Cover Image


Data Center Security

出版商 Datacenter Dynamics 商品編碼 317190
出版日期 內容資訊 英文
商品交期: 最快1-2個工作天內
Back to Top
資料中心安全 Data Center Security
出版日期: 2014年10月23日 內容資訊: 英文



  • 主要調查結果
  • 簡介
  • 資料中心的保護為安全連續體的一部分
  • 「bad boys」更深層次的威脅
  • 歐洲委員會應對雲端運算固有的不安
  • 不要當事後諸葛
  • 最重要的教訓,語組織、技術、過程有關
  • 企業獨特的方法
  • 結論:構築更佳資料中心安全的方法
  • 關於Martin Hingley、ITCandor


Data centers - which are at the heart of modern business - are no longer fortresses into which mission-critical corporate information is poured, stored and processed in guarded isolation. IT virtualization sometimes makes the location of data uncertain, while the rise of mobile access, social business and cloud computing creates a A successful organization views data center security as a process requiring constant vigilance rather than a one-off precaution or mere regulatory compliance. It learns from what others are doing at the industry-sector, application and country levels and puts itself in the hacker's shoes to identify and guard against new vulnerabilities. Data center security is not about “return on investment.” Rather, it concerns “protection from disaster”: When it fails, customer confidence, goodwill, share prices and revenues tumble, the staff responsible are probably fired, and, in extreme situations, companies go bust. Our aim in this paper is to raise awareness, stimulate debate and engage with users and the industry on a vitally important subject. myriad of new interactions to be secured.

Table of Contents

  • Key findings
  • Introduction
  • Data center protection is part of the security continuum
  • The same ‘bad boys,' deeper threats
  • The European Commission addresses the inherent insecurity of cloud
  • computing
  • Try not to be wise after the event
  • The most important lessons to learn have to do with the organization,
  • technology and processes
  • What's unique about your company's approach?
  • Conclusions - how to build better data center security
  • About Martin Hingley and ITCandor

Figure Index

  • Figure 1: How to secure the data center
  • Figure 2: Data center insecurity grows as technology develops
  • Figure 3: The PCI data-security standard
  • Figure 4: The data center under attack - the different forms of hacking
  • Figure 5: Cloud computing security choice
  • Figure 6: Potential sources of data center insecurity
Back to Top