Data secure in the cloud.
30 March

Data secure in the cloud

In-house means more security. This is the misconception that many companies are addicted to. But they overlook the fact that this money-saving mentality does not apply to software.

In order to understand why users of digital solutions work better, or above all more securely, in the cloud landscape, the aspect of security must be considered from various points of view.

Versino Financial Suite for SAP Business One Finance

Components of the data protection strategy

Companies must be able to guarantee object security, fail-safety and security against digital attacks for their data. As a result, every company needs a backup strategy. They also need a data protection concept, but this is an independent component of every software solution. This means that it does not play a central role in basic data security in digital systems.

The biggest fear of companies when it comes to data protection is the protection against unauthorised access, including theft or wilful destruction. Horror scenarios of malware being installed quickly cause a furore. And rightly so. That's why people usually invest a lot of time and money in a proper firewall. And that is also correct. However, no blocking security system in the world can currently guarantee the level of protection that data in the cloud enjoys.

Object security: No one can get at the data

The servers with which modern Cloud software have a sophisticated security concept. Every access point is monitored by mechanical protection, the dual control principle, video surveillance and security personnel. Cloud system providers also train their employees to prevent manual access (social engineering). The resourcesMany companies are unable to afford this monitoring effort.

Now you might think that a Trojan could also access the computer via the "accessing" company. cloud system. However, if the company's computers are infected by malware, it first has to get through the cloud provider's firewall.

Protection against digital attacks is also more relevant because they occur most frequently. A system is usually protected against this by the firewall and the constant checking and closing of security gaps (updates of the firewall).

Individual access

The configuration is the most important factor for proper firewall protection. Modern protection systems must always meet new requirements, e.g. when employees access the cloud while travelling or working from home.

In this case, cloud providers provide system administrators who either restrictively authorise external access or create access for individual users.

Safely updated

How here As already described, it is also relevant for system security to always keep the software up to date. However, regular updates are often overlooked in practice. In terms of security, a cloud solution also offers a remedy here. Data centres constantly check their security systems for gaps and rectify them. An ongoing in-house update, so to speak.

Fail-safe: Everything double, everything Highly available

Whether it's a fire or a power failure, incidents like these can cause serious damage to more than just the hardware. If a system fails and with it, for example, the production or the WebshopThis can result in major financial losses for companies or have an impact on their reputation.

However, if the software is "outsourced", it is not affected in the event of a failure. Modern cloud providers can guarantee this "reliability", also known as "high availability", because they fulfil certain standards.

If a cloud solution describes itself as "highly available", all components of the cloud solution must be IT infrastructure be provided twice. This means that all hardware is provided in duplicate and spatially separated. They are also laid on two power lines on different routes and connected to two networks.

In addition, this reliability is improved by constantly monitoring the temperature of the server rooms and the voltage of the hardware components. Sufficient measures such as fire compartments to protect against fire, water or CO2 are also taken.

On top of this, modern data centres provide administrators who can manage incidents around the clock.

This level of security precautions is also not in place in most companies and means an enormous expenditure of resources and time. Know-how. Another advantage of fail-safe, i.e. "highly available" systems is that companies can also offer their services in a fail-safe manner. This is a decisive competitive advantage for service providers, for example.

Backup strategy: From two days to 24 hours

Should the system be jeopardised by a virus, incorrect update or hardware error, a redundant version of the entire system is required. In the case of in-house systems, this backup is also often outsourced to a cloud or actually still comes from tape drives or magnetic tapes. In any case, both the creation of the backup and the restore take a lot of time. Often one to two days minimum. If the hardware is damaged, it must first be reordered. Delivery times or Maintenance contracts often stand in the way of a quick repair of the damage.

Modern cloud providers provide redundancies of data and hardware, if only through "fail-safe" as part of their service, and can thus guarantee a recovery in less than 24 hours.

Cloud makes security possible!

As cloud users, companies therefore enjoy special protection when it comes to security. Setting up the same protection internally would require an enormous amount of time and money, which many companies cannot afford. With a cloud solution, however, they can quickly achieve this standard and benefit from the additional advantages of an external system.

You can find more on the topic of the cloud here.

Contact Versino
ERP_Cloud_Legal_Protection

Is SAP Business One Cloud Software?

Richard Duffy is an SAP Business One veteran and well-known expert for SAP SME software. He had the opportunity to ...
ERP_Cloud_Legal_Protection

The other SAP cloud

Anyone who is interested in the current ERP market knows that there is no way around offers from the data cloud ...
Bydesign S/4Hana

SAP Business ByDesign vs SAP S/4HANA Cloud

After years of development, SAP Business ByDesign has reached a high level of maturity in the SaaS ERP sector for medium-sized companies. SAP Business ByDesign seems to ...
ERP_Cloud_Legal_Protection

SAP Business One Cloud Migration Costs

When considering the cost of a SAP Business One Cloud migration, you have to go into detail to get a realistic view...
ERP_Cloud_Legal_Protection

Data secure in the cloud

In-house means more security. This is the misconception that many companies fall prey to. What is overlooked is that this money-saving mentality for software ...
cloud control center

New: SAP Business One Cloud Control Center video

Cloud computing should make life easier for your users. This also applies to the cloud version of SAP Business ...
Wird geladen …