Data Center Journal

Volume 33 | August 2014

Issue link: https://cp.revolio.com/i/359333

Contents of this Issue

Navigation

Page 3 of 32

THE DATA CENTER JOURNAL | 1 www.datacenterjournal.com FEATURE 2 IT SECURITY IN A POST- SNOWDEN WORLD: DEALING WITH DATA SOVEREIGNTY AND DATA CUSTODY ISSUES By Bob Butler It has been over a year since former NSA contractor Edward Snowden released a trove of documents revealing the large-scale collection, analysis and storage of personally identifiable information—much of it from the data centers of telecommunications, Internet and cloud service providers. And people are still talking about it. DESIGN CORNER 8 DESIGNING RELIABLE PHYSICAL SECURITY FOR THE DATA CENTER By Jeffrey R Clark Much of the focus on data center security revolves around the IT component: repelling DoS attacks, identifying and eliminating malware, thwarting remote intrusion attempts, and so on. But physical security is just as important, if not more so. Designing reliable physical security, however, involves many of the same principles as designing reliable network security: properly isolating certain areas, controlling access to others and anticipating (and preparing for) avenues of attack. IT SECURITY 14 TACKLING TODAY'S SECURITY THREATS By Paul Burns As high profile security breaches involving major household names continue to make the headlines, the challenge for businesses, and SMEs in particular, is to understand the threats and determine how best to protect their data and respond in the event of a security breach. 12 TOP CONSIDERATIONS FOR AVOIDING A BREACH WITH COMPLIANT HOSTING By Scott Walters A company's sensitive data is the foundation of any business, so selecting the right hosting provider is critical for any organization looking to take advantage of the cloud. Internal and external threats, along with compliance issues for companies that are regulated by PCI and/or HIPAA, add another layer of complexity—how can you know that you're making the right decision while minimizing the always looming threat of a breach? 16 SECURITY IN THE CLOUD: Responding to Threats through a Strong Partnership with the Right Cloud Service Provider By Rob Carter According to the 2013 Future of Cloud Computing Survey, 75 percent of large organizations use or plan to implement cloud-computing strategies in the next 12 months. Despite this evidence of widespread cloud interest and adoption, surveys have shown that security in the cloud continues to be a concern. 20 TRANSLATING THE LANGUAGE OF NETWORK SECURITY By Jeffrey R Clark Like any field, network security has its own peculiar jargon that can make understanding the underlying concepts rather difficult. Furthermore, many IT professionals use acronyms and abbreviations to a fault, so the task of following the language can be doubly difficult, even to a veteran of another technology area. IT BUSINESS 24 THE BENEFITS OF RESPONSIBLE AND EFFICIENT IT ASSET DISPOSAL By Steve Skurnac While most operations within a data center remain unique, all make conscious efforts toward efficiency, security and continuous operations that can help reduce costs and in some cases protect and improve a data center's image or reputation. 30 UPCOMING EVENTS VENDOR INDEX All rights reserved. No portion of DATA CENTER Journal may be reproduced without written permission from the Executive Editor. The management of DATA CENTER Journal is not responsible for opinions expressed by its writers or editors. We assume that all rights in communications sent to our editorial staff are unconditionally assigned for publication. All submissions are subject to unrestricted right to edit and/ or to comment editorially. AN EDM2R ENTERPRISES, INC. PUBLICATION ALPHARETTA, GA 30022 PHONE: 678-762-9366 FAX: 866-708-3068 | WWW.DATACENTERJOURNAL.COM DESIGN : NEATWORKS, INC., JOHNS CREEK GA 30022 TEL: 678-392-2992 | WWW.NEATWORKSINC.COM

Articles in this issue

Links on this page

Archives of this issue

view archives of Data Center Journal - Volume 33 | August 2014