How Secure is Your Data? 5 Key Considerations around Data Center Compliance

As cloud computing continues to grow and evolve – one of the key consideration points remains security. However, these concerns have evolved to encompass users, data, application, workload and even data center security considerations. As more organizations push their infrastructure into the cloud, they’ll need to understand how security, compliance, and regulation all impact their data center model. From an IT perspective, the most common data center compliance standards include SOX, PCI-DSS, FISMA/FedRamp, HIPAA/HITECH, SAE 16, SOC 2 & 3, OCC which serve a very wide number of common industries. To truly understand compliance and regulation – it’s important to look at each standard and apply it to your business, technological model, and how this will impact you in the future.

This webinar from Iron Mountain examines the five key things to consider when it comes to data center compliance. This includes:

  • What are your compliance requirements?
  • The cost of compliance: In-House vs Outsourced
  • Difficulty in achieving compliance
  • Maintaining Compliance
  • Cost of Non-compliance

Furthermore, this webinar outlines the key questions which are being asked as it relates to security, cloud computing and the compliance dilemma. Download this on-demand webinar today to find out:

  • What are the specific compliance regulations governing my industry?
  • What are the day-to-day tasks that I need performed in the data center? Who will do them?
  • How important is physical security?
  • How dynamic is my information technology environment? Does this impact compliance?
  • What services and support will I need to make my environment compliant?

There are more demands being placed around the modern data centers are organizations now create their business model directly around technology. Already we are seeing changes in regulation and compliance to allow for more data to reside in secure cloud environments. For example, the recent Omnibus Rule (an update to HIPAA) allows for the transient access of protected healthcare information (PHI) to move through a business associate which has signed a business associate agreement (BAA). These changes are giving organizations more options around their cloud and what they can do with their enterprise. Through it all, security and data integrity will always be critical considerations.

Get Daily Email News from DCK!
Subscribe now and get our special report, "The World's Most Unique Data Centers."

Enter your email to receive messages about offerings by Penton, its brands, affiliates and/or third-party partners, consistent with Penton's Privacy Policy.

About the Author

Bill Kleyman is a veteran, enthusiastic technologist with experience in data center design, management and deployment. His architecture work includes virtualization and cloud deployments as well as business network design and implementation. Currently, Bill works as the Vice President of Strategy and Innovation at MTM Technologies, a Stamford, CT based consulting firm.

Add Your Comments

  • (will not be published)

One Comment

  1. Interesting take on cloud security and compliance requirements, read another interesting take on cloud security compliance that will interest readers of this post. It offers great advice on managing cloud risks using soc and aligns well this article. @ “Managing cloud risks with service organization controls”