This website uses cookies. By continuing to browse the site, you are agreeing to our use of cookies
Enterprise Platform Services
February 12, 2014
Long time since last blog… and an ocean of things happened over this period! Our Fusion practice has successfully executed 4 Fusion implementation projects during these 9 months – gives you an indication how rapid implementations happen on cloud.
Speaking to potential cloud customers, before and during the implementation, I understand one major concern in their flight to cloud is data security and privacy. This post is meant to throw some light in this area and lighten this concern a bit!
There are three questions that any customer would have…
This will depend on how well you have configured your firewalls and how vulnerable or impregnable your network is. It also depends on the trust worthiness of your provider. In most cases, when you go with big players – like Oracle, SAP, IBM, the question of trustworthiness is taken care of by the international standards that they adhere to. However, the internal network vulnerability is something that you need to take care of. In many cases, accessing cloud application is like accessing any other site like Google. So, the existing configuration to ensure your network security should be more than sufficient and you need not think of further hardening your network just because of accessing a cloud application. However, in case of hybrid setup where there are integration with on-premise systems, additional care needs to be taken in opening up ports for integration points like SFTP or Webservices. It is industry best practice to review your network vulnerability periodically.
Industry renowned product vendors provide best in class data security on Cloud. An air tight security is enforced at multiple levels. The points given below will serve as a guideline/benchmark while evaluating a provider’s data security standards.
Cloud – though it seems open, is highly secured. I believe now you’d agree if I say, your application on cloud is much more secure than it is on-premise in most cases. If you think otherwise, please feel free to comment and I’ll be happy to defend!
Having said all the above, you should still not share your passwords to your friends and follow the industry best practices in maintaining a good password policy to ensure, your system is rock solid.
“Fusion”fully Yours,
Ram NJ
About the Author
Ramkumar NJ
Ramkumar is a hands-on Technology Leader, Solutions Architect, Teacher & a Student. He has over 2 decades of experience across ERP, Cloud, Conversational AI and ML. Currently, he is architecting AI solutions for enhancing employee productivity in Tech industry and for multiple corporate initiatives involving AI/ML. As a passionate mentor, he is also an adjunct faculty in BITS, Pilani. His varied interests include the intersection of technology & law and is a student at National Laws School studying multiple Lawtech subjects.
Read more
Every outcome starts with a conversation