Cloud Computing and SaaS
A topic I have been interested in since I first heard of the idea is cloud computing. There are many large corporations with huge datacenters that are relatively idle most of the time. Why not find a way to harness this enormous and underused resource? Fortunately, internet giants such as Google and Amazon have been developing ways to make this a reality. Software as a Service (SaaS) has become the most recognized reality stemming from the cloud computing theory. SaaS, is a new trend in software deployment where a provider will license an application to a customer for on-demand usability. The major benefits to SaaS customers include reduced infrastructure (SaaS providers typically host the infrastructure necessary for running the applications), shared licensing, and anywhere/anytime website access. Now that SaaS and cloud computing is becoming a reality, security is becoming more of a concern. Detailed in the SearchSecurity.com article, Cloud Compliance: How to Manage SaaS Risks, are the significant security risks that are imminent if the proper precautions are not taken. Credibility
In determining the credibility of the information found in the article, I researched the background of the author. The author of the article, Joel Dubin, is a Certified Information Systems Security Professional as recognized by the International Information Systems Security Certification Consortium (ISC)². He is an independent computer security consultant that specializes in web and application security. He is a Microsoft MVP and is the author of The Little Black Book of Computer Security, Second Edition. He hosts a radio show on computer security and, finally, hosts The IT Security Guy blog at http://www.theitsecurityguy.com. Mr. Dubin's professional experience and industry certifications lend significantly to the credibility of his article. SaaS and Compliance
The article makes the point that a company's security concerns with SaaS are...
References: Dubin, Joel. (2008). Cloud Compliance: How to Manage SaaS Risk. Retrieved May 4, 2009, from http://searchsecurity.techtarget.com/tip/0,289483,sid14_gci1337369,00.html.
Please join StudyMode to read the full document