How Microsoft Does ‘Cloud’ Security [WHITEPAPER]


Microsoft released a detailed whitepaper back in August outlining how security is done when it comes to running our Business Productivity Online Services (BPOS).  Many people are  only now just beginning to think about how businesses will change under a cloud model, especially since competitors are becoming increasing agile when it comes to being able to deliver business results.  Whether your business is manufacturing, shipping, technology, marketing, finance, entertainment, or government, your customers will always demand more agility.  The bottom line is that if you don’t provide it, someone else will, perhaps even at far lesser cost.   

Coffee Mug - Far Side Damned if You Do DontA lot of organizational overhead is a direct result of complexity.  The goal of IT is to make one human capable to doing the work of multiple humans in the same way that a class 2 lever such as a wheelbarrow lets a man move dirt.  Believe me, in the modern world of white collar Britain, paperwork is dirt, and you want to move as much as you can as quickly as you can.  Having smart IT systems that take care of themselves or can be easily integrated with custom systems can be a huge competitive advantage to reduce costs and keep your employees efficient and happy.  At the same time managing IT can itself become a huge problem.  Wouldn’t it be nice if IT could focus on building and fixing the operations of the business that are unique rather than being bogged down with the mission-critical commodities services like email, file sharing, and communications?security2[1]

The only thing stopping most business even considering this route is due to security and reliability.  Hopefully, this whitepaper will instil confidence that when done properly, hosted services from Microsoft can really be a winner.  Because BPOS is a growing business that represents mission critical services for organizations, namely, email via Exchange, document collaboration via SharePoint, and  web conferencing via Live Meeting, many larger enterprises may be curious about the security implications of hosting these services in a 3rd party cloud.  Read the whitepaper where Microsoft elaborates an end-to-end journey about privacy, datacenters, complicance, and continuity. 


Comments (0)

Skip to main content