Home Cloud Computing Data sovereignty: a cloud myth debunked
×

Warning

JUser: :_load: Unable to load user with ID: 63

Ovum has published a report that it says "debunks the common misconception that data sovereignty issues are a major barrier to the use of public cloud services."

The Ovum report "[shares] the positive public cloud adoption experiences and lessons learned by 10 corporate and government enterprises."

According to Ovum, it found that "Concerns over data security and regulatory compliance were taken seriously, but were not viewed as 'showstoppers' as long as careful thought is given to the categories of data that will be stored in the cloud and to identifying specific risk factors and contractual and process mitigations...[and] not all public cloud services are equal in terms of their ability to meet enterprise reliability and security requirements, so the biggest risk mitigation is the choice of a high quality enterprise-grade cloud services provider."

Dr Steve Hodgkinson, research director for Ovum's Asia Pacific IT research and advisory services, said: "New trade-offs, however, between the benefits and risks of public cloud services are required, along with a willingness to 'think outside your boxes'.

"Traditional ICT approaches are focused on owning and controlling resources, assets, and contracts for specified services. The public cloud enables the focus to shift to accessing evolving services and participating in dynamic Internet ecosystems. The benefit for CIOs is less time spent managing technology and software and more time spent managing information and data to drive business innovations."

REASON TO CHOOSE TENDA MESH WIFI

Our Mesh WiFi system MW3 is the first in Australia market with price below AUD$200 for a set of three.

· Best valued product
· Strong signal covering up to 300m2 for MW3 and 500m2 for MW6
· Aesthetically pleasing and light weigh (blend into any room deco)
· Wireline backhauls supported
· Product units are pre-paired and easy to setup
· Not requiring phone number or email address to set up
· Wall penetration (better than other similar brands)
· Seamless WiFi roaming
· User friendly app with controls to setup a guest network, parental controls for disabling groups of devices you allocate to individuals, QoS and more

CLICK FOR MORE INFO!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

 

Popular News

 

Telecommunications

 

Sponsored News

 

 

 

 

Connect