ITC/USA 2011 Conference Proceedings / The Forty-Seventh Annual International Telemetering Conference and Technical Exhibition / October 24-27, 2011 / Bally's Las Vegas, Las Vegas, Nevada / As organizations move toward cloud [1] computing environments, data security challenges will begin to take precedence over network security issues. This will potentially impact telemetry post processing in a myriad of ways. After reviewing how data security tools like Enterprise Rights Management (ERM), Enterprise Key Management (EKM), Data Loss Prevention (DLP), Database Activity Monitoring (DAM), and tokenization are impacting cloud security, their effect on telemetry post-processing will also be examined. An architecture will be described detailing how these data security tools can be utilized to make telemetry post-processing environments in the cloud more robust.
Identifer | oai:union.ndltd.org:arizona.edu/oai:arizona.openrepository.com:10150/595799 |
Date | 10 1900 |
Creators | Kalibjian, J. R. |
Contributors | Hewlett Packard Corporation |
Publisher | International Foundation for Telemetering |
Source Sets | University of Arizona |
Language | en_US |
Detected Language | English |
Type | text, Proceedings |
Rights | Copyright © held by the author; distribution rights International Foundation for Telemetering |
Relation | http://www.telemetry.org/ |
Page generated in 0.0018 seconds