Securing Microsoft's cloud infrastructure

Gain an understanding of what cloud computing at Microsoft means today and how the company delivers a trustworthy cloud computing infrastructure.

Cloud Security

Recent research on the emerging definitions of "Cloud," "cloud computing," and "cloud environment" has attempted to identify what customers expect from cloud providers and to find ways to categorize what such providers say they will offer. The idea that purchasing services from a cloud environment may allow technology business decision makers (BDMs) to save money and allow companies to focus on their core business is an enticing proposition in the current economic climate. Many analysts view the emerging possibilities for pricing and for delivering services online as disruptive to market conditions. These market studies and the ensuing dialogue among prospective customers and service providers show certain themes have emerged as potential barriers to rapid adoption of cloud services. Concerns about security, privacy, reliability, and operational control top the list of potential barriers. Microsoft recognizes that BDMs have many questions about these issues including a need to know how they are addressed in the cloud computing environment at Microsoft and the implications to their own risk and operations decisions.

Advertisement - Article continues below

This paper shows how the coordinated and strategic application of people, processes, technologies, and experience results in continuous improvements to the security of the Microsoft cloud environment. The Online Services Security and Compliance (OSSC) team within the Global Foundation Services (GFS) division builds on the same security principles and processes Microsoft has developed through years of experience managing security risks in traditional development and operating environments.

Advertisement - Article continues below

Click the link below to read the full White Paper.

Featured Resources

Successful digital transformations are future ready - now

Research findings identify key ingredients to complete your transformation journey

Download now

Cyber security for accountants

3 ways to protect yourself and your clients online

Download now

The future of database administrators in the era of the autonomous database

Autonomous databases are here. So who needs database administrators anymore?

Download now

The IT expert’s guide to AI and content management

Your guide to the biggest opportunities for IT teams when it comes to AI and content management

Download now

Most Popular

Mobile Phones

Microsoft patents a mobile device with a third screen

6 Apr 2020
cyber security

Microsoft gobbles up domain to keep it from hackers

8 Apr 2020

A critical flaw in 350,000 Microsoft Exchange remains unpatched

7 Apr 2020