The forward thinking enterprise is already fully engaged in various cloud projects and applying controls in an ad hoc way. More importantly, even the most conservative organizations are likely to have unsanctioned cloud apps in use by their employees.
As these projects are moved from one-off proof-of-concept status to full integration into the enterprise architecture, the piecemeal cloud security solutions being put in place must be re-evaluated within the context of a broader security model to rationalize the individual components.
This white paper, composed by IDC and sponsored by IBM, examines how enterprises can protect SaaS cloud applications by looking at points of evaluation of their objectives for SaaS Security, discovering which cloud applications are in use, assessing existing security solutions and finally architecting the cloud application security model.
Read the complete IDC paper now: CISOs’ Guide to Enabling a Cloud Security Strategy
Security Intelligence Staff