
{"version":"1.0","provider_name":"OTAVA","provider_url":"https:\/\/www.otava.com","title":"Enterprise Security Requirements: Is Cloud Computing There Yet?","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"tEhZmetySj\"><a href=\"https:\/\/www.otava.com\/blog\/enterprise-security-requirements-is-cloud-computing-there-yet\/\">Enterprise Security Requirements: Is Cloud Computing There Yet?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.otava.com\/blog\/enterprise-security-requirements-is-cloud-computing-there-yet\/embed\/#?secret=tEhZmetySj\" width=\"600\" height=\"338\" title=\"&#8220;Enterprise Security Requirements: Is Cloud Computing There Yet?&#8221; &#8212; OTAVA\" data-secret=\"tEhZmetySj\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.otava.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"In David Linthicum\u2019s article \u201cLeveraging Cloud Computing for Business Continuity\u201d in the\u00a0Summer 2010 edition of Disaster Recovery Journal he argues that in many instances cloud computing is not a fit due to specialized requirement of the applications. He states that many enterprises deal with data that has special security requirements, such as PCI &amp; HIPAA data. I think he was referring to \u201cpublic clouds\u201d. That begs the questions if the \u201cpublic\u201d cloud computing vendors can\u2019t support those apps due to those security requirements maybe it\u2019s time to consider the \u201cprivate cloud\u201d approach. A private cloud can often ease security concerns that come with the public cloud because by definition, each client has dedicated hardware to them. There is no sharing of disk space and thus your data is physically separated from others. While public clouds can not quite meet enterprise level security requirements, private clouds often can."}