Trial lock

This Research is for Members Only

Not a member? Unlock a free sample of our research now!

Already a member?

Sign in now

Network and data security are crucial to protecting your business, but you also have to think externally and keep track of what happens when you connect to a service provider or in situations where a contractor has to actually physically interact with your infrastructure. In those situations, you have to evaluate whether a provider’s security practices are up to your standards and make sure you have policies in place to monitor contractors inside your facility so they don’t purposefully or inadvertently infect or otherwise impact your business-critical internal systems. 

Service Providers 

Companies are outsourcing workloads to third-party service providers more than ever before in an effort to save money and gain agility. Even though there are benefits, it’s important to understand that you are essentially taking potentially business-critical workloads and moving them away from your data center, which has some inherent risk. 

To overcome those risks, you can take three approaches, says James McCloskey, director, advisory services— security and risk at Info-Tech Research Group.

Click here for the full article

Related Content

Hide Details

Search Code: 77815
Published: April 17, 2015
Last Revised: June 18, 2015

To speak to one of our Analysts,
Contact Info-Tech Public Relations


US: 1-888-670-8889
Canada: 1-844-618-3192
International: +1-519-432-3550