Skip to main content

Save or Share this Report

For Security & Risk Professionals

The Forrester Wave™: Public Cloud Platform Service Providers' Security, Q4 2014

Public Cloud Platforms Step Up Their Security Game, But Is It Enough To Safely Deploy Critical Applications And Data To The Cloud?

November 17, 2014

Authors

Why Read This Report

Nearly every large enterprise today is building and deploying new applications on one or more of the leading public cloud platforms. But rarely is this initiative done with the security and risk (S&R) professional involved from the start. Should you be worried? Do these platforms provide the protections and security features you need to keep your company's data safe? This Forrester Wave™ evaluates four of the leading public clouds along 15 key security criteria evaluations to answer this question. The participating cloud services providers were: AWS, CenturyLink Cloud, IBM SoftLayer, and Microsoft Azure. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other, to help S&R professionals select the right public cloud partner with the best options for security controls and overall security capabilities.

Get Access

Already a Client?

Log in to read this document.

Become a Forrester Client

Customers are the new market-makers, reshaping industries and changing how businesses compete and win. Success depends on how well and how fast you respond. Forrester Research gives you insights and frameworks aligned to your role to shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer. Contact us to learn more.

Purchase Report

This report is available for individual purchase ($2995 USD).

Purchase

Tools And Templates

Vendor Selection Aids

vendor selection icon
  • Forrester Wave™: Public Cloud Service Providers' Security, Q4 '14

Table of Contents

  • S&R Pros Need To Select Secure Public Cloud Providers
  • Public Cloud Service Providers' Security Evaluation Overview
  • Vendors Focus On Key Capabilities For Effective Information Security
  • Vendor Profiles
  • Supplemental Material
  • Related Research Documents

Recommended Research