How Do You Secure an Environment Without a Perimeter? Using Emerging Technology Processes to Support Information Security Efforts in an Agile Data Center
Keywords:
Business, Economics, Finance, Cost-Effective, TechnologyAbstract
Cloud computing has transformed businesses, enabling agile and cost-effective IT infrastructure. The critical problem is that these new opportunities resulted in a co-mingled architecture which is difficult to secure. Based on interviews with boards of directors and executive leadership teams facing these new environments, our research question was: How do we secure increasingly dynamic architecture in an environment without a perimeter? The research involved an in-depth exploration of this problem using a survey instrument and interviews with 204 executives from 80 companies throughout 2014. From this work we developed an information security framework for executives in this new environment.
Downloads
Published
2016-03-01
How to Cite
Griffy-Brown, C., Lazarikos, D., & Chun, M. (2016). How Do You Secure an Environment Without a Perimeter? Using Emerging Technology Processes to Support Information Security Efforts in an Agile Data Center. Journal of Applied Business and Economics, 18(1). Retrieved from https://articlegateway.com/index.php/JABE/article/view/832
Issue
Section
Articles
License
Please review our Copyright Notice.