{"id":1626,"date":"2012-05-16T12:37:00","date_gmt":"2012-05-16T12:37:00","guid":{"rendered":"http:\/\/cloudcomputing.sys-con.com\/node\/2279211"},"modified":"2012-05-16T12:37:00","modified_gmt":"2012-05-16T12:37:00","slug":"cloud-encryption-for-cloud-providers","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/cloud-encryption-for-cloud-providers\/","title":{"rendered":"Cloud Encryption for Cloud Providers"},"content":{"rendered":"<p>As part of our cloud strategy, we\u2019ve recently released a VMware version of our cloud security offering. It allows cloud providers using VMware, as well as the cloud users themselves, to create an encrypted environment within minutes, while eliminating the complexity around encryption key management in the cloud without compromising trust and confidentiality.<br \/>\nDuring this process we\u2019ve engaged in many conversations with the cloud providers\u2019 community to better understand their requirements, and equally important \u2013 their customers\u2019 requirements. We\u2019ve identified some interesting patterns with regards to cloud data security, which I thought would be beneficial to share.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/2279211\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As part of our cloud strategy, we\u2019ve recently released a VMware version of our cloud security offering. It allows cloud providers using VMware, as well as the cloud users themselves, to create an encrypted environment within minutes, while eliminatin&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-1626","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/1626","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=1626"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/1626\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=1626"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=1626"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=1626"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}