting – cloud security strategy roadmap is designed to help youunderstand, establish and outline the steps for realizing the securitygoals in relation to your cloud computing strategy. Our security expertsin the area of cloud computing guide you through onsite work sessionsand discussions that can help determine your cloud computing initia-tive and goals, identify associated security and privacy risks, determineappropriate risk mitigation strategies and provide a high-level securitystrategy roadmap for successfully achieving your cloud security needs.

Providing guidance around your cloud securityand privacy concernsOur onsite working session will begin with discussions on cloud com-puting and the associated security and privacy concerns. IBM subjectmatter experts help you consider security risks that apply to subscribersand providers of various cloud solutions and assess the risks that areapplicable to your cloud initiative.

Determining the cloud scenarios that best meet your business needsThroughout the engagement, we work with your key personnel tounderstand your specific cloud initiatives and outline associated clouddeployment scenarios. Security risks for each scenario are discussed in

Page 2: Security strategy roadmap for cloud computing - IBM€¦ · Do you have a clear understanding of the various security and privacy risks associated with cloud computing? Is ... Security

Please Recycle

relation to identified legal, regulatory and security requirements.Known or required subscriber and provider side controls are outlinedto enable the team to identify remaining gaps.

Leveraging IBM expertise to provide a high-level roadmapAfter determining the high-priority workloads, our cloud and securityexperts collaborate with you to establish the risk mitigation steps andstrategies for effective cloud migration. We work with you to ensurethat the identified risk mitigation strategies are in line with your secu-rity objectives and business needs. The discussions, decisions andactions from the working session are documented as a result of theengagement, along with the high-level security strategy roadmap foryour cloud initiative.

Why IBM?IBM has extensive expertise in delivering cloud computing and securitysolutions to organizations across multiple industries. Our breadth ofservices and products related to security and cloud computing enablesus to provide a more comprehensive approach that is based on time-tested methodologies and best practices. Our recognition as a thoughtleader with a large base of intellectual capital around security bestpractices is backed by the capability to deliver end-to-end solutions forenterprises of virtually any size or scope.

For more informationTo learn more about the IBM Professional Security Services CloudComputing – cloud security consulting – cloud security strategyroadmap, please contact your IBM marketing representative or IBM Business Partner, or visit the following website:ibm.com/services/security

Additionally, financing solutions from IBM Global Financing canenable effective cash management, protection from technology obso-lescence, improved total cost of ownership and return on investment.Also, our Global Asset Recovery Services help address environmentalconcerns with new, more energy-efficient solutions. For more informa-tion on IBM Global Financing, visit: ibm.com/financing

© Copyright IBM Corporation 2010

IBM Global ServicesRoute 100Somers, NY 10589 U.S.A.

Produced in the United States of AmericaSeptember 2010All Rights Reserved

IBM, the IBM logo and ibm.com are trademarks orregistered trademarks of International Business MachinesCorporation in the United States, other countries, or both. Ifthese and other IBM trademarked terms are marked on theirfirst occurrence in this information with a trademark symbol(® or ™), these symbols indicate U.S. registered or commonlaw trademarks owned by IBM at the time this informationwas published. Such trademarks may also be registered orcommon law trademarks in other countries. A current list ofIBM trademarks is available on the web at “Copyright andtrademark information” at ibm.com/legal/copytrade.shtml

Other company, product or service names may be trademarksor service marks of others. References in this publication to IBM products or services do not imply that IBM intendsto make them available in all countries in whichIBM operates.

The customer is responsible for ensuring compliance withlegal requirements. It is the customer’s sole responsibility to obtain advice of competent legal counsel as to theidentification and interpretation of any relevant laws andregulatory requirements that may affect the customer’sbusiness and any actions the reader may have to take tocomply with such laws. IBM does not provide legal advice or represent or warrant that its services or products willensure that the customer is in compliance with any law or regulation.

SED03115-USEN-01