• 0
    • ارسال درخواست
    • حذف همه
    • Industrial Standards
    • Defence Standards
  • درباره ما
  • درخواست موردی
  • فهرست استانداردها
    • Industrial Standards
    • Defence Standards
  • راهنما
  • Login
  • لیست خرید شما 0
    • ارسال درخواست
    • حذف همه
View Item 
  •   YSE
  • Industrial Standards
  • IEEE - The Institute of Electrical and Electronics Engineers, Inc.
  • View Item
  •   YSE
  • Industrial Standards
  • IEEE - The Institute of Electrical and Electronics Engineers, Inc.
  • View Item
  • All Fields
  • Title(or Doc Num)
  • Organization
  • Year
  • Subject
Advanced Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Archive

Cybersecurity in Agile Cloud Computing--Cybersecurity Guidelines for Cloud Access

Cybersecurity in Agile Cloud Computing--Cybersecurity Guidelines for Cloud Access

Organization:
IEEE - The Institute of Electrical and Electronics Engineers, Inc.
Year: 2022

Abstract: Organizations demand immediate, uninterrupted access for their users, no matter where they are located. Digital business transformation efforts, adopting Software as a Service (SaaS), working from home (especially following the COVID-19 pandemic), and emerging edge computing platforms have changed how enterprises work. Digital business transformation requires anywhere, anytime access to applications and services--many of which are located in the cloud. The enterprise perimeter can now be everywhere--a dynamically created, policy-based secure access service edge. Enterprises want to protect their assets from unauthorized entities. Still, they also want to keep business continuity by allowing trusted devices and users to access applications hosted on-premises or in the cloud. To achieve this, one of the most critical security layers is secure remote access. This paper presents the cloud security guidelines and best practices, emphasizing secure remote access.
URI: http://yse.yabesh.ir/std;query=autho162l-St79D40AC4261590-%20Naval%20Facilities%20E/handle/yse/329557
Subject: cloud computing
Collections :
  • IEEE - The Institute of Electrical and Electronics Engineers, Inc.
  • Download PDF : (1.664Mb)
  • Show Full MetaData Hide Full MetaData
  • Statistics

    Cybersecurity in Agile Cloud Computing--Cybersecurity Guidelines for Cloud Access

Show full item record

contributor authorIEEE - The Institute of Electrical and Electronics Engineers, Inc.
date accessioned2023-08-07T18:46:20Z
date available2023-08-07T18:46:20Z
date copyright28 September 2022
date issued2022
identifier other9904636.pdf
identifier urihttp://yse.yabesh.ir/std;query=autho162l-St79D40AC4261590-%20Naval%20Facilities%20E/handle/yse/329557
description abstractOrganizations demand immediate, uninterrupted access for their users, no matter where they are located. Digital business transformation efforts, adopting Software as a Service (SaaS), working from home (especially following the COVID-19 pandemic), and emerging edge computing platforms have changed how enterprises work. Digital business transformation requires anywhere, anytime access to applications and services--many of which are located in the cloud. The enterprise perimeter can now be everywhere--a dynamically created, policy-based secure access service edge. Enterprises want to protect their assets from unauthorized entities. Still, they also want to keep business continuity by allowing trusted devices and users to access applications hosted on-premises or in the cloud. To achieve this, one of the most critical security layers is secure remote access. This paper presents the cloud security guidelines and best practices, emphasizing secure remote access.
languageEnglish
titleCybersecurity in Agile Cloud Computing--Cybersecurity Guidelines for Cloud Accessen
titleCybersecurity in Agile Cloud Computing--Cybersecurity Guidelines for Cloud Accessnum
typeStandard
page36
treeIEEE - The Institute of Electrical and Electronics Engineers, Inc.:;2022
contenttypeFulltext
subject keywordscloud computing
subject keywordsIndustry Connection
subject keywordscloud security
subject keywordscloud
subject keywordsremote access
subject keywordscybersecurity
authorDavid Tayouri|Snir Hassidim|Alex Smirnov|Asaf Shabtai
DSpace software copyright © 2017-2020  DuraSpace
نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
yabeshDSpacePersian
 
DSpace software copyright © 2017-2020  DuraSpace
نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
yabeshDSpacePersian