SaaS Security: 5 Ways to Keep Sensitive Data Secure

shutterstock_132157016A majority of organizations–60% according to technology news site SiliconANGLE–are adopting a cloud-based model for business processes. Many of these businesses have joined the movement because Software-as-a-Service (SaaS) offers benefits to both small businesses and large. However, while most SaaS vendors have good security and compliance, businesses should always be aware of how their sensitive data is being kept safe.

To secure data in the cloud:

  • Carefully choose a vendor
  • Implement an access policy
  • Avoid sending sensitive data to the cloud
  • Employ standard security measures
  • Audit security controls

Choosing a SaaS Vendor

Good security starts with the vendor, your partner in protecting data.

When considering the right vendor, choose one who offers security features like password protection, user controls, and data encryption. Understand the vendor’s process, where your data is stored, how it’s backed up, and the process for data recovery. A reputable vendor will also be happy to provide a list of references to show that they’re reliable and committed to security.

Implement Access Policies

Put an access policy in place that limits who can access sensitive data and from which machines. Some businesses may find data easier to secure by allowing employees to access company resources only from their work computer rather than a personal device that may not be as up-to-date with antivirus software.

Don’t Send Sensitive Data

If data is important and very sensitive, it should be kept off the cloud completely, no matter how secure the SaaS model. One of the many benefits of cloud-based computing is integration that allows access to many functions from one access point. However, it isn’t necessary for all data to be available via the cloud. Store sensitive data locally for better security.

Employ Standard Security Measures At A Minimum

Keeping data secure is not only the job of the SaaS vendor and the IT department. Users of the system are also responsible. Employees should know how to create a strong password and help keep their machines up-to-date with antivirus software. A secure password recovery protocol will also help keep the system secure, especially for businesses with a mobile workforce.

Auditing

Finally, businesses should ensure that their security measures are regularly audited. While many SaaS vendors will use a third party to audit, businesses should also have an internal team or their own third party focused on regular audits.

In the past, companies shied away from cloud solutions for fear of data security. That risk has been greatly minimized today, allowing the benefits of cloud computing and SaaS to outweigh the risks. Still, cautious organizations can reduce risk even further using the tips above to keep data secure.

Cloud Deployment: Learn From These 3 Mistakes Before Committing Them

shutterstock_217358389Enterprises are all unique, each with unique systems and unique issues in regards to cloud deployments. This means that the majority of enterprises will have to use a trial-and-error process when it comes to their first cloud deployment. Some issues that might arise when adopting the cloud for the first time include:

  • Data integration
  • Governance
  • Poor design of applications

Fortunately, enterprises can quickly adapt, especially if they are aware of common issues before they deploy to the cloud.

Poor Performance

Cloud systems perform well when they are properly implemented and have well-designed applications. Businesses looking to deploy the cloud should first make sure that their application design is as efficient as it can be. This will reduce a number of issues that the cloud’s ability to auto-provision won’t capture.

Security Measures

Security should be the first thing an enterprise thinks about when adopting cloud deployment, but many businesses treat it as an afterthought. Adding security measures, governance, and compliance after the cloud has been deployed often does not work and, when it does, it does not offer the same protection. A business looking to move to the cloud should ensure that its security is built-in from the very start and that it applies to the entire system.

Vague Objectives

Each enterprise should consider its unique requirements and objectives before deploying the cloud. Many businesses think in terms of technology, rather than in terms of what their company actually needs, which is part of what leads to incompetent security measures. These businesses should instead think ahead about what they need in order to ensure continued success. A lack of attention to core business processes or data security will lead to an unsecured cloud (at best) and security breaches (at worst).

When a business is educated about common issues that lead to cloud failure, the business is more likely to succeed. Before even considering vendors, businesses should know their objectives for the cloud and ensure their applications are designed to take advantage of what the cloud offers. The planning stages should also be concerned with security measures, in order to ensure that the cloud will be secure from the moment it is deployed. By knowing these common mistakes, and taking them into consideration beforehand, businesses can look forward to a successful cloud deployment.

Utilizing DRaaS as a Gateway to the Cloud

shutterstock_153859988Technology can be a frightening thing, especially to those without a firm understanding of how it works and what can be accomplished. Take, for instance, the advent of the steam locomotive in the 1800s. In spite of the numerous advantages it offered, many people were afraid that, at speeds topping 30 mph, their bodies simply wouldn’t hold up to the stress of traveling that fast.

The same sort of fear and hesitation that kept people from riding steam locomotives is still present today when it comes to adopting new and improved technologies. When the cloud first debuted, many companies were highly skeptical of this new and then-untested technology. Years later, companies are moving beyond skepticism to adopt effective strategies to utilize the cloud to its full potential.

Embracing the Cloud With DRaaS

So what is Disaster Recovery as a Service (DRaaS)? It’s a solution that takes what service providers know about disaster recovery (DR) to ensure continuity within the cloud infrastructure. Instead of facing capital expenditures for physical DR infrastructure, businesses can instead leverage the economies of scale offered through the cloud.

By embracing DRaaS solutions instead of traditional recovery services, customers can effectively utilize cloud infrastructures to host critical production applications and workloads with business continuity in mind. With successful failover testing, skeptical companies can overcome the fear of the unknown and acclimate to cloud-based DR solutions. This can help eliminate much of the fear and dread that comes with moving workloads to a seemingly unfamiliar environment.

Where to Begin?

It’s important for service providers to understand how a good start can help cultivate long-term success. Using DRaaS as an entry point for approaching a cloud services strategy can not only be beneficial for establishing a robust offering within a service provider’s portfolio, but it can also help providers expand their customer bases through established offerings.

Embracing DRaaS is not just considered the fastest way for businesses to join the cloud, but also the fastest-growing way. According to a recent Gartner report, DRaaS is set to become one of the fastest-growing sectors within the cloud market, overtaking traditional recovery services by 2018. Today, few people think much of boarding today’s locomotives that regularly surpass 200 mph. With DRaaS as the established gateway for a host of cloud services, few companies will see any problem with embracing the cloud.

Improving Communications in the Hospitality Industry with Hosted VoIP

shutterstock_289575950In a hotel, phone service is just as important as a comfortable bed and a hot shower. Like an old bed or a defective shower, analog telephony is becoming a liability. Hotels and other establishments in the hospitality industry that want to attract more customers, stand out from the competition, and streamline their internal communications need to consider the value that hosted VoIP (voice-over Internet protocol) phone systems offer.

Searching to satisfy the technology-driven needs of their guests and staff, leaders in the hospitality industry are choosing ramping up their communication systems with VoIP technology.

Benefits of VoIP

Hotels are beginning to see the benefits that hosted VoIP phone systems have over on-premise PBX systems. Cost is a major consideration. Hosted VoIP offers few upfront costs, easy maintenance, and low repair costs. In addition, the VoIP provider monitors the system’s operations, reducing manpower costs.

Flexibility, ease of use, scalability, automatic updates and upgrades, and access to advanced features are other advantages that improve productivity for hotel employees while delivering the ultimate hotel experience for guests.

Security has long been a concern in hosted models. Thus, hosting companies and cloud providers have concentrated on improving the security of their products and have succeeded in the challenge. Encryption, firewalls, strong passwords, separation of voice and data, anti-virus protection, and other tools are now par for the course with hosted solutions.

VoIP Analytics Improve Service

Hotel guests want reliable, excellent phone service and evaluate the quality of the establishment based partly on the quality of the phone service. When competing for guests, hotel administrators need to be aware of how their communication systems are performing, asking questions like these:

  • Is the Internet connection fluctuating?
  • Are the routers performing adequately?
  • Is voice quality choppy or clear?

Hosted VoIP systems typically are paired with a VoIP analytics tool that provides administrators with answers to the above questions—and more.

VoIP analytics includes the recording, capturing, tracking, scoring, managing, and reporting of calls and other data that pass through the system. These reports provide real-time visibility into network, operational, and customer issues as well as other actionable information to help hotel administrators find ways to improve the system.

Responding to Mobility

Fixed lines and desk phones are losing relevance in an increasingly mobile work environment. Hotel guests deserve personalized service and real-time response to any request. Hosted VoIP accommodates the integration of mobile devices to allow employees to always remain connected.

Mobile devices are especially useful for hotel employees, who need to have immediate access to one another from anywhere within the hotel–from the front desk to room service to an external affiliate restaurant. Staff can better handle unplanned events such as the arrival of walk-in clients or VIPs if they are able to immediately connect with one another. Hotel managers can use hosted VoIP to more effectively manage their teams while ensuring guest satisfaction regardless of location.

Developers continue to look for ways to reinvent the guest room phone. It may soon be integrated with the guest’s mobile device to perform other functions.

Hosted VoIP is a communications staple that streamlines calls for hotel employees and offers an array of communications options to hotel guests.

Configuration Management: A Lifeline for IT Security?

shutterstock_199360082It’s amazing how cloud computing has come to take over a growing number of critical tasks normally handled by IT departments. Unfortunately, it’s not so amazing to IT security workers, who are in great danger of being left in the dust. For computer security professionals, cloud computing could be the one thing that puts them out of a job.

There’s still hope however. IT security professionals may have to live with some of the ongoing changes presented by the cloud, but they can remain in control by reevaluating how their organization uses its technology.

 

A Savior in Configuration Management

Configuration management could be the very thing that saves IT security personnel. The need to keep employer data safe is something that is understood by cloud providers, but the overall practice still leaves plenty to be desired in a variety of areas.

Whereas cloud providers take a somewhat distanced approach to security, configuration management means taking a more hands-on approach, namely by keeping tabs on the software and hardware used throughout the organization. IT security professionals are also tasked with monitoring application use on each employee’s computer.

At first glance, configuration management seems like a hard pill to swallow due to the deep level of understanding required of the enterprise’s operations, choices in technology procurement, and personnel.

On the outset, it seems much easier to let cloud providers take the reins when it comes to security issues. However, this leaves the door open to data breaches and other security setbacks that could prove time-consuming and expensive to resolve.

Proving Worth

As with any sort of change, the hardest part is stating an effective and compelling business case for configuration management. That means demonstrating to business executives how effective it can be when compared to putting cloud providers in the driver’s seat.

For starters, a move towards configuration management can help enterprises better manage their vulnerabilities and prevent catastrophic oversights and mistakes from happening. One such example involves understanding software choices and usage habits among employees. This can help IT security professionals pin-point and flag activities that are out of the ordinary.

Showcasing the potential cost savings offered by configuration management can also help drive the point home and garner interest from top management. For instance, mentioning the potential costs of cleaning up malware on computers left exposed by a lack of a configuration management plan can help bring the benefits into focus.

In the end, configuration management means that IT security personnel can maintain a non-trivial level of control over their infrastructure and perhaps even reduce overhead costs in the process.

How Resellers Can Effectively Utilize SIP Trunking in Network Migration

Cloud telephonyMoving away from private branch exchange (PBX) telephony systems is a big deal for most businesses, especially given the huge time commitment and expense that go into such a move. Nevertheless, organizations are being encouraged to shun PBX in favor of cloud-based telephony–all in the name of cost reduction and improvements in efficiency.

This isn’t necessarily a bad thing, but it can be a bit frustrating. Fortunately, there’s always the hybrid approach, which leaves most of the legacy system in place while taking advantage of the latest and greatest in networking hardware. At the heart of it all is the session initiation protocol (SIP) trunking solution, which is designed to allow the implementation of cloud-based telephony over existing PBX infrastructure.

What’s the ROI?

The first thing that any reseller should do over the course of overseeing such a migration is to review how much of a return on investment (ROI) an extension of PBX to a future hybrid system offers. Companies can make quick and useful cost comparisons by comparing the costs of maintaining the current system versus implementing a hybrid system with SIP trunking.

Moving to SIP Trunks

Resellers also can do their part to make the transition to cloud-based telephony services by converting existing long-distance carrier circuits to SIP trunks. This way, resellers can place much of their focus on reducing the overall costs of the conversion process. Further reductions may occur through natural downsizing of vendors and the reduced necessity of several redundant SIP trunks.

Deploying E-SBCs

Enterprise session border controllers (E-SBCs) also play a role in the migration process. These devices are instrumental for managing voice over Internet protocol (VoIP) communications as well as mitigating hostile attacks. It’s important to have a sufficient number of E-SBCs deployed to cover a wide variety of potential cloud services.

Transition from UC to SIP

Another aspect of SIP trunking deployment involves transitioning existing unified communications (UC) services to SIP trunks. Resellers can play an instrumental role in guiding and overseeing the transition from existing UC services to those based on the SIP trunk infrastructure.

How It All Stacks Up

It’s important to take a snapshot of the company’s dedicated access costs (along with long-distance calls) prior to SIP trunking and after the migration process is complete. This gives the company a clear picture of its savings and a chance to inspect areas of the SIP trunking migration where improvements in cost-effectiveness and efficiency can be made.

Migrating to the cloud can be an adventure in its own right, fraught with a variety of challenges for businesses to overcome. However, the hybrid method of SIP trunking migration can help ease and simplify that process to a significant degree.

Why Businesses Should Utilize MDM

Mobile devicesTouchscreen smartphones and tablets are making waves in the world of corporate IT. Many companies are eager to utilize the technology despite the fact that many of these devices don’t meet all security needs. However, cloud technology has made security and device management relatively easy.

The innovation of Bring Your Own Device (BYOD) policies has made security a primary concern for companies. InformationWeek’s 2013 State of Mobile Security discovered that 20 percent of responding companies were developing BYOD policies while 68 percent already had them in place. This means that 88 percent of those respondents are or will soon be implementing BYOD.

As a result of the growing popularity of business mobilization, mobile device management (MDM) solutions were recently developed so companies can use this beneficial technology without compromised security. Another name for mobile device management that has been used is “enterprise mobility management” (EMM). This name refers to MDM’s focus beyond simply mobile device management in an enterprise.

There are many advantages to using cloud technology to manage mobile devices.

Why Choose Cloud MDM/EMM?

Many businesses aren’t sure whether to use on-premises MDM/EMM or make it cloud-based. If it is offered, cloud-based MDM/EMM is ideal for a variety of reasons. One of the main reasons to use MDM/EMM in the cloud is because of the eliminated costs associated with using a new server. Another benefit is that the service provider will normally be responsible for any updates that are released, keeping your systems up to date at all times.

In addition, there is no functionality lost when using cloud-based MDM/EMM. Cloud technology offers the same capabilities as on-site applications.

A Reliable Mobility Policy Is Everything

A solid mobility policy should be a primary concern in cloud-based MDM/EMM. It should cover all pertinent devices and address proper use and security responsibilities. This policy should be thorough in a number of ways, covering:

  • All mobile devices, including the specific models and operating systems that will be offered
  • The types of employees who will receive devices from the company vs. those involved in BYOD
  • Implementation procedures and steps for retiring devices once employees leave
  • Specific security steps to avoid stealing of information and data

There are many other factors that a policy should cover as well, leaving no room for outdated information or exploitable loopholes.

How MDM/EMM Is Being Used

Businesses that are particularly trusting can rely on employees to follow the strict policy associated with mobile devices, or they can choose to let a mobile device management (MDM) system ensure that there is no violation.

MDM used to be exclusively for BlackBerry devices, but has since been developed to cover iPhones and many other types of devices used in the workplace. Some of the aspects of MDM/EMM that have carried over to newer devices include:

  • Security – MDM ensures that all data is encrypted and password protected, and prevents both rooting and jailbreaking.
  • Application Management – Certain mobile apps can be either blacklisted or whitelisted, depending on a company’s preferences.
  • Containerization – A secure container is created to store all company data and personal data as well.

Choosing MDM/EMM Providers

Using cloud-based MDM/EMM for company mobile devices and BYOD will help improve a company’s efficiency as well as reduce the costs of on-premises solutions. In addition, security measures are expanded, with a wide range of devices employing the same level of security. Overall, using an MDM/EMM provider helps ensure that IT personnel can effectively keep systems secure.

State of the Cloud – 2015

State of the CloudAt some point in the year 2015, there will be more than 2.5 billion people accessing the Internet with over 10 billion devices. Being able to stream and transmit all that data will require a billion virtual servers connected to a cloud infrastructure.

It is apparent that cloud computing is not just here to stay, but is expanding every day. Below is an analysis of the state of the cloud and its future projections.

The Reviews Are In

A recent survey, the 2014-2015 Cloud-Based Contact Center Infrastructure Market Report published by DMG Consulting, analyzed eight industry leaders in the field of cloud vending. They discovered that a 61.5 percent majority received marks of “highly satisfied” in the following dozen major categories:

  • Overall satisfaction level
  • Professional services
  • Product
  • Up-time/System availability
  • Training
  • Implementation
  • Product innovation
  • Communication
  • Ongoing support and service
  • Product pricing
  • System upgrades
  • Responsiveness to request for product enhancement

Those numbers indicate a reassuring confidence and comfort level among end users who now leverage their cloud computing solutions in contact centers as opposed to former on-site locations.

Growing Steadily
The momentum just keeps going. DMG Consulting reports gains of 12.8 percent in 2013 in the market of cloud-based contact center infrastructure. Even though this rate has sloughed off from the previous year’s jump to 32.5 percent, it indicates a stabilization in the market that allows vendors to track their sales more precisely. It’s obvious that consumer awareness of the many benefits of the cloud has increased and shows no signs of slowing.

If growth continues at the projected rate, DMG is predicting that cloud-based contact center infrastructure solutions will grow an additional 20 percent this year, followed by a growth rate of 18 percent in the following two years, and by a still steady 16 percent in 2018. This paradigm shift from on-site to cloud-based data storage is extremely significant for the industry, as evidenced by DMG’s recent observation, “Never before have we witnessed an all-out rebirth of an entire industry due solely to a new delivery model.”

Beyond 2015

The market has not yet reached its zenith regarding the growth of cloud computing. As customers clamor for more business solutions to overcome any challenges, the industry will continue to respond.

Federated systems have emerged, allowing data, services and communications to shift across infrastructures with ease. At some future point, technological advances may evolve to allow data to safely scale into both private and public clouds; to clients, vendors and partners; and between service providers, without involving data centers.

One challenge the industry will face is how to increase efficiency yet still keep the cloud use straightforward enough to satisfy end users. As the complexity of systems will only increase in the future, a workable solution will have to be discovered.

When moving data outside of the physical parameters of on-premise locations, maintaining security is paramount. Any vulnerabilities must be protected to avoid privacy breaches while apps migrate to cloud platforms. As the industry evolves, best practices for software and hardware, solutions, integration, and processes will likely emerge.

Thanks to cloud computing advances, the interaction between contact centers and customers has changed profoundly. Now, even small centers are able to provide clients with state-of-the-art technologies they could never before afford. All have access to the same host of benefits — scalability, flexibility, savings, and usage ease — to meet their customers’ individualized needs.

As the industry continues its evolution, its full potential will be realized through customer feedback as IT providers focus on meeting their demands.

Cloud Data Security: Know the Risks

xtranet1212bMoving to the cloud is the next step in a data revolution, that is changing the way things are done. Along with the cloud’s exciting possibilities, there are new risks to consider. Understanding those risks is the best way to choose the right provider to allow businesses to reap the benefits of cloud computing.

Security

The same security concerns that existed with traditional communication options are still valid when it comes to cloud storage and networking. However, the cloud is relatively young for these hazards so solutions are yet evolving. Public clouds are more threatened than private or managed networks, but no matter the system, cloud communication makes hacking and viruses easier for thieves. On the upside, a good data center can provide high security to lower and alleviate the risk.

Multi-Tenants

Another danger with cloud solutions is the susceptibility of software to fail in a multi-tenant situation.  Hypothetically, one server may harm another if it’s infiltrated or damaged. This creates a network of data accuracy problems including lost or damaged data that cannot be retrieved. A reputable cloud solution provider is the best way to protect information from being interrupted or stolen from a third party.

Privacy Protection

Using the cloud for business requires trusting employees with delicate information. This adds a third risk: dealing with data access authorization. A poorly conceived cloud network risks insecure authorization that can be accessed by competition or unauthorized employees. This issue opens up businesses to liability from consumers who are protected under a 1986 U.S. privacy act.

European electronic privacy laws are an additional problem for American companies who store data with providers who have servers in the European Union. American businesses in this case are liable, even if the business does not deal with European consumers. Well trusted cloud solution providers must be chosen to control access to precious data.

Third Party Reliance

There are a few other possible risks to be aware of when crossing over to the cloud. These include the danger of relying on a third party to create an entire infrastructure and its platforms. Providers also oversee the installation and maintenance so they must be dependable and quick to respond to problems. Slow service on the cloud hampers productivity.

It’s important to know the risks of cloud solutions in order to choose a provider that will effectively handle the issues. Done safely, utilizing the cloud allows businesses to save money and increase productivity. Choose wisely.

4 Traits of an Effective Cloud Provider

xtranet1212Partnering with the right provider is a necessity for any business ready to migrate to the cloud. That provider should meet a company’s basic needs, be able to adapt to the business’s unique wishes, and be prepared for future changes in both the industry and technology advancements. In addition, the provider must be chosen with a company’s budget in mind.

The right cloud provider will be ready and willing to work in a mutual partnership. Below are four signs that a business has found the right cloud provider for its needs.

Budget Control

When approaching a cloud services provider, every business should begin with a budget plan. The right provider will be as flexible with fees and usage as with needs and wants.

A pay-as-you-go plan is the top recommended choice for cloud services, because it provides a budget safety net while adjusting to changes within and without the company. Pay-as-you-go is logical and accommodating.

Strong Alliances

Just as every business project requires good communication and feedback, the right cloud provider will listen to and understand basic and specific needs. A business should expect the right provider to present a good plan and to follow through with flexibility and any required training.

In return, the provider can expect expedient communication when issues arise and critical feedback to support future problem solving and adjustments. When a business and cloud provider work together to go beyond meeting the contract terms for the length of an agreement, a dependable and productive alliance may be formed.

Flexibility and Adaptation

The right cloud solution provider will adapt plans and pricing to meet a client’s unique needs. Not every program or application meets the requirements of everyone in the industry. The best provider understands that an improper fit will not make the greatest use of budget and resources.

A provider that cannot adapt to special or unusual needs is not concerned with productivity and long-term success. Smart companies seek out cloud solution providers that are willing to adapt in order to meet a client’s needs.

Open to Change

Change is important. Change is inevitable. Change is a good thing–especially in the telecom field.

Keeping up with industry changes means knowing how to alter and modify plans and tools. The right cloud provider is progressive; they are always looking ahead and planning for the future. To provide customers with more viable solutions, improvements and innovations are necessary.

The right cloud solution provider for any business will keep up with the market, study, and prepare amendments, and always keep customer feedback in mind. Such a provider will help a business grow and be prepared for the future in order to ensure an all around dynamic success.

Making the choice

When researching cloud solutions, businesses will find satisfaction by choosing a provider that is willing to work one-on-one to find the best adaptable and affordable solutions. Moving to the cloud should be a seamless, stress-free process that utilizes the provider relationship so employees can focus on productivity while taking advantage of the best technical advantages in the industry.