...

... For whatever it was - it is illusory, ...

He noted that 70 % of firms outsource accounting of benefits and payroll, t. e. information that should be protected. ... - The same thing with CRM. Salesforce. com has 80 thousand. customers and two million users. Is not customer data confidential? .

McDonald pointed out a number of other areas where ...

... The transition to mobility requires access at any time. With the advent of konsyumerizatsii we can gain access to corporate resources from any type of device. This is required by users, - he said. - If the workload can move from one. Data Center. in another, then we can just as easily send it on Amazon. All this is happening at the same time. Increasingly, we do not control the elements of our IT infrastructure, even. plotters. and. scanners. can now be used remotely - as a service. ' Cloud ' - just one part of it, but we will fight with him ...

Protection of information - not the same thing as control over it, said MacDonald. ... Previously, we assumed that the control is the key to trust. If I have control, then I trust. If you have no control - do not trust. But this formula has a flaw. I have a device that I can control, but that may be infected. ' Cloud ' challenges these assumptions, ...

Organizations must build its IT infrastructure on resilience rather than preventing failure, said MacDonald. ... Some devices, servers, hard drives,. routers. once may refuse. But that is constructed in the ' cloud ' is the elasticity of the result, regardless of the individual devices. No matter what caused the failure of a component when the whole system provides fault tolerance results ...

...

...

In addition, infrastructure protection is programmable. In many ways, as well as organizations combine resources for computation, remedies 'cloud' can pool resources to provide fault tolerance information. ... Instead of programming a firewall or a switch or router, you program policy and work load of information security ...

During the presentation, McDonald cited the example of Microsoft's EULA Exchange, showing that as a result of the risk falls on the end user if something goes wrong. The ... ... This is a completely different level, ...

The biggest obstacle hampering the growth of new models is the ... Organizations must sufficiently trust the service provider to enter into a transaction in a variety of different contexts, he said. ...

By 2015, the security and privacy will not be major concern for organizations moving to the use of cloud computing, said MacDonald.
... IT resources and technology will change and you will not have a reliable control and absolute control in any case. It should take as a starting point of the calculation of business needs, and security is easier to provide cloud services providers, for which, in particular, you pay ...