Skip to main content
  1. Home >
  2. Solutions >
  3. Fujitsu Cloud >
  4. Cloud-beveiliging – Pluk de vruchten, minimaliseer het risico

Cloud-beveiliging – Pluk de vruchten, minimaliseer het risico

Organisaties die onbekend zijn met clouds, maken zich vaak de grootste zorgen om beveiliging. Zo veel zelfs, dat dat vaak de reden is om er niet aan te beginnen. Maar voor ervaringsdeskundigen van clouds is beveiliging belangrijk, maar geen bron van zorgen of terughoudendheid. In tegenstelling, zij houden juist rekening met clouds in hun risicobeheerstrategieën en -processen. Sterker nog: in veel gevallen leveren cloud-services een hoger beveiligingsniveau dan bestaande IT-services.

Hoe kan uw organisatie een cloud introduceren en omarmen? Hoe plukt u er de vruchten van zonder uw bedrijf in gevaar te brengen?

De whitepaper "Cloud-beveiliging" van Fujitsu is een duidelijke en onpartijdige gids en geeft u een helder beeld over de complexiteit van cloud-beveiliging en hoe u er door kunt navigeren. Zo reist u zo efficiënt en probleemloos mogelijk door de cloud.


Key Considerations

CIOs and their teams need to plot effective cloud security management strategies as well as understand the implications from an operational and technology perspective.

Not all clouds are equal

It’s important to remember there are several different types of cloud – private, public, community or hybrid. The approach chosen has the biggest single impact on the level of risk and its manageability.

Location is everything
Knowing where data will reside is essential as the location has a significant impact on its privacy and confidentiality, as well as the legal obligations of those who process and store the data, given the varying regulatory frameworks in place in different legal jurisdictions.

One size does not fit all
By identifying and classifying data, organizations can consider the most appropriate location in which to store particular information. For instance, if it’s too sensitive for a public cloud, a private cloud may prove a secure and viable alternative.

Join the dots
Many of the risks associated with the cloud come about as a result of inadequate service integration. Organizations need to ensure cloud services are effectively joined up – both with one another and with inhouse systems and business services. It’s also worth considering an access-control approach that incorporates and integrates in-house, outsourced and cloud systems.

The burden of compliance
Whilst organizations using cloud services remain responsible for the security and integrity of their own data, to comply with regulations it’s important to ensure the relevant regulatory, corporate, industry or other standards apply (legally or contractually) to the provider.

Who can you trust?
Evaluate the long-term viability of the cloud provider. Remember it may not just be your data at stake but your reputation, so it pays to work with a trusted partner.

Request your copy of The White Book of Cloud Security.

Fujitsu and cloud security

At Fujitsu, we recognize that for customers adopting cloud services, security is a key concern – and we take this very seriously. We have a Cloud Security Committee focused on ensuring our cloud offerings are – and remain – secure. As an active member of the Cloud Security Alliance and other industry bodies, we are also firmly committed to the cause of furthering cloud security standards. Fujitsu’s global expertise and experience in information assurance is widely recognized and means Fujitsu is ideally placed to assist you in all areas of security, not least cloud security.