Securing Data in the Cloud
Click here to download now
Overview: This document is intended to give a broad overview of our security policies, processes and practices current at the date of writing. It would be impossible to describe all security controls in a document of this length, security policies change over time, and our own security policies prohibit the release of detailed information regarding our security practices.
IT security professionals of all types are considering adopting cloud computing or ‘Software as a Service’ (SaaS) and question how secure their data will be in our hands. Customers are right to ask this question and should closely examine a vendor’s security credentials.