12 Feb 2014
3 MINS READ
Long time since last blog… and an ocean of things happened over this period! Our Fusion practice has successfully executed 4 Fusion implementation projects during these 9 months – gives you an indication how rapid implementations happen on cloud.
Speaking to potential cloud customers, before and during the implementation, I understand one major concern in their flight to cloud is data security and privacy. This post is meant to throw some light in this area and lighten this concern a bit!
There are three questions that any customer would have…
This will depend on how well you have configured your firewalls and how vulnerable or impregnable your network is. It also depends on the trust worthiness of your provider. In most cases, when you go with big players – like Oracle, SAP, IBM, the question of trustworthiness is taken care of by the international standards that they adhere to. However, the internal network vulnerability is something that you need to take care of. In many cases, accessing cloud application is like accessing any other site like Google. So, the existing configuration to ensure your network security should be more than sufficient and you need not think of further hardening your network just because of accessing a cloud application. However, in case of hybrid setup where there are integration with on-premise systems, additional care needs to be taken in opening up ports for integration points like SFTP or Webservices. It is industry best practice to review your network vulnerability periodically.
Industry renowned product vendors provide best in class data security on Cloud. An air tight security is enforced at multiple levels. The points given below will serve as a guideline/benchmark while evaluating a provider’s data security standards.
Cloud – though it seems open, is highly secured. I believe now you’d agree if I say, your application on cloud is much more secure than it is on-premise in most cases. If you think otherwise, please feel free to comment and I’ll be happy to defend!
Having said all the above, you should still not share your passwords to your friends and follow the industry best practices in maintaining a good password policy to ensure, your system is rock solid.
“Fusion”fully Yours,
Ram NJ
About the Author
Enterprise Solutions
20 Sep 2018
18 Sep 2018
26 Oct 2015
28 Sep 2015
26 Aug 2015
11 Jun 2014
13 Feb 2014
Enterprise Solutions, Manufacturing and Consumer
31 Jan 2014
27 Jan 2014
03 Jan 2014
03 Dec 2013
28 Nov 2013
19 Nov 2013
03 Oct 2013
01 Oct 2013
30 Sep 2013
24 Sep 2013
19 Sep 2013
10 Sep 2013
27 Aug 2013
19 Aug 2013
25 Jun 2013
17 Jun 2013
11 Jun 2013
Digital Assurance, Enterprise Solutions, Others
26 Apr 2013
12 Apr 2013
18 Mar 2013
Digital Assurance, Enterprise Solutions
05 Mar 2013
27 Feb 2013
18 Feb 2013
14 Feb 2013
BI & Analytics
19 Mar 2009
26 Nov 2010
Digital Assurance
02 Jan 2012
17 Feb 2012
Infrastructure Mgmt. Services
02 Mar 2012
03 Jan 2013
04 Feb 2013
06 Feb 2013
21 Feb 2013
Others
01 Mar 2013
04 Mar 2013
22 Mar 2013
29 Apr 2013
13 May 2013
26 Aug 2013
03 Sep 2013
26 Sep 2013
01 Nov 2013
20 Dec 2013
22 Jan 2014
20 Mar 2014
24 Mar 2014
17 Apr 2014
Manufacturing and Consumer
26 Jun 2014
30 Jun 2014
10 Jul 2014
15 Jul 2014
16 Jul 2014
18 Jul 2014
28 Oct 2014
13 Jul 2015
06 Aug 2015
07 Oct 2015
07 Mar 2016
22 Mar 2016
13 May 2016
23 May 2016
Application Transformation Mgmt.
11 Jul 2016
25 Aug 2016
03 Sep 2016
14 Sep 2016
15 Nov 2016
22 Nov 2016
25 Nov 2016
Business Process Services
25 Apr 2017
Banking and Financial Services
18 May 2017
30 May 2017
23 Jun 2017
27 Jun 2017
18 Jul 2017
26 Oct 2017
Healthcare, Insurance
28 Nov 2017
11 Dec 2017
25 Jan 2018
21 Feb 2018
14 Mar 2018
( Mandatory field * )
The information you provide will be used in accordance with our terms ofPrivacy Policy
Please Check on "I Agree" to register for the blog.