SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
Cloud Security 2013: Companies and Solutions
Cloud security is the set of security protocols and technologies that protect the cloud resources and the
integrity of data stored in a cloud computing environment. Cloud security differs from traditional computer
security in that it is not focused on preventing access to specific machines. This report provides information
about cloud computing environment including types of cloud computing models, challenges facing cloud
computing, best practices for cloud security, and analysis of key players in cloud security industry. The report
provides an overview of key security components of popular cloud security solutions including architecture
and capabilities. The report also provides a market outlook and view into the future of cloud security. Report
Benefits:
Understand the basics of cloud computing Evaluation of cloud security companies and their solutions
Identify key practices of cloud security vendors and customers Understand cloud computing environment,
benefits and challenges Identify the evolution of cloud to content, applications, content, and communications
Understand cloud security solutions including components, architecture and capabilities
Target Audience:
Telecom service providers Security solutions providers Content and application providers Datacenter and
hosting companies Cloud services (SaaS, IaaS, PaaS) companies Companies involved with SDN and
virtualization
Companies in Report:
BARRACUDA CARPATHIA CISCO CITRIX EXPEDIENT
HYTRUST
MCAFEE
OPSOURCE SAFENET
TRAPEZOID VIRTUSTREAM
table Of Contents:
overview 6

cloud Computing 6

cloud Computing Models 6
storage-as-a-service 6
database-as-a-service 7
information-as-a-service 7
business-process-as-a-service 7
application-as-a-service 7
platform-as-a-service 7
integration-as-a-service 7
security-as-a-service 7
management-as-a-service 8
testing-as-a-service 8
Cloud Security 2013: Companies and Solutions
infrastructure-as-a-service 8
cloud Computing Benefits 8
expand Scalability 8
lower Infrastructure Costs 8
increase Utilization 8
improve End-user Productivity 9
improve Reliability 9
increase Security 9
saving Effort For It Tasks 9
gain Access To More Sophisticated Applications 9
save Energy 9
challenges Of Cloud Computing 10
sensitive Data Leakage Over Insecure Channels 10
a Lack Of Interoperability 10
application Compatibility 10
difficulty In Meeting Compliance Regulations 10
inadequate Security 10
cloud Security Best Practices 11
cloud Provider 11
isolation Of Networks 11
isolation Of Management Networks 11
isolation Of Customer Data Networks 11
secure Customer Access To Cloud-based Resources 12
secure, Consistent Backups And Restoration Of Cloud-based Resources 12
strong Authentication, Authorization And Auditing Mechanisms 12
a Library Of Secure And Up-to-date Templates Of Base Os And Applications 12
customer Security Best Practices 12
follow Standard Best Practices For Securing Operating Systems 12
encrypt Critical Data 13
cloud Security Providers 14
barracuda 14
barracuda Web Security 14
carpathia 15
cloud Security Solution - Instanton 16
cisco 17
cisco Cloud Security Solution 17
citrix 19
citrix Cloud Infrastructure Solutions 19
expedient 20
expedient Cloud Computing Solutions 20
hytrust 21
hytrust Appliance 21
mcafee 23
Cloud Security 2013: Companies and Solutions
mcafee Cloud Security Platform 24
opsource 24
opsource Cloud Hosting 25
safenet 26
trapezoid 27
virtustream 29
cloud Security Future Outlook 32
proactive Application Monitoring 32
enhanced Data Center Physical Security 32
enhanced Data Transfer Protection 32
disaster Recover And The Cloud 32
appendix: Understanding The Cloud And Security 33
cloud Computing 33
beyond Computing: Content, Apps, Commerce, And Communications 33
content 34
applications 34
commerce 35
communications 37
cloud Solution Types 38
private Clouds 38
community Clouds 39
public Cloud 39
hybrid Cloud 39
general Security Concerns In The Cloud 40
dos Attack 40
bounce Attack 41
personalization 41
media Specific Attack 41
malicious Code Injection 41
case Examples: Security Applications And Content As A Service 42
app Store Security 42
security Management: 42
identification Management 43
authentication And Authorization 43
individual Privacy: 43
data Storage 43
ResearchMoz(http://www.researchmoz.us/) is the one stop online destination to find and buy market research
reports & Industry Analysis. We fulfill all your research needs spanning across industry verticals with our
huge collection of market research reports. We provide our services to all sizes of organizations and across all
industry verticals and markets. Our Research Coordinators have in-depth knowledge of reports as well as
publishers and will assist you in making an informed decision by giving you unbiased and deep insights on
which reports will satisfy your needs at the best price.

Cloud Security 2013: Companies and Solutions
Contact:
M/s Sheela,
90 State Street,
Suite 700,
Albany NY - 12207
United States
Tel: +1-518-618-1030
USA - Canada Toll Free 866-997-4948
Email: sales@researchmoz.us
Website: http://www.researchmoz.us/

Cloud Security 2013: Companies and Solutions

Mais conteúdo relacionado

Mais de QYResearchReports

State tourism us - august 2013
State tourism   us - august 2013State tourism   us - august 2013
State tourism us - august 2013QYResearchReports
 
ResearchMoz - Polymerase chain reaction (pcr) in medical application an analy...
ResearchMoz - Polymerase chain reaction (pcr) in medical application an analy...ResearchMoz - Polymerase chain reaction (pcr) in medical application an analy...
ResearchMoz - Polymerase chain reaction (pcr) in medical application an analy...QYResearchReports
 
Supermarkets and hypermarkets china - june 2013(1)
Supermarkets and hypermarkets   china - june 2013(1)Supermarkets and hypermarkets   china - june 2013(1)
Supermarkets and hypermarkets china - june 2013(1)QYResearchReports
 
Household cleaning equipment uk - june 2013
Household cleaning equipment   uk - june 2013Household cleaning equipment   uk - june 2013
Household cleaning equipment uk - june 2013QYResearchReports
 
Drinking in the home uk - june 2013
Drinking in the home   uk - june 2013Drinking in the home   uk - june 2013
Drinking in the home uk - june 2013QYResearchReports
 
Mobile VAS Markets Available on Researchmoz.us
Mobile VAS Markets Available on Researchmoz.usMobile VAS Markets Available on Researchmoz.us
Mobile VAS Markets Available on Researchmoz.usQYResearchReports
 
Successfully Accessing Medical Equipment Markets in CIVETS Available on Rese...
Successfully Accessing Medical Equipment Markets in CIVETS  Available on Rese...Successfully Accessing Medical Equipment Markets in CIVETS  Available on Rese...
Successfully Accessing Medical Equipment Markets in CIVETS Available on Rese...QYResearchReports
 
New Cote d'Ivoire Insurance Industry
New Cote d'Ivoire Insurance IndustryNew Cote d'Ivoire Insurance Industry
New Cote d'Ivoire Insurance IndustryQYResearchReports
 

Mais de QYResearchReports (13)

State tourism us - august 2013
State tourism   us - august 2013State tourism   us - august 2013
State tourism us - august 2013
 
Coffee uk - august 2013
Coffee   uk - august 2013Coffee   uk - august 2013
Coffee uk - august 2013
 
Annuities uk - august 2013
Annuities   uk - august 2013Annuities   uk - august 2013
Annuities uk - august 2013
 
Cookware us - july 2013
Cookware   us - july 2013Cookware   us - july 2013
Cookware us - july 2013
 
Underwear uk - june 2013
Underwear   uk - june 2013Underwear   uk - june 2013
Underwear uk - june 2013
 
ResearchMoz - Polymerase chain reaction (pcr) in medical application an analy...
ResearchMoz - Polymerase chain reaction (pcr) in medical application an analy...ResearchMoz - Polymerase chain reaction (pcr) in medical application an analy...
ResearchMoz - Polymerase chain reaction (pcr) in medical application an analy...
 
Supermarkets and hypermarkets china - june 2013(1)
Supermarkets and hypermarkets   china - june 2013(1)Supermarkets and hypermarkets   china - june 2013(1)
Supermarkets and hypermarkets china - june 2013(1)
 
Household cleaning equipment uk - june 2013
Household cleaning equipment   uk - june 2013Household cleaning equipment   uk - june 2013
Household cleaning equipment uk - june 2013
 
Drinking in the home uk - june 2013
Drinking in the home   uk - june 2013Drinking in the home   uk - june 2013
Drinking in the home uk - june 2013
 
Norway Gas Markets, 2013
Norway Gas Markets, 2013Norway Gas Markets, 2013
Norway Gas Markets, 2013
 
Mobile VAS Markets Available on Researchmoz.us
Mobile VAS Markets Available on Researchmoz.usMobile VAS Markets Available on Researchmoz.us
Mobile VAS Markets Available on Researchmoz.us
 
Successfully Accessing Medical Equipment Markets in CIVETS Available on Rese...
Successfully Accessing Medical Equipment Markets in CIVETS  Available on Rese...Successfully Accessing Medical Equipment Markets in CIVETS  Available on Rese...
Successfully Accessing Medical Equipment Markets in CIVETS Available on Rese...
 
New Cote d'Ivoire Insurance Industry
New Cote d'Ivoire Insurance IndustryNew Cote d'Ivoire Insurance Industry
New Cote d'Ivoire Insurance Industry
 

Último

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Último (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

Cloud security 2013 companies and solutions

  • 1. Cloud Security 2013: Companies and Solutions Cloud security is the set of security protocols and technologies that protect the cloud resources and the integrity of data stored in a cloud computing environment. Cloud security differs from traditional computer security in that it is not focused on preventing access to specific machines. This report provides information about cloud computing environment including types of cloud computing models, challenges facing cloud computing, best practices for cloud security, and analysis of key players in cloud security industry. The report provides an overview of key security components of popular cloud security solutions including architecture and capabilities. The report also provides a market outlook and view into the future of cloud security. Report Benefits: Understand the basics of cloud computing Evaluation of cloud security companies and their solutions Identify key practices of cloud security vendors and customers Understand cloud computing environment, benefits and challenges Identify the evolution of cloud to content, applications, content, and communications Understand cloud security solutions including components, architecture and capabilities Target Audience: Telecom service providers Security solutions providers Content and application providers Datacenter and hosting companies Cloud services (SaaS, IaaS, PaaS) companies Companies involved with SDN and virtualization Companies in Report: BARRACUDA CARPATHIA CISCO CITRIX EXPEDIENT HYTRUST MCAFEE OPSOURCE SAFENET TRAPEZOID VIRTUSTREAM table Of Contents: overview 6 cloud Computing 6 cloud Computing Models 6 storage-as-a-service 6 database-as-a-service 7 information-as-a-service 7 business-process-as-a-service 7 application-as-a-service 7 platform-as-a-service 7 integration-as-a-service 7 security-as-a-service 7 management-as-a-service 8 testing-as-a-service 8 Cloud Security 2013: Companies and Solutions
  • 2. infrastructure-as-a-service 8 cloud Computing Benefits 8 expand Scalability 8 lower Infrastructure Costs 8 increase Utilization 8 improve End-user Productivity 9 improve Reliability 9 increase Security 9 saving Effort For It Tasks 9 gain Access To More Sophisticated Applications 9 save Energy 9 challenges Of Cloud Computing 10 sensitive Data Leakage Over Insecure Channels 10 a Lack Of Interoperability 10 application Compatibility 10 difficulty In Meeting Compliance Regulations 10 inadequate Security 10 cloud Security Best Practices 11 cloud Provider 11 isolation Of Networks 11 isolation Of Management Networks 11 isolation Of Customer Data Networks 11 secure Customer Access To Cloud-based Resources 12 secure, Consistent Backups And Restoration Of Cloud-based Resources 12 strong Authentication, Authorization And Auditing Mechanisms 12 a Library Of Secure And Up-to-date Templates Of Base Os And Applications 12 customer Security Best Practices 12 follow Standard Best Practices For Securing Operating Systems 12 encrypt Critical Data 13 cloud Security Providers 14 barracuda 14 barracuda Web Security 14 carpathia 15 cloud Security Solution - Instanton 16 cisco 17 cisco Cloud Security Solution 17 citrix 19 citrix Cloud Infrastructure Solutions 19 expedient 20 expedient Cloud Computing Solutions 20 hytrust 21 hytrust Appliance 21 mcafee 23 Cloud Security 2013: Companies and Solutions
  • 3. mcafee Cloud Security Platform 24 opsource 24 opsource Cloud Hosting 25 safenet 26 trapezoid 27 virtustream 29 cloud Security Future Outlook 32 proactive Application Monitoring 32 enhanced Data Center Physical Security 32 enhanced Data Transfer Protection 32 disaster Recover And The Cloud 32 appendix: Understanding The Cloud And Security 33 cloud Computing 33 beyond Computing: Content, Apps, Commerce, And Communications 33 content 34 applications 34 commerce 35 communications 37 cloud Solution Types 38 private Clouds 38 community Clouds 39 public Cloud 39 hybrid Cloud 39 general Security Concerns In The Cloud 40 dos Attack 40 bounce Attack 41 personalization 41 media Specific Attack 41 malicious Code Injection 41 case Examples: Security Applications And Content As A Service 42 app Store Security 42 security Management: 42 identification Management 43 authentication And Authorization 43 individual Privacy: 43 data Storage 43 ResearchMoz(http://www.researchmoz.us/) is the one stop online destination to find and buy market research reports & Industry Analysis. We fulfill all your research needs spanning across industry verticals with our huge collection of market research reports. We provide our services to all sizes of organizations and across all industry verticals and markets. Our Research Coordinators have in-depth knowledge of reports as well as publishers and will assist you in making an informed decision by giving you unbiased and deep insights on which reports will satisfy your needs at the best price. Cloud Security 2013: Companies and Solutions
  • 4. Contact: M/s Sheela, 90 State Street, Suite 700, Albany NY - 12207 United States Tel: +1-518-618-1030 USA - Canada Toll Free 866-997-4948 Email: sales@researchmoz.us Website: http://www.researchmoz.us/ Cloud Security 2013: Companies and Solutions