Frank Konieczny: We are addressing it in a very interesting way. We are addressing it in moralistic from both the network and from both of the data viewpoint. First of all, the cloud broker is working on the desk security model right now that says variousness control have to be applied based on the data that you have in that cloud structure. We are working with them to support that and figuring what the security control should be. At the same time we developed a back solution attribute based access control that we are pushing out that will allow only certain personalities to get access to data based on their attributes. Mainly their role, [00:00:35 Inaudible] where they are and that will control how we further structure the data down to lower level of granularity and access. The third thing is, looking at, what people forget about, there is a network sitting there. That is not only a cloud provider and what are going to do with the network? We are talking now about tagging the applications in the network actually white listing the various transaction flows so that even though it is sitting in the cloud infrastructure only certain locations that transaction we allow to go to or come from. So looking from that holistic viewpoint, I just cannot say thrust of in the cloud and that is secure because the data is secure. We have the other side, we have the user side, as well as, the network side that we have to support and figure out how that works together with the cloud infrastructure.
…Read more
Less…