Loading…
Implementation of cloud security technologies for enhancing effectiveness of security infrastructure and compliance
Enterprises are increasingly pursuing potential form of business benefits of properly migrating potential technological platforms as well as proper services into proper cloud-environment that leverages different security and compliance regions in business. The literature related to technological imp...
Saved in:
Main Author: | |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Enterprises are increasingly pursuing potential form of business benefits of properly migrating potential technological platforms as well as proper services into proper cloud-environment that leverages different security and compliance regions in business. The literature related to technological implications, legal standards, certification standards as well as compliance adherence is used for delivering the best possible understanding of the context. In this aspect, understanding of cloud-management on data breaches mitigation and system vulnerability control is widened through implementation of suitable literature. This research investigates on finding out ways in which today’s business uses cloud management for maximizing security as well as compliance standards and aims on analyzing its impacts on the overall business performance in the marketing environment. Advantages potentially include rapid form of information establishment and deployment while essentially mitigating form of operating expenses and great processing speed. Literary frameworks are enhanced and incorporated in this assignment for deriving agility of this research. Hypothesis assures a positive relation between cloud-management use for maximizing compliance as well as security in business standards. Cloud management implies proper security and compliance standards for enterprises that are often unprepared for resolving the same. Methodology includes explanatory design of the research and incorporating non-probability sampling for mitigating unnecessary bias in this research. Furthermore, sample size incorporates online surveys of 30 employees from different businesses for assuring real time data collection in the research. Results indicate positive uses of cloud-management for maximizing business security and adhering to compliance level in business attributes. |
---|---|
ISSN: | 0094-243X 1551-7616 |
DOI: | 10.1063/5.0177844 |