The browser version you are using is not recommended for this site.Please consider upgrading to the latest version of your browser by clicking one of the following links.
We are sorry, This PDF is available in download format only
Secure Cloud Computing: Expedient Case StudyIf you’re like a lot of enterprise IT teams, you’re interested in getting the benefits of cloud com-putting but have questions about the confidentiality, integrity, and availability of the cloud. Given highly publicized service failures and data breaches, I can’t blame you. If you’re going to get out of the hardware ownership business and focus on the IT elements that really matter to your business, you need to be able to count on consistently reliable and transparent cloud services.My company, Expedient Communications, provides cloud computing, managed services, and network connectivity. As such, my team is working to extend or replace the technical foundation for many of our customers’ businesses. The lessons we’re learning might help your team as you build private clouds and evaluate external cloud services.As a starting point for a secure and highly available cloud service, you need a redundant system architecture that builds security throughout the technology stack. My team created self-contained pods that include compute, storage, and I/O. We chose the Intel® Xeon® processor X5650 as the pod building block, since it gives us a good balance of compute and memory capacity. You can replicate this type of modular architecture across the organization to give you a solid base for high availability.To secure the cloud, you need to integrate security components at every layer of the Open Systems Interconnection (OSI) model, from the physical through the application layer. It’s also important to ensure that each component has a robust reporting capability, so you can monitor and track potential issues and threats and respond quickly to address them.Read the full Secure Cloud Computing Expedient Case Study.
Intel® AES-NI offers new instructions that speed up enterprise encryption and offer better performance, security, and more.
Parallels works with Intel to provide security monitoring and service catalogs to deploy virtual machines.
IT experts discuss OpenStack proof of concept which aligns with security and carbon footprint usage models from the Open Data Center Alliance.
Trusted compute pools with Intel® TXT
Managing privacy, data and application security
Learn how Intel® Xeon® processors are increasing performance of computationally intensive cryptographic algorithms to better manage data security.