Consequences Of Combining Off Premise Cloud Storage and Corporate Data

Consequences Of Combining Off Premise Cloud Storage and Corporate Data

Off Premise Corporate Data Storage

Cloud storage is a broad term. It can encompass anything from on premise solutions, to file storage, disaster recovery and off premise options. To narrow the scope, I’ve dedicated the focus of today’s discussion to the more popular cloud storage services—such as Dropbox, Box, OneDrive—which are also known as hosted, off premise solutions.

These services have become widely popular within the consumer market. The explosive growth of the mobile device industry over the past three years has been the main driver for the cloud storage market. Consumers were in search of a way to easily share and access files, pictures and video content across all their devices whether it be a laptop, desktop or smart device. They wanted their content readily accessible and east to access. Companies like Dropbox and Box were the early pioneers of this cloud storage niche that has now become a battleground for the big players such as Google and Microsoft. The competition of this market has benefited the consumer with cost-effective pricing and almost limitless storage. Microsoft includes 1TB of OneDrive storage with the Office 365 subscription and Dropbox cost $99/year for 1TB.

Consumers, now equipped with a DropBox or similar service for personal data, demand the ability to access corporate data on their smart devices or mobile workspace in a similar manner. Initially, this leads to people using their personal accounts to store and share work related documents. With this, a variety of issues surfaced when using this approach; from security to compliance the list runs long. In order to remedy these issues, corporations began buying enterprise accounts from cloud storage providers where a higher degree of security is offered, and access control to data and improved logging addressed some compliance issues.

Service Level Agreement Omission

SLA

Though these services are scrambling to entice the enterprise market, there are still many apprehensions I have that prohibit me from recommending these services for corporate data. First and foremost, the omission of a Service Level Agreement (SLA) guaranteeing the availability of data is a concern. Most IT organizations build resilient networks with three, four or five 9’s of uptime. This equates to a high degree of availability for your corporate data. As a corporate user, you expect (or require) the same level of service for your cloud storage, yet most of these providers only commit to “provide the service as is“, “with all faults” and “as available” while providing no warranty that the service will be uninterrupted, free of harmful components or that the content will be secure or not lost or damaged. These terms and conditions significantly minimize the provider’s responsibility to ensure data is accessible, safe, error-free and uninterrupted. On the flip side, it’s hard to believe a company would accept this type of disclaimer from an internal IT department.

Maintenance Scheduling

Most IT departments schedule routine maintenance windows to patch and upgrade systems when usage is low. These windows typically occur on the weekend or late at night to minimize disruption. Cloud storage providers reserve the right, at their sole discretion, to make necessary unscheduled deployments of changes, updates or enhancements to the Service at any time.  In essence, upgrading their systems whenever they desire.

Also worth considering, is the fact that these services can terminate any account, locking users out of data at any given time with or without cause based on their sole discretion and charge an additional fee to retrieve the data once this occurs.

While the off-premise service providers’ capabilities may fit the needs of consumers, the risk potential when it comes to data loss and security can significantly inhibit satisfaction and productivity for corporate users. To shield your organization from these threats, I suggest leveraging the providers that allow on-premise implementations of their software. By doing so, companies can take advantage of the ease of use and accessibility these applications offer, while enjoying the peace of mind that comes with a higher degree of security, compliance, availability and accessibility of an incredibly valuable asset: their data.

By Marc Malizia

About Marc Malizia

Marc Malizia is co-founder and CTO of RKON Technologies, responsible for the company’s overall technical vision and strategy. Since he helped start the company in 1998, Malizia has played a key role in creating many of RKON Technologies’ products and professional service offerings, as well as building the company’s internal computing platform, which serves as the basis of the brand’s cloud and managed services portfolio.

Prior to RKON Technologies, Malizia was director of engineering at LAN Systems.

Malizia holds a bachelor’s degree in computer science and mathematics from University of Illinois and a master’s degree in telecommunications from DePaul University.

View Website
View All Articles

Sorry, comments are closed for this post.

Comics
Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

Two 2017 Trends From A Galaxy Far, Far Away

Two 2017 Trends From A Galaxy Far, Far Away

Reaching For The Stars People who know me know that I’m a huge Star Wars fan. I recently had the opportunity to see Rogue One: A Star Wars Story. While I won’t give any spoilers away for the few who haven’t seen the movie yet, I do want to mention a couple of trends from…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Cyber Criminals Are Business People Too

Cyber Criminals Are Business People Too

Cyber Crime Business You’re on the morning train on the way to work and take a look at the guy next to you. He’s clean-cut, wearing a crisp suit and holding a leather briefcase just like dozens of others. Just another worker headed to the office, right?. Yes, but not in the way you think…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…