{"id":8508,"date":"2013-08-05T19:10:00","date_gmt":"2013-08-05T19:10:00","guid":{"rendered":"http:\/\/cloudcomputing.sys-con.com\/node\/2752357"},"modified":"2013-08-05T19:10:00","modified_gmt":"2013-08-05T19:10:00","slug":"cloud-security-not-an-oxymoron","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/cloud-security-not-an-oxymoron\/","title":{"rendered":"Cloud Security: Not an Oxymoron"},"content":{"rendered":"<p>Some businesses today are nervous about moving to cloud-delivered technology because it means allowing their system data to reside somewhere other than their own data center. For some, this can be a tough concept to grasp, especially for those who have spent 25 years or more hosting their company\u2019s systems and data. But cloud computing providers could not exist without implementing strong security controls for their customers\u2019 information. The reality is that leading cloud solutions include security features well beyond what most manufacturing companies can afford to implement on their own.<br \/>\nIn this article readers will learn about some realities of the security practices at leading cloud providers and the questions that should be asked by those considering use of a cloud solution.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/2752357\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Some businesses today are nervous about moving to cloud-delivered technology because it means allowing their system data to reside somewhere other than their own data center. For some, this can be a tough concept to grasp, especially for those who have spent 25 years or more hosting their company&rsquo;s systems and data. But cloud computing providers could not exist without implementing strong security controls for their customers&rsquo; information. The reality is that leading cloud solutions include security features well beyond what most manufacturing companies can afford to implement on their own.<br \/>\nIn this article readers will learn about some realities of the security practices at leading cloud providers and the questions that should be asked by those considering use of a cloud solution.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/2752357\" target=\"_blank\">read more<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-8508","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/8508","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=8508"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/8508\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=8508"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=8508"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=8508"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}