Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise Services

5 Questions to Ask Before Choosing a Cloud Platform

By Hormazd Romer
December 10, 2013

So you’ve decided to move ahead with a cloud deployment. Now you’re on the hook to make another critical decision: which platform to select. Public? Private? Hybrid? It’s not a cut-and-dried process. What’s right for one organization isn’t necessarily right for your enterprise. To that end, here are five must-ask questions to help you choose wisely.

1)      What do industry regulations say?

When researching cloud options, it’s wise to start by examining regulations within your own industry. In particular, find out what’s needed to comply with any outlined data security requirements. Those requirements alone might dictate which cloud model is the best fit. For example, healthcare organizations governed under HIPAA have stringent data privacy requirements surrounding the handling of protected health information (PHI), which typically leads them to go with a private cloud solution. While the public cloud has huge appeal due to straightforward deployment and management, many soon discover that the potential of violating compliance mandates – and the associated multi-million dollar penalties – are simply not worth the risk.

2)      What types of data will be stored and shared?

This question is commonly overlooked by many, yet is critical to assess before deploying any solution that will come in contact with enterprise information. If your organization produces and/or handles large amounts of confidential and proprietary data, then keeping that information out of the wrong hands has to be a top priority. On the other hand, if you’re in an organization that does not handle mass amounts of private information, you may be less concerned about security and more focused on flexibility and cost-effectiveness, which are two selling points of the public cloud.

3)      What is your risk tolerance?

Risk tolerance is determined by a number of variables, from the type of data your organization works with, to how members of the executive team believe a data breach should be handled. Any organization considering a cloud computing solution needs to determine where you are on the risk spectrum – ultra conservative, open to risk, or somewhere in between. Because risk is not a tangible item and is constantly changing due to varying internal and external factors, such as changes in your IT infrastructure or more advanced security threats, it’s important to maintain an open and ongoing dialogue about risk tolerance and adjust IT strategy as needed.

4)      Where does your data need to live?

Where you want your data to be stored and where a cloud provider actually stores your data might be worlds apart. That could be an issue if industry regulations require otherwise. For example, in European countries, regulations mandate that customer data is stored within the country where the customers live. Therefore, companies that operate in numerous countries need to choose how they will store data specific to that country and ensure that a chosen cloud solution will support the desired location. Often the only viable options are private or hybrid cloud solutions.

5)      What kind of growth do you expect for your cloud-based applications and solutions?

The reality is that you probably don’t know. Ideally, you want a cloud solution that will allow you to grow as far and as fast as you wish – even if the route changes along the way. You want to protect any investment you make, with a built-in potential migration path that allows you to scale without revamping the system every few years. If you know that fast growth is on the docket, a hybrid approach might be a good fit, as you benefit from the seamless scalability of a public cloud solution with the strong security controls that a private cloud deployment can offer.

While private cloud solutions offer the ultimate assurance that data stays under IT control, for some organizations public cloud solutions may provide sufficient assurances for protection of information. In the end, you have to ask yourself how much you’re willing to gamble with the control and security of your information and then place your own bet on the cloud environment that’s right for you.

KEYWORDS: cloud computing cloud security data breach costs data management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Hormazd Romer is Sr. Director of Product Marketing at Accellion

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Man in mask by LED light

A Real-Life Horror Story: When AI Ghouls Move Faster Than Defenses Can React

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

University lecture

1.2M Individuals’ Data Stolen In University Hacking

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • ransomware

    Important Questions to Answer Before Paying a Ransomware Demand

    See More
  • cloud-sec-freepik1170x658v98.jpg

    Key questions to ask when building a cloud security strategy

    See More
  • intercom

    12 questions to ask before selecting an IP intercom solution

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing