• Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io
No Result
View All Result
Converge Digest
Wednesday, April 29, 2026
  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io
No Result
View All Result
Converge Digest
No Result
View All Result

Home » RSA — Cloud Computing to Turn the Way Security Is Delivered Inside Out

RSA — Cloud Computing to Turn the Way Security Is Delivered Inside Out

March 2, 2010
in Uncategorized
A A

“Something is holding back the full realization of this cloud vision. And that – in a word – is security,” stated Art Coviello, President of RSA, The Security Division of EMC, in a keynote address at the RSA Conference in San Francisco . “With 51% of CIOs* citing security as their greatest concern surrounding cloud computing, security has not kept pace with the evolution to the cloud reflected in today’s increasingly virtualized and hyper-extended enterprises. We have severely diminished vision as a result and it shows. In short, people everywhere must be able to trust the cloud even if they literally and metaphorically can’t see it.”

Coviello outlined what RSA sees as the four, well-defined stages on the journey to the private cloud:

1. Initial adoption of virtualization to consolidate non-mission critical infrastructure, like test and development systems as well as low risk applications. It compels the enterprise to become adept with the tools of virtualization and to begin the process of “hardening” the virtual infrastructure.

2. Virtualize critical business applications and ensure the organization maintains the same level of visibility to the state of compliance in the virtual environment to the physical infrastructure.

3. Develop internal clouds and operate their information infrastructure as a utility consisting of a fully virtualized and automated data center where application workloads are policy- and service-level driven.

4. Outsource infrastructure to external service providers. This phase requires careful selection of service providers based on their demonstrated ability to “enforce policy, prove compliance and manage multi-tenancy.”http://www.rsa.com
http://www.emc.com

Tags: AllPacket Systems
ShareTweetShare
Previous Post

Apple Sues HTC for iPhone Patent Claims

Next Post

Portugal Telecom Posts Flat Revenues for 2009

Staff

Staff

Related Posts

Blueprint: Building wholesale networks with OTN
All

Blueprint: Building wholesale networks with OTN

December 20, 2022
Huawei and Orange achieve 157 Tbps over 120km fiber link

Huawei and Orange achieve 157 Tbps over 120km fiber link

December 20, 2022
Oracle opens cloud region in Chicago
All

Oracle opens cloud region in Chicago

December 20, 2022
BT trials C-RAN in Leeds
All

BT trials C-RAN in Leeds

December 19, 2022
BT to combine Enterprise and Global units to create BT Business

BT to combine Enterprise and Global units to create BT Business

December 19, 2022
euNetworks appoints Stephanie Lynch-Habib to President

euNetworks appoints Stephanie Lynch-Habib to President

December 19, 2022
Next Post

NTT Com Expands Global IP-VPN in Russia with TTC

Please login to join discussion

Categories

  • 5G / 6G / Wi-Fi
  • AI Infrastructure
  • All
  • Automotive Networking
  • Blueprints
  • Clouds and Carriers
  • Data Centers
  • Enterprise
  • Explainer
  • Feature
  • Financials
  • Last Mile / Middle Mile
  • Legal / Regulatory
  • Optical
  • Quantum
  • Research
  • Security
  • Semiconductors
  • Space
  • Start-ups
  • Subsea
  • Sustainability
  • Video
  • Webinars

Archives

Tags

5G All AT&T Australia AWS Blueprint columns BroadbandWireless Broadcom China Ciena Cisco Data Centers Dell'Oro Ericsson FCC Financial Financials Huawei Infinera Intel Japan Juniper Last Mile Last Mille LTE Mergers and Acquisitions Mobile NFV Nokia Optical Packet Systems PacketVoice People Regulatory Satellite SDN Service Providers Silicon Silicon Valley StandardsWatch Storage TTP UK Verizon Wi-Fi
Converge Digest

A private dossier for networking and telecoms

Follow Us

  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io

© 2025 Converge Digest - A private dossier for networking and telecoms.

No Result
View All Result
  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io

© 2025 Converge Digest - A private dossier for networking and telecoms.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
Go to mobile version