The adoption of new technologies in organizations requires a preliminary assessment of risks, pro and cons of the planned change (SWOT analysis and change management). This paper acknowledges the important changes which are occurring in the security of the ICT systems in the organizations as a consequence from the transfer to the cloud services.
Traditionally, IT is positioned behind the firewall of any organization and all servers, virtualized or not, are specific as a service for any business. The authority which supports the security systems could choose the components for security among multiple proved products – firewalls, antivirus systems, servers, updates management, proxy servers, etc. In this way is guaranteed the high level of control upon the security of IT environment and the requirements of different standards for security.