Cloud Governance

Blog

AWS Security and Compliance Update

Security is a common concern of organizations adopting cloud services and so it was interesting to hear from end users at the AWS Summit in London on November 17th how some organizations have addressed these concerns. Financial services is a highly regulated industry with a strong focus on…

Analysts' View

KuppingerCole Analysts' View on Cloud Risk & Security

Many organizations are concerned about the use of cloud services; the challenge is to securely enable the use of these services without negating and the benefits that they bring. To meet this challenge it is essential to move from IT Management to IT Governance. Cloud services are…

Press Release

KuppingerCole says Using independent, external Certification for Cloud Provider Selection is a must

Wiesbaden, September 10th, 2015 – Independent Analysts Company KuppingerCole Ltd. recently published a new Executive View about using certification for Cloud Provider Selection. The document provides an overview of how certifications and attestations relating to cloud services and…

Executive View

Executive View: Using Certification for Cloud Provider Selection - 71308

An overview of how to use certification to assist in selecting a cloud service provider. 

Executive View

Executive View: FireHost Secure Virtual Private Cloud – Security and Assurance - 71284

An overview of FireHost Secure Virtual Private Cloud together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer.

Executive View

Executive View: Virtustream IaaS – Security and Assurance - 71285

An overview of the Virtustream Infrastructure as a Service together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer.

Executive View

Executive View: HP Helion Managed Virtual Private Cloud – Security and Assurance - 71288

This report provides an overview of HP Helion Managed Virtual Private Cloud together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer. 

Executive View

Executive View: VMWare vCloud® Air™ – Security and Assurance - 71286

This report provides an overview of VMWare vCloud Air Infrastructure as a Service together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer.

Webcast

Assessing and Mitigating Cloud Risks

The modern reality is that even the most technology conservative companies are thinking to shift some of their valuable assets to the cloud. However, since anyone with a credit card can purchase cloud services with a single click, the governance and control of organisations are frequently…

Webcast

Mike Small - Cloud Risk Assessment

When moving to the use of cloud services it is most important to take a risk based approach.  However the process involved is often manual and time consuming; a tool is needed to enable a more rapid and consistent assessment of the risks involved.  This session describes why a…

Executive View

Executive View: Microsoft Azure – Security and Assurance - 71282

This report provides an overview of the Microsoft Azure cloud services together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer. 

Executive View

Executive View: IBM SoftLayer – Security and Assurance - 71281

IBM SoftLayer provides infrastructure services direct to customers and is also the foundation for many of IBM’s cloud services such as BlueMix. The SoftLayer platform is able to provide “bare metal” access to computing resources resulting in high performance. This report…

Executive View

Executive View: Rackspace Managed Cloud Hosting – Security and Assurance - 71283

This report provides an overview of Rackspace Managed Cloud Hosting services together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer. 

Leadership Compass

Leadership Compass: Infrastructure as a Service - 70959

This report provides an overview and analysis of the market for Infrastructure as a Service (IaaS). IaaS provides basic computing resources that the customer can use over a network to run software and to store data. This report provides you with a compass to help you to find the IaaS…

Survey

Studie zu digitalen Risiken und Sicherheitsbewusstsein - 71252

In einer weltweiten Online-Studie befragte KuppingerCole Experten aus dem Bereich der Informationssicherheit zu ihrer derzeitigen Wahrnehmung von digitalen Risiken und Sicherheit. Die Studie weist auf eine signifikant gestiegene Wahrnehmung beider Bedrohungen, d.h. von potenziellen…

Survey

Digital Risk and Security Awareness Survey - 71252

A survey on the awareness of digital risks and security risks run and compiled by KuppingerCole. Providing insight into the current perception of digital and security risks, complemented with analysis and recommendations by KuppingerCole.

Advisory Note

Advisory Note: Your Business is Moving to the Cloud - 71156

Take a pro-active rather that re-active approach to the adoption of Cloud services. Plan your move to the Cloud taking a strategic view of your requirements, processes and deployment options. Make the Cloud perform for you - not the other way around. The question posed in the title of…

Analysts' View

KuppingerCole Analysts' View on Compliance Risks for Multinationals

Whether public, private or hybrid clouds, whether SaaS, IaaS or PaaS: All these cloud computing approaches are differing in particular with respect to the question, whether the processing sites/parties can be determined or not, and whether the user has influence on the geographical,…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

How to Train Your AI to Mis-Identify Dragons

This week Skylight Cyber disclosed that they were able to fool a popular “AI”-based Endpoint Protection (EPP) solution into incorrectly marking malware as safe. While trying to reverse-engineer the details of the solution's Machine Learning (ML) engine, the researchers found that it contained a secondary ML model added specifically to whitelist certain types of software like popular games. Supposedly, it was added to reduce the number of false positives their "main engine" was [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00