Stuck In The Clouds: The Issue Of Data Ownership

Stuck In The Clouds: The Issue Of Data Ownership

While the immediate benefits of cloud services are typically clear to new users, individuals and businesses alike are becoming increasingly aware of a looming issue: vendor lock-in. As these users amass large amounts of data in their cloud-based accounts, from email to pictures and everything in between, they are learning that exporting that data can pose a significant challenge.

Vendors often rely on the fact that once you are comfortable using their services it is difficult to leave and move that data out or to another service. For individuals, this can mean that their cherished digital data such as pictures, videos, music, email and more may be locked away without reasonable methods of exporting or transferring it to a different service. The issue is often even more severe for businesses; certain data such as email, customer relationship management (CRM) information, documents, contacts, calendars and company intranet sites are crucial to the daily operations and continued success of a company. The reduced control that often comes with adopting a cloud service, as contrasted with an on-premise solution, means that this data can remain entrenched within the confines of the current cloud service. This inconvenient reality can manifest itself in several ways, including difficulty exporting the data, moving data to a new employee account when another leaves the company, or moving the data for all accounts to a new cloud service. Innovation, customer satisfaction and overall experience should be the reasons to stay with a cloud service, not vendor lock-in.

APIs to the rescue?

Yes…and no; many cloud service providers recognize, in part, the need to provide some level of open access to users’ data by providing application programming interfaces (APIs) for their services. These APIs allow access for cloud service users to design in-house software for utilizing data stored in the service, or for third-party developers to design software functionality for integration with additional services. As a cloud-based data management and migration company, we develop tools that work with APIs of various service providers to solve these data portability issues. The following brief overview highlights how some of the most popular business tool providers treat data portability concerns in two crucial areas: email & collaboration tools and sales & CRM tools.

Email and collaboration:

Google – Google provides access to a number of APIs for developers in a myriad of ways, and specifically within Google Apps for its business customers. The APIs and level of access provided by Google are so powerful that they have spawned entire separate businesses that augment Google Apps functionality. Integration with these APIs is so prevalent that there is now a robust array of applications in the Google Apps Marketplace.

Office 365 – Microsoft has taken strides with its cloud-based email and collaboration suite, Office 365, to provide options for migration and archiving. Microsoft has included functionality for migration both directly and also via API access for integration with other tools. Additionally, it has included archiving functionality with Office 365, but only at the most expensive tiers. While this is a step in the right direction, potential clients should be aware of different service level limitations.

CRM and sales T=tools

Salesforce – It is hard to think about the cloud and not think of Salesforce. The company has been a major proponent of online services for its CRM platform, but how does it fare with data portability? While Salesforce offers export functionality, the data is broken up into multiple CSV files, which can be cumbersome for some users to manage. You may receive one file for each table in your database, which you then have to upload to a new CRM. Salesforce APIs are available to migrate to another CRM and there are many open source and third-party options available, such as CopyForce.

SugarCRM – SugarCRM is an increasingly popular CRM tool. Sugar offers both easy import and export functionality. The export process in particular is very easy to use in order to import data into another tool or store it locally. While there are options for high degrees of customization with SugarCRM, additional modifications are not necessary for customers who want to move services. This type of data portability allows customers to focus on features, and not vendor lock-in, when considering a CRM tool.

Insightly – Insightly offers a combination CRM and project management tool in one, and is committed to providing multiple options for data portability. It provides API access for advanced integration as well as end-user functionality for easy and useful data export. The API offers basic and essential methods for a deep level of access for those companies that can invest in software development. For others that cannot, your sales and project data is exportable in XML format and the contacts records and, crucially, the notes, are exportable through standard CSV files.

Beyond APIs?

APIs made available by service providers do not, on their own, answer the need for cloud data portability. The most obvious limitation of APIs is simply the need to invest in software development. If a service’s sole method of data removal is an API, then surely this isn’t accessible to many individuals, SMBs and even enterprises that have chosen not to invest. Data access methods are best implemented when they incorporate features that are accessible and practical for users and admins alike.

As users come to rely heavily or even exclusively on cloud services for their business data, we anticipate that an increasingly important feature will be the data portability provided by these services to the end users and non-developers.

By Bob Greenlees,

Bob is the director of operations at ShuttleCloud, a leading cloud data portability platform. Bob leads business development at ShuttleCloud and is responsible for customer success. He is an all around startup hustler and has a background in IP law.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
Fully Autonomous Cars: How’s It REALLY Going To Work?

Fully Autonomous Cars: How’s It REALLY Going To Work?

Pros and Cons and What the Experts Think Science fiction meets reality, and modern civilization is excitedly looking forward to the ubiquity of self-driving cars. However, an omnipresence of fully autonomous cars won’t happen as quickly as even some hopeful experts anticipate. While the autonomous car pros versus the cons race (See infographic discovered via…

The Lighter Side Of The Cloud – Bottlenecking

The Lighter Side Of The Cloud – Bottlenecking

By David Fletcher Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

Recent Articles - Posted by
Fintech Systems, Advancements and Investments

Fintech Systems, Advancements and Investments

Fintech Growth According to a recent report, global investment in fintech companies including both venture-backed and non-venture-backed businesses reached $9.4 billion in the second quarter of 2016; investment in venture capital-backed fintech startups, however, fell by 49%. Nevertheless, the Pulse of Fintech, published jointly by KPMG International and CB Insights, suggests venture capital investment in…

How Identity Governance Can Secure The Cloud Enterprise

How Identity Governance Can Secure The Cloud Enterprise

Securing The Cloud Enterprise Cloud adoption is accelerating for most enterprises, and cloud computing is becoming an integral part of enterprise IT and security infrastructure. Based on current adoption trends, it’s clear that the vast majority of new applications purchased by organizations will be SaaS applications. The allure is evident, from cost savings to speed…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

What You Need To Know About Choosing A Cloud Services Provider

What You Need To Know About Choosing A Cloud Services Provider

Selecting The Right Cloud Services Provider How to find the right partner for cloud adoption on an enterprise scale The cloud is capable of delivering many benefits, enabling greater collaboration, business agility, and speed to market. Cloud adoption in the enterprise has been growing fast. Worldwide spending on public cloud services will grow at a…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

The Business of Security: Avoiding Risks

The Business of Security: Avoiding Risks

The Business of Security Security is one of those IT concerns that aren’t problematic until disaster strikes. It might be tomorrow, it could be next week or next year. The fact is that poor security leaves businesses wide open for data loss and theft. News outlets just skim the surface, but hackers cost business up…

Teach Yourself The Cloud: Cloud Computing Knowledge In 5 Easy Steps

Teach Yourself The Cloud: Cloud Computing Knowledge In 5 Easy Steps

Teach Yourself The Cloud Learn how to get to grips with cloud computing in business  Struggling to get your head around the Cloud? Here are five easy ways you can improve your cloud knowledge and perhaps even introduce cloud systems into your business.  Any new technology can appear daunting, and cloud computing is no exception.…

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Cloud Compliance  Regulatory compliance is an issue that has not only weighed heavily on the minds of executives, security and audit teams, but also today, even end users. Public cloud adds more complexity when varying degrees of infrastructure (depending on the cloud model) and data fall out of the hands of the company and into…

Using Big Data To Analyze Venture Capitalists’ Ability To Recognize Potential

Using Big Data To Analyze Venture Capitalists’ Ability To Recognize Potential

Big Data To Analyze Using Big Data to Analyze Venture Capitalists’ Ability To Recognize Potential For those who are regularly involved with SMEs, venture capital, and company valuations, it is common knowledge that start-ups that exit for more than $1 billion dollars are extremely rare – often termed ‘unicorn’ companies. Despite their rarity, it should…

The Future Of Cybersecurity

The Future Of Cybersecurity

The Future of Cybersecurity In 2013, President Obama issued an Executive Order to protect critical infrastructure by establishing baseline security standards. One year later, the government announced the cybersecurity framework, a voluntary how-to guide to strengthen cybersecurity and meanwhile, the Senate Intelligence Committee voted to approve the Cybersecurity Information Sharing Act (CISA), moving it one…

Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations Everyone knows what the cloud is, but does everybody know where the cloud is? We try to answer that as we look at some of the most unusual data centre locations in the world. Under the Eyes of a Deity Deep beneath the famous Uspenski Cathedral in the…